EXPLORE

EXPLORE DETECTIONS

🔍
3,115 detections found

.RDP File Created By Uncommon Application

Detects creation of a file with an ".rdp" extension by an application that doesn't commonly create such files.

Sigmahigh

7Zip Compressing Dump Files

Detects execution of 7z in order to compress a file with a ".dmp"/".dump" extension, which could be a step in a process of dump file exfiltration.

T1560.001
Sigmamedium

A Member Was Added to a Security-Enabled Global Group

Detects activity when a member is added to a security-enabled global group

T1098
Sigmalow

A Member Was Removed From a Security-Enabled Global Group

Detects activity when a member is removed from a security-enabled global group

T1098
Sigmalow

A New Trust Was Created To A Domain

Addition of domains is seldom and should be verified for legitimacy.

T1098
Sigmamedium

A Rule Has Been Deleted From The Windows Firewall Exception List

Detects when a single rules or all of the rules have been deleted from the Windows Defender Firewall

T1562.004
Sigmamedium

A Security-Enabled Global Group Was Deleted

Detects activity when a security-enabled global group is deleted

T1098
Sigmalow

AADInternals PowerShell Cmdlets Execution - ProccessCreation

Detects ADDInternals Cmdlet execution. A tool for administering Azure AD and Office 365. Which can be abused by threat actors to attack Azure AD or Office 365.

Sigmahigh

AADInternals PowerShell Cmdlets Execution - PsScript

Detects ADDInternals Cmdlet execution. A tool for administering Azure AD and Office 365. Which can be abused by threat actors to attack Azure AD or Office 365.

Sigmahigh

Abusable DLL Potential Sideloading From Suspicious Location

Detects potential DLL sideloading of DLLs that are known to be abused from suspicious locations

T1059
Sigmahigh

Abuse of Service Permissions to Hide Services Via Set-Service

Detects usage of the "Set-Service" powershell cmdlet to configure a new SecurityDescriptor that allows a service to be hidden from other utilities such as "sc.exe", "Get-Service"...etc. (Works only in powershell 7)

T1574.011
Sigmahigh

Abuse of Service Permissions to Hide Services Via Set-Service - PS

Detects usage of the "Set-Service" powershell cmdlet to configure a new SecurityDescriptor that allows a service to be hidden from other utilities such as "sc.exe", "Get-Service"...etc. (Works only in powershell 7)

T1574.011
Sigmahigh

Abused Debug Privilege by Arbitrary Parent Processes

Detection of unusual child processes by different system processes

T1548
Sigmahigh

Abusing Print Executable

Attackers can use print.exe for remote file copy

T1218
Sigmamedium

Access of Sudoers File Content

Detects the execution of a text-based file access or inspection utilities to read the content of /etc/sudoers in order to potentially list all users that have sudo rights.

T1592.004
Sigmamedium

Access To ADMIN$ Network Share

Detects access to ADMIN$ network share

T1021.002
Sigmalow

Access to Browser Login Data

Adversaries may acquire credentials from web browsers by reading files specific to the target browser. Web browsers commonly save credentials such as website usernames and passwords so that they do not need to be entered manually in the future. Web browsers typically store the credentials in an encrypted format within a credential store.

T1555.003
Sigmamedium

Access To Crypto Currency Wallets By Uncommon Applications

Detects file access requests to crypto currency files by uncommon processes. Could indicate potential attempt of crypto currency wallet stealing.

T1003
Sigmamedium

Access To Potentially Sensitive Sysvol Files By Uncommon Applications

Detects file access requests to potentially sensitive files hosted on the Windows Sysvol share.

T1552.006
Sigmamedium

Access To Windows Credential History File By Uncommon Applications

Detects file access requests to the Windows Credential History File by an uncommon application. This can be a sign of credential stealing. Example case would be usage of mimikatz "dpapi::credhist" function

T1555.004
Sigmamedium

Access To Windows DPAPI Master Keys By Uncommon Applications

Detects file access requests to the the Windows Data Protection API Master keys by an uncommon application. This can be a sign of credential stealing. Example case would be usage of mimikatz "dpapi::masterkey" function

T1555.004
Sigmamedium

Account Created And Deleted Within A Close Time Frame

Detects when an account was created and deleted in a short period of time.

T1078
Sigmahigh

Account Disabled or Blocked for Sign in Attempts

Detects when an account is disabled or blocked for sign in but tried to log in

T1078.004
Sigmamedium

Account Lockout

Identifies user account which has been locked because the user tried to sign in too many times with an incorrect user ID or password.

T1110
Sigmamedium
Page 1 of 130Next