EXPLORE

EXPLORE DETECTIONS

🔍
3,256 detections found

RestrictedAdminMode Registry Value Tampering - ProcCreation

Detects changes to the "DisableRestrictedAdmin" registry value in order to disable or enable RestrictedAdmin mode. RestrictedAdmin mode prevents the transmission of reusable credentials to the remote system to which you connect using Remote Desktop. This prevents your credentials from being harvested during the initial connection process if the remote server has been compromise

T1112
Sigmahigh

Roles Activated Too Frequently

Identifies when the same privilege role has multiple activations by the same user.

T1078
Sigmahigh

Roles Activation Doesn't Require MFA

Identifies when a privilege role can be activated without performing mfa.

T1078
Sigmahigh

Roles Are Not Being Used

Identifies when a user has been assigned a privilege role and are not using that role.

T1078
Sigmahigh

Roles Assigned Outside PIM

Identifies when a privilege role assignment has taken place outside of PIM and may indicate an attack.

T1078
Sigmahigh

Root Account Enable Via Dsenableroot

Detects attempts to enable the root account via "dsenableroot"

T1078T1078.001T1078.003
Sigmamedium

Root Certificate Installed - PowerShell

Adversaries may install a root certificate on a compromised system to avoid warnings when connecting to adversary controlled web servers.

T1553.004
Sigmamedium

Root Certificate Installed From Susp Locations

Adversaries may install a root certificate on a compromised system to avoid warnings when connecting to adversary controlled web servers.

T1553.004
Sigmahigh

RottenPotato Like Attack Pattern

Detects logon events that have characteristics of events generated during an attack with RottenPotato and the like

T1557.001
Sigmahigh

RTCore Suspicious Service Installation

Detects the installation of RTCore service. Which could be an indication of Micro-Star MSI Afterburner vulnerable driver abuse

Sigmahigh

Ruby Inline Command Execution

Detects execution of ruby using the "-e" flag. This is could be used as a way to launch a reverse shell or execute live ruby code.

T1059
Sigmamedium

Ruby on Rails Framework Exceptions

Detects suspicious Ruby on Rails exceptions that could indicate exploitation attempts

T1190
Sigmamedium

Run Once Task Configuration in Registry

Rule to detect the configuration of Run Once registry key. Configured payload can be run by runonce.exe /AlternateShellStartup

T1112
Sigmamedium

Run Once Task Execution as Configured in Registry

This rule detects the execution of Run Once task as configured in the registry

T1112
Sigmalow

Run PowerShell Script from ADS

Detects PowerShell script execution from Alternate Data Stream (ADS)

T1564.004
Sigmahigh

Run PowerShell Script from Redirected Input Stream

Detects PowerShell script execution via input stream redirect

T1059
Sigmahigh

Rundll32 Execution With Uncommon DLL Extension

Detects the execution of rundll32 with a command line that doesn't contain a common extension

T1218.011
Sigmamedium

Rundll32 Execution Without CommandLine Parameters

Detects suspicious start of rundll32.exe without any parameters as found in CobaltStrike beacon activity

T1202
Sigmahigh

Rundll32 Execution Without Parameters

Detects rundll32 execution without parameters as observed when running Metasploit windows/smb/psexec exploit module

T1021.002T1570T1569.002
Sigmahigh

Rundll32 InstallScreenSaver Execution

An attacker may execute an application as a SCR File using rundll32.exe desk.cpl,InstallScreenSaver

T1218.011
Sigmamedium

Rundll32 Internet Connection

Detects a rundll32 that communicates with public IP addresses

T1218.011
Sigmamedium

Rundll32 Registered COM Objects

load malicious registered COM objects

T1546.015
Sigmahigh

Rundll32 Spawned Via Explorer.EXE

Detects execution of "rundll32.exe" with a parent process of Explorer.exe. This has been observed by variants of Raspberry Robin, as first reported by Red Canary.

Sigmamedium

RunDLL32 Spawning Explorer

Detects RunDLL32.exe spawning explorer.exe as child, which is very uncommon, often observes Gamarue spawning the explorer.exe process in an unusual way

T1218.011
Sigmahigh
PreviousPage 97 of 136Next