EXPLORE

EXPLORE DETECTIONS

🔍
3,252 detections found

New Network Trace Capture Started Via Netsh.EXE

Detects the execution of netsh with the "trace" flag in order to start a network capture

T1040
Sigmamedium

New ODBC Driver Registered

Detects the registration of a new ODBC driver.

Sigmalow

New Okta User Created

Detects new user account creation

Sigmainformational

New or Renamed User Account with '$' Character

Detects the creation of a user with the "$" character. This can be used by attackers to hide a user or trick detection systems that lack the parsing mechanisms.

T1036
Sigmamedium

New Outlook Macro Created

Detects the creation of a macro file for Outlook.

T1137T1008T1546
Sigmamedium

New PDQDeploy Service - Client Side

Detects PDQDeploy service installation on the target system. When a package is deployed via PDQDeploy it installs a remote service on the target machine with the name "PDQDeployRunner-X" where "X" is an integer starting from 1

T1543.003
Sigmamedium

New PDQDeploy Service - Server Side

Detects a PDQDeploy service installation which indicates that PDQDeploy was installed on the machines. PDQDeploy can be abused by attackers to remotely install packages or execute commands on target machines

T1543.003
Sigmamedium

New Port Forwarding Rule Added Via Netsh.EXE

Detects the execution of netsh commands that configure a new port forwarding (PortProxy) rule

T1090
Sigmamedium

New PortProxy Registry Entry Added

Detects the modification of the PortProxy registry key which is used for port forwarding.

T1090
Sigmamedium

New PowerShell Instance Created

Detects the execution of PowerShell via the creation of a named pipe starting with PSHost

T1059.001
Sigmainformational

New Process Created Via Taskmgr.EXE

Detects the creation of a process via the Windows task manager. This might be an attempt to bypass UAC

T1036
Sigmalow

New Process Created Via Wmic.EXE

Detects new process creation using WMIC via the "process call create" flag

T1047
Sigmamedium

New Remote Desktop Connection Initiated Via Mstsc.EXE

Detects the usage of "mstsc.exe" with the "/v" flag to initiate a connection to a remote server. Adversaries may use valid accounts to log into a computer using the Remote Desktop Protocol (RDP). The adversary may then perform actions as the logged-on user.

T1021.001
Sigmamedium

New Root Certificate Authority Added

Detects newly added root certificate authority to an AzureAD tenant to support certificate based authentication.

T1556
Sigmamedium

New Root Certificate Installed Via CertMgr.EXE

Detects execution of "certmgr" with the "add" flag in order to install a new certificate on the system. Adversaries may install a root certificate on a compromised system to avoid warnings when connecting to adversary controlled web servers.

T1553.004
Sigmamedium

New Root Certificate Installed Via Certutil.EXE

Detects execution of "certutil" with the "addstore" flag in order to install a new certificate on the system. Adversaries may install a root certificate on a compromised system to avoid warnings when connecting to adversary controlled web servers.

T1553.004
Sigmamedium

New Root or CA or AuthRoot Certificate to Store

Detects the addition of new root, CA or AuthRoot certificates to the Windows registry

T1490
Sigmamedium

New RUN Key Pointing to Suspicious Folder

Detects suspicious new RUN key element pointing to an executable in a suspicious folder

T1547.001
Sigmahigh

New Self Extracting Package Created Via IExpress.EXE

Detects the "iexpress.exe" utility creating self-extracting packages. Attackers where seen leveraging "iexpress" to compile packages on the fly via ".sed" files. Investigate the command line options provided to "iexpress" and in case of a ".sed" file, check the contents and legitimacy of it.

T1218
Sigmamedium

New Service Creation Using PowerShell

Detects the creation of a new service using powershell.

T1543.003
Sigmalow

New Service Creation Using Sc.EXE

Detects the creation of a new service using the "sc.exe" utility.

T1543.003
Sigmalow

New TimeProviders Registered With Uncommon DLL Name

Detects processes setting a new DLL in DllName in under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\W32Time\TimeProvider. Adversaries may abuse time providers to execute DLLs when the system boots. The Windows Time service (W32Time) enables time synchronization across and within domains.

T1547.003
Sigmahigh

New User Created Via Net.EXE

Identifies the creation of local users via the net.exe command.

T1136.001
Sigmamedium

New User Created Via Net.EXE With Never Expire Option

Detects creation of local users via the net.exe command with the option "never expire"

T1136.001
Sigmahigh
PreviousPage 57 of 136Next