January 2024 (30)
Unusual Process Connecting to Docker or Containerd Socket
2 rules 3 TTPsAn unusual process connecting to a container runtime Unix socket like Docker or Containerd can indicate an attacker attempting to bypass Kubernetes security measures for container manipulation.
Unusual Scheduled Task Update
2 rules 1 TTPThis rule detects modifications to scheduled tasks by user accounts, excluding system activity and machine accounts, which adversaries can exploit for persistence by modifying them to execute malicious code.
Unusual System Utilities Initiating Network Connections
2 rules 3 TTPsAdversaries may leverage unusual system utilities such as Microsoft.Workflow.Compiler.exe, bginfo.exe, cdb.exe, cmstp.exe, csi.exe, dnx.exe, fsi.exe, ieexec.exe, iexpress.exe, odbcconf.exe, rcsi.exe and xwizard.exe to execute code and evade detection, as identified by network connections originating from these processes.
Unusual Windows Processes Connecting to Domains Using Free SSL Certificates
2 rules 1 TTP 4 IOCsThis rule identifies unusual Windows processes connecting to domains using known free SSL certificates such as Let's Encrypt, which adversaries may use to conceal command and control traffic.
User Added to Privileged Group in Active Directory
2 rules 1 TTPAdversaries may add a user to a privileged group in Active Directory, such as Domain Admins, to maintain persistent access and elevate privileges within the domain.
User Removed from Group with Conditional Access Policy Modification Access
2 rules 3 TTPsAn attacker removes a user from a privileged Azure Active Directory group with permissions to modify Conditional Access policies, potentially leading to privilege escalation, persistence, or defense evasion.
vm2 NodeVM require.root Bypass via Symlink Traversal
2 rules 2 TTPsA vulnerability exists in vm2 version 3.10.5 where NodeVM's `require.root` path restriction can be bypassed using filesystem symlinks, allowing sandboxed code to load modules from outside the allowed root directory in host context, leading to remote code execution.
vm2 Sandbox Escape via Promise Constructor Unhandled Rejection
2 rules 1 TTP 1 CVEA sandbox escape vulnerability exists in vm2 versions 3.10.5 and earlier that allows sandboxed code to crash the host Node.js process via a Promise constructor that triggers an unhandled rejection, leading to a denial-of-service condition.
Weaver E-cology Arbitrary File Read Vulnerability (CVE-2022-50992)
2 rules 1 TTP 1 CVEUnauthenticated remote attackers can exploit an arbitrary file read vulnerability (CVE-2022-50992) in Weaver E-cology 9.5 versions prior to 10.52 via the XML-RPC endpoint to access sensitive files.
Weaver E-office Unauthenticated Arbitrary File Upload Vulnerability
2 rules 2 TTPs 1 CVEWeaver E-office versions prior to 10.0_20221201 are vulnerable to unauthenticated arbitrary file upload in the OfficeServer.php endpoint, allowing attackers to upload PHP webshells and achieve remote code execution.
WebPros cPanel & WHM and WP2 Authentication Bypass Vulnerability (CVE-2026-41940)
2 rules 1 TTP 1 CVECVE-2026-41940 is an authentication bypass vulnerability in WebPros cPanel & WHM and WP2 (WordPress Squared) that allows unauthenticated remote attackers to gain unauthorized access to the control panel.
Werfault ReflectDebugger Persistence via Registry Modification
2 rules 2 TTPsAttackers may establish persistence by modifying the ReflectDebugger registry key associated with Windows Error Reporting to execute arbitrary code when Werfault is invoked with the '-pr' parameter.
wger CSV/TSV Formula Injection Vulnerability
2 rules 1 TTP 3 IOCsA CSV/TSV injection vulnerability exists in wger <= 2.5, allowing malicious gym members to inject spreadsheet formulas into their profiles, which are then executed when an administrator exports and opens the member list, potentially leading to data exfiltration and remote code execution.
Windows .Key File Creation in Root Directory
2 rules 1 TTPThis search detects the creation of a .key file in the root directory of the system drive, an activity associated with ransomware execution before file encryption.
Windows AD Domain Controller Audit Policy Disabled
2 rules 1 TTPDetection of disabled audit policies on a Windows domain controller by monitoring Windows Security Event Logs for EventCode 4719, indicative of an attacker attempting to evade detection and potentially leading to data theft, privilege escalation, and full network compromise.
Windows AD GPO Disabled
3 rules 1 TTPDetection of Active Directory Group Policy being disabled using the Group Policy Management Console, potentially indicating malicious attempts to weaken security controls.
Windows AppCertDLL Registry Modification via Command Line
2 rules 2 TTPsAttackers modify the AppCertDLL registry key via command-line utilities to load malicious DLLs during system startup, achieving persistence and privilege escalation.
Windows Application Hotkey Disablement via Registry Modification
2 rules 1 TTPAttackers disable Windows application hotkeys by modifying specific registry entries to hinder incident response and evade detection.
Windows Attempt to Stop Security Service
2 rules 1 TTPAn attacker attempts to stop security services on a Windows endpoint using sc.exe, net.exe, or PowerShell Stop-Service cmdlet to weaken defenses for further malicious activity.
Windows Audit Policy Cleared via Auditpol
2 rules 1 TTPThe execution of `auditpol.exe` with the `/clear` or `/remove` command-line arguments indicates potential defense evasion by adversaries or Red Teams, aiming to limit data that can be leveraged for detections and audits, potentially leading to full machine compromise or lateral movement.
Windows Audit Policy Disabled
3 rulesDetection of disabled important audit policies via Windows EventCode 4719, indicating potential attacker attempts to evade detection on a compromised domain controller, leading to data theft, privilege escalation, and network compromise.
Windows Audit Policy Disabled via Legacy Auditpol
2 rules 1 TTPAdversaries may disable Windows audit policies using the legacy auditpol.exe utility to evade detection by limiting the data available for security monitoring and incident response.
Windows Audit Policy Exclusion via Auditpol
2 rules 1 TTPAdversaries may attempt to disable or modify security tools to evade detection; this analytic identifies the execution of `auditpol.exe` with the `/set` and `/exclude` command-line arguments to exclude specific users' events from audit logs, potentially evading detection and enabling further malicious activities.
Windows Auditpol ResourceSACL Clearing for Defense Evasion
2 rulesAdversaries may clear the global object access auditing policy using `auditpol.exe` with the `/resourceSACL` flag and either `/clear` or `/remove` arguments to evade detection by removing audit configurations.
Windows AutoLogger Session Disabled via Registry Modification
2 rules 1 TTPAn attacker disables Windows AutoLogger sessions by modifying specific registry values to evade defenses and blind EDR and log ingest tools.
Windows Control Panel Disabled via Registry Modification
2 rules 2 TTPsThis analytic detects registry modifications that disable the Control Panel on Windows systems by monitoring changes to the registry path '*\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoControlPanel' with a value of '0x00000001', which is commonly used by malware to prevent users from accessing the Control Panel and hindering remediation efforts.
Windows Defender Antivirus Disabled via Registry Modification
2 rules 1 TTPAttackers modify Windows Defender registry settings to disable antivirus and antispyware protections, evading detection and maintaining persistence.
Windows Defender Application Guard Auditing Disabled via Registry Modification
2 rules 1 TTPAttackers modify the Windows Registry to disable auditing for Windows Defender Application Guard, hindering security monitoring and enabling malicious activity to go unnoticed.
Windows Defender ASR or Threat Configuration Tampering
2 rules 1 TTPAdversaries tamper with Windows Defender's Attack Surface Reduction (ASR) rules or threat default actions using Add-MpPreference or Set-MpPreference commands, aiming to bypass the security tool for undetected malicious code execution.
Windows Defender BlockAtFirstSeen Feature Disabled via Registry Modification
2 rulesAn attacker modifies the Windows Registry to disable the Windows Defender BlockAtFirstSeen feature, potentially allowing malware to bypass initial detection and increasing the risk of system compromise.