January 2024 (30)
Suspicious Local Scheduled Task Creation
2 rules 1 TTPThis rule detects the creation of scheduled tasks on Windows systems by non-system accounts, a common technique used by adversaries for persistence, lateral movement, and privilege escalation.
Suspicious Microsoft HTML Application Child Process
2 rules 1 TTPMshta.exe spawning a suspicious child process, such as cmd.exe or powershell.exe, indicates potential adversarial activity leveraging Mshta to execute malicious scripts and evade detection on Windows systems.
Suspicious MSBuild Rename
2 rules 2 TTPsThe analytic detects the execution of renamed instances of msbuild.exe, a legitimate tool abused by attackers to execute malicious code while evading detection, potentially leading to system compromise, data exfiltration, or lateral movement.
Suspicious PowerShell Reconnaissance via WMI Queries
2 rules 2 TTPsDetection of suspicious PowerShell activity using Windows Management Instrumentation (WMI) to gather system information, indicative of reconnaissance efforts by adversaries potentially leading to further exploitation or lateral movement.
Suspicious RDP Client Image Load
2 rules 1 TTPThe rule detects suspicious loading of the Remote Desktop Services ActiveX Client (mstscax.dll) from unusual locations, potentially indicating RDP lateral movement on Windows systems.
Suspicious Remote Registry Access via SeBackupPrivilege
2 rules 3 TTPsDetection of remote registry access by an account with SeBackupPrivilege, potentially indicating credential exfiltration attempts via SAM registry hive dumping.
Suspicious Svchost.exe Child Process: cmd.exe
2 rules 2 TTPsDetection of cmd.exe being spawned by svchost.exe, which is an unusual behavior indicative of potential masquerading or privilege escalation attempts on Windows systems.
Suspicious Unshare Usage for Container Escape and Privilege Escalation
2 rules 2 TTPsThe rule identifies suspicious usage of unshare to manipulate system namespaces, which can be utilized to escalate privileges or escape container security boundaries.
Suspicious Unshare Usage for Namespace Manipulation
2 rules 2 TTPsThe `unshare` command is used to create new namespaces in Linux, which can be exploited to break out of containers or elevate privileges by creating namespaces that bypass security controls.
Suspicious Wevtutil Usage for Clearing Windows Event Logs
2 rulesDetection of wevtutil.exe being used with parameters to clear event logs, indicating potential attempts to evade detection and hinder forensic investigations by adversaries.
Sysmon Driver Unload via fltMC.exe
2 rules 1 TTPDetection of the Sysmon filter driver being unloaded via `fltMC.exe`, which can blind security monitoring and allow malicious actions to go undetected.
TencentCloudBase CloudBase-MCP Server-Side Request Forgery Vulnerability (CVE-2026-7221)
2 rules 1 CVEA server-side request forgery vulnerability exists in TencentCloudBase CloudBase-MCP up to version 2.17.0, allowing remote attackers to manipulate the `req.body.url` argument in the `openUrl` function of `mcp/src/interactive-server.ts` to conduct SSRF attacks.
Tenda F456 Remote Buffer Overflow Vulnerability
2 rules 1 TTP 1 CVEA remote buffer overflow vulnerability exists in Tenda F456 version 1.0.0.5 via manipulation of the 'page' argument in the fromDhcpListClient function of the /goform/DhcpListClient component, potentially leading to arbitrary code execution.
Tenda FH1202 Stack-Based Buffer Overflow Vulnerability (CVE-2026-7034)
1 rule 1 TTP 1 CVEA stack-based buffer overflow vulnerability exists in the Tenda FH1202 router, specifically in the WrlExtraSet function, allowing remote attackers to execute arbitrary code by manipulating the 'Go' argument in a request to /goform/WrlExtraSet.
Unauthorized Guest User Invitations in Azure AD
2 rules 3 TTPsDetection of unauthorized guest user invitations within an Azure Active Directory tenant, indicating potential privilege escalation, persistence, or initial access attempts.
Unusual Child Process from a System Virtual Process
2 rules 1 TTPA suspicious child process of the Windows virtual system process is detected, potentially indicating code injection and defense evasion.
Unusual Process Writing Data to an External Device via Machine Learning
2 rules 1 TTPA machine learning job detects a rare process writing data to an external device, potentially indicating data exfiltration masked by benign-looking processes.
User Account ServicePrincipalName Attribute Modified
2 rules 2 TTPsDetection of modifications to the servicePrincipalName attribute on user accounts, potentially exposing them to Kerberoasting attacks by allowing attackers to request Kerberos tickets for the account.
Vvveb Authenticated Remote Code Execution via .htaccess Upload (CVE-2026-41934)
2 rules 1 TTP 1 CVEVvveb versions before 1.0.8.2 are vulnerable to authenticated remote code execution (RCE), enabling low-privilege users to execute arbitrary code by uploading a malicious .htaccess file and subsequently uploading PHP code with a mapped extension, resulting in unauthenticated RCE upon file access.
WeKan SSRF Vulnerability in Webhook Integration
2 rules 1 TTP 1 CVEWeKan before 8.35 is vulnerable to server-side request forgery (SSRF), allowing attackers with integration modification privileges to set webhook URLs to internal network addresses, leading to unauthorized HTTP POST requests and potential comment manipulation.
Windows Admin Account Brute Force Detection
2 rules 2 TTPsThis rule identifies potential password guessing/brute force activity from a single source IP targeting multiple Windows accounts with 'admin' in the username, indicating an attempt to compromise privileged accounts.
Windows Audit Policy Security Descriptor Tampering via Auditpol
2 rules 1 TTPDetection of `auditpol.exe` execution with arguments to modify the audit policy security descriptor, indicative of defense evasion by adversaries aiming to limit audit logging.
Windows Command Obfuscation via Environment Variable Substrings
2 rules 1 TTPAttackers obfuscate commands in Windows by dynamically constructing them using substrings extracted from environment variables, a technique observed in malware families such as Cobalt Strike and Meterpreter.
Windows Defender Firewall and Network Protection Disabled via Registry Modification
2 rules 1 TTPAn attacker modifies the Windows registry to disable the Windows Defender Firewall and Network Protection settings, potentially weakening the system's security posture and increasing vulnerability to further attacks.
Windows Defender PUA Protection Disabled via Registry Modification
2 rulesAn attacker modifies the Windows Registry to disable Windows Defender Potentially Unwanted Application (PUA) protection, increasing the risk of malware installation and system compromise.
Windows Defender Quick Scan Interval Modification
2 rules 1 TTPDetection of modifications to the Windows registry that change the Windows Defender Quick Scan Interval, potentially impairing its ability to detect malware promptly.
Windows Defender SmartScreen Level Downgrade to 'Warn'
2 rules 1 TTPThis analytic detects modifications to the Windows Registry to set Windows Defender SmartScreen level to 'Warn', which can reduce user suspicion and increase the risk of malware execution.
Windows Event Logs Cleared
2 rules 1 TTPAttackers attempt to clear Windows event logs to evade detection and remove forensic evidence of their activities.
Windows HVCI Disabled via Registry Modification
2 rules 1 TTP 1 CVEDetection of Hypervisor-protected Code Integrity (HVCI) being disabled by modifying specific Windows registry keys, potentially allowing the execution of malicious kernel-mode code.
Windows Peripheral Device Discovery via fsutil
2 rules 1 TTPAdversaries may use the Windows file system utility, fsutil.exe, with the fsinfo drives command to enumerate attached peripheral devices and gain information about a compromised system.