EXPLORE

EXPLORE DETECTIONS

🔍
3,252 detections found

New Virtual Smart Card Created Via TpmVscMgr.EXE

Detects execution of "Tpmvscmgr.exe" to create a new virtual smart card.

Sigmamedium

New Windows Firewall Rule Added Via New-NetFirewallRule Cmdlet

Detects calls to the "New-NetFirewallRule" cmdlet from PowerShell in order to add a new firewall rule with an "Allow" action.

T1562.004
Sigmalow

New Windows Firewall Rule Added Via New-NetFirewallRule Cmdlet - ScriptBlock

Detects when a powershell script contains calls to the "New-NetFirewallRule" cmdlet in order to add a new firewall rule with an "Allow" action.

T1562.004
Sigmalow

Nginx Core Dump

Detects a core dump of a crashing Nginx worker process, which could be a signal of a serious problem or exploitation attempts.

T1499.004
Sigmahigh

Ngrok Usage with Remote Desktop Service

Detects cases in which ngrok, a reverse proxy tool, forwards events to the local RDP port, which could be a sign of malicious behaviour

T1090
Sigmahigh

Nltest.EXE Execution

Detects nltest commands that can be used for information discovery

T1016T1018T1482
Sigmalow

No Suitable Encryption Key Found For Generating Kerberos Ticket

Detects errors when a target server doesn't have suitable keys for generating kerberos tickets. This issue can occur for example when a service uses a user account or a computer account that is configured for only DES encryption on a computer that is running Windows 7 which has DES encryption for Kerberos authentication disabled.

T1558.003
Sigmalow

Node Process Executions

Detects the execution of other scripts using the Node executable packaged with Adobe Creative Cloud

T1127T1059.007
Sigmamedium

NodeJS Execution of JavaScript File

Detects execution of JavaScript or JSC files using NodeJs binary node.exe, that could be potentially suspicious. Node.js is a popular open-source JavaScript runtime that runs code outside browsers and is widely used for both frontend and backend development. Adversaries have been observed abusing Node.js to disguise malware as legitimate processes, evade security defenses, and maintain persistence within target systems. Because Node.js is commonly used, this rule may generate false positives in some environments. However, if such activity is unusual in your environment, it is highly suspicious and warrants immediate investigation.

T1059.007
Sigmalow

Nohup Execution

Detects usage of nohup which could be leveraged by an attacker to keep a process running or break out from restricted environments

T1059.004
Sigmamedium

Non Interactive PowerShell Process Spawned

Detects non-interactive PowerShell activity by looking at the "powershell" process with a non-user GUI process such as "explorer.exe" as a parent.

T1059.001
Sigmalow

Non-DLL Extension File Renamed With DLL Extension

Detects rename operations of files with non-DLL extensions to files with a DLL extension. This is often performed by malware in order to avoid initial detections based on extensions.

T1036.008
Sigmamedium

Non-privileged Usage of Reg or Powershell

Search for usage of reg or Powershell by non-privileged users to modify service configuration in registry

T1112
Sigmahigh

Notepad Password Files Discovery

Detects the execution of Notepad to open a file that has the string "password" which may indicate unauthorized access to credentials or suspicious activity.

T1083
Sigmalow

Notepad++ Updater DNS Query to Uncommon Domains

Detects when the Notepad++ updater (gup.exe) makes DNS queries to domains that are not part of the known legitimate update infrastructure. This could indicate potential exploitation of the updater mechanism or suspicious network activity that warrants further investigation.

T1195.002T1557
Sigmamedium

Nslookup PowerShell Download Cradle

Detects a powershell download cradle using nslookup. This cradle uses nslookup to extract payloads from DNS records.

T1059.001
Sigmamedium

Nslookup PowerShell Download Cradle - ProcessCreation

Detects suspicious powershell download cradle using nslookup. This cradle uses nslookup to extract payloads from DNS records

Sigmamedium

NtdllPipe Like Activity Execution

Detects command that type the content of ntdll.dll to a different file or a pipe in order to evade AV / EDR detection. As seen being used in the POC NtdllPipe

Sigmahigh

NTDS Exfiltration Filename Patterns

Detects creation of files with specific name patterns seen used in various tools that export the NTDS.DIT for exfiltration.

T1003.003
Sigmahigh

NTDS.DIT Created

Detects creation of a file named "ntds.dit" (Active Directory Database)

T1003.003
Sigmalow

NTDS.DIT Creation By Uncommon Parent Process

Detects creation of a file named "ntds.dit" (Active Directory Database) by an uncommon parent process or directory

T1003.003
Sigmahigh

NTDS.DIT Creation By Uncommon Process

Detects creation of a file named "ntds.dit" (Active Directory Database) by an uncommon process or a process located in a suspicious directory

T1003.002T1003.003
Sigmahigh

Ntdsutil Abuse

Detects potential abuse of ntdsutil to dump ntds.dit database

T1003.003
Sigmamedium

NTFS Alternate Data Stream

Detects writing data into NTFS alternate data streams from powershell. Needs Script Block Logging.

T1564.004T1059.001
Sigmahigh
PreviousPage 58 of 136Next