EXPLORE

EXPLORE DETECTIONS

🔍
3,252 detections found

Potential CommandLine Obfuscation Using Unicode Characters

Detects potential CommandLine obfuscation using unicode characters. Adversaries may attempt to make an executable or file difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its contents on the system or in transit.

T1027
Sigmamedium

Potential CommandLine Obfuscation Using Unicode Characters From Suspicious Image

Detects potential commandline obfuscation using unicode characters. Adversaries may attempt to make an executable or file difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its contents on the system or in transit.

T1027
Sigmahigh

Potential CommandLine Path Traversal Via Cmd.EXE

Detects potential path traversal attempt via cmd.exe. Could indicate possible command/argument confusion/hijacking

T1059.003
Sigmahigh

Potential Configuration And Service Reconnaissance Via Reg.EXE

Detects the usage of "reg.exe" in order to query reconnaissance information from the registry. Adversaries may interact with the Windows registry to gather information about credentials, the system, configuration, and installed software.

T1012T1007
Sigmamedium

Potential Container Discovery Via Inodes Listing

Detects listing of the inodes of the "/" directory to determine if the we are running inside of a container.

T1082
Sigmalow

Potential Cookies Session Hijacking

Detects execution of "curl.exe" with the "-c" flag in order to save cookie data.

Sigmamedium

Potential Credential Dumping Activity Via LSASS

Detects process access requests to the LSASS process with specific call trace calls and access masks. This behaviour is expressed by many credential dumping tools such as Mimikatz, NanoDump, Invoke-Mimikatz, Procdump and even the Taskmgr dumping feature.

T1003.001S0002
Sigmamedium

Potential Credential Dumping Attempt Using New NetworkProvider - CLI

Detects when an attacker tries to add a new network provider in order to dump clear text credentials, similar to how the NPPSpy tool does it

T1003
Sigmahigh

Potential Credential Dumping Attempt Using New NetworkProvider - REG

Detects when an attacker tries to add a new network provider in order to dump clear text credentials, similar to how the NPPSpy tool does it

T1003
Sigmamedium

Potential Credential Dumping Attempt Via PowerShell

Detects a PowerShell process requesting access to "lsass.exe", which can be indicative of potential credential dumping attempts

T1003.001
Sigmamedium

Potential Credential Dumping Attempt Via PowerShell Remote Thread

Detects remote thread creation by PowerShell processes into "lsass.exe"

T1003.001
Sigmahigh

Potential Credential Dumping Via LSASS Process Clone

Detects a suspicious LSASS process process clone that could be a sign of credential dumping activity

T1003T1003.001
Sigmacritical

Potential Credential Dumping Via LSASS SilentProcessExit Technique

Detects changes to the Registry in which a monitor program gets registered to dump the memory of the lsass.exe process

T1003.001
Sigmacritical

Potential Credential Dumping Via WER

Detects potential credential dumping via Windows Error Reporting LSASS Shtinkering technique which uses the Windows Error Reporting to dump lsass

T1003.001
Sigmahigh

Potential Crypto Mining Activity

Detects command line parameters or strings often used by crypto miners

T1496
Sigmahigh

Potential Data Exfiltration Activity Via CommandLine Tools

Detects the use of various CLI utilities exfiltrating data via web requests

T1059.001
Sigmahigh

Potential Data Exfiltration Over SMTP Via Send-MailMessage Cmdlet

Detects the execution of a PowerShell script with a call to the "Send-MailMessage" cmdlet along with the "-Attachments" flag. This could be a potential sign of data exfiltration via Email. Adversaries may steal data by exfiltrating it over an un-encrypted network protocol other than that of the existing command and control channel. The data may also be sent to an alternate network location from the main command and control server.

T1048.003
Sigmamedium

Potential Data Exfiltration Via Audio File

Detects potential exfiltration attempt via audio file using PowerShell

Sigmamedium

Potential Data Exfiltration Via Curl.EXE

Detects the execution of the "curl" process with "upload" flags. Which might indicate potential data exfiltration

T1567T1105
Sigmamedium

Potential Data Stealing Via Chromium Headless Debugging

Detects chromium based browsers starting in headless and debugging mode and pointing to a user profile. This could be a sign of data stealing or remote control

T1185T1564.003
Sigmahigh

Potential DCOM InternetExplorer.Application DLL Hijack

Detects potential DLL hijack of "iertutil.dll" found in the DCOM InternetExplorer.Application Class over the network

T1021.002T1021.003
Sigmacritical

Potential DCOM InternetExplorer.Application DLL Hijack - Image Load

Detects potential DLL hijack of "iertutil.dll" found in the DCOM InternetExplorer.Application Class

T1021.002T1021.003
Sigmacritical

Potential Defense Evasion Activity Via Emoji Usage In CommandLine - 1

Detects the usage of emojis in the command line, this could be a sign of potential defense evasion activity.

Sigmahigh

Potential Defense Evasion Activity Via Emoji Usage In CommandLine - 2

Detects the usage of emojis in the command line, this could be a sign of potential defense evasion activity.

Sigmahigh
PreviousPage 67 of 136Next