Skip to content
Threat Feed

Product

Elastic Endgame

20 briefs RSS
medium advisory

Suspicious Windows PowerShell Arguments Detected

This rule identifies the execution of PowerShell with suspicious argument values, often observed during malware installation, by detecting unusual PowerShell arguments indicative of abuse, focusing on patterns like encoded commands, suspicious downloads, and obfuscation techniques.

Elastic Defend +5 powershell malware execution
3r 4t
medium advisory

Potential NetNTLMv1 Downgrade Attack via Registry Modification

This brief details a registry modification attack that downgrades the system to NTLMv1 authentication, enabling NetNTLMv1 downgrade attacks, typically performed with local administrator privileges on Windows systems.

Microsoft Defender XDR +2 defense-evasion ntlm registry-modification windows
2r 2t
medium advisory

DNS Global Query Block List Modified or Disabled

Attackers with DNSAdmin privileges can modify or disable the DNS Global Query Block List (GQBL) in Windows, allowing exploitation of hosts running WPAD with default settings for privilege escalation and lateral movement.

Elastic Defend +4 defense-evasion registry-modification windows
2r 3t
medium advisory

Network-Level Authentication (NLA) Disabled via Registry Modification

Adversaries may disable Network-Level Authentication (NLA) by modifying specific registry keys to bypass authentication requirements for Remote Desktop Protocol (RDP) and enable persistence mechanisms.

Microsoft Defender XDR +4 defense-evasion lateral-movement registry-modification windows
2r 2t
high advisory

Suspicious Managed Code Hosting Process

This rule detects suspicious managed code hosting processes on Windows systems, potentially indicating code injection or defense evasion tactics by monitoring file events associated with processes commonly used to host managed code, such as wscript.exe, cscript.exe, and mshta.exe.

M365 Defender +3 defense-evasion windows managed code lolbin
2r 1t
high advisory

Potential Remote Install via MsiExec

This rule detects attempts to install a file from a remote server using MsiExec, which adversaries may abuse to deliver malware, by identifying msiexec.exe processes running with arguments indicative of remote installations and executed from suspicious parent processes.

Microsoft Defender XDR +3 defense-evasion windows msiexec remote-install
2r 1t
low advisory

Potential Exploitation of an Unquoted Service Path Vulnerability

This rule detects potential exploitation of unquoted service path vulnerabilities, where adversaries may escalate privileges by placing a malicious executable in a higher-level directory within the path of an unquoted service executable.

Microsoft Defender XDR +4 privilege-escalation unquoted-service-path windows
2r 1t
high advisory

Suspicious Alternate Data Stream (ADS) File Creation

Detects suspicious creation of Alternate Data Streams (ADS) on targeted files using script or command interpreters, indicative of malware hiding in ADS for defense evasion.

M365 Defender +3 defense-evasion ads file-creation windows
2r 1t
medium advisory

First Time Seen Remote Monitoring and Management Tool Execution

Detects the execution of previously unseen remote monitoring and management (RMM) tools or remote access software on compromised Windows endpoints, often leveraged for command-and-control, persistence, and execution of malicious commands.

Elastic Defend +101 remote-access rmm command-and-control persistence
3r
high advisory

Credential Acquisition via Registry Hive Dumping

Detects attempts to export sensitive Windows registry hives (SAM/SECURITY) using reg.exe, potentially leading to credential compromise.

Elastic Endgame +6 credential-access registry-dump windows
2r 1t
high advisory

Renamed Automation Script Interpreter

Detects the renaming of automation script interpreter processes like AutoIt, AutoHotkey, and KIX32, a tactic used by malware operators to evade detection by obscuring the true nature of the executable.

Elastic Defend +1 defense-evasion masquerading autoit autohotkey kix32 windows
2r 1t
medium advisory

Detection of Custom Shim Database Installation for Persistence

Attackers abuse the Application Compatibility Shim functionality in Windows to establish persistence and achieve arbitrary code execution by installing malicious shim databases, which this detection identifies through monitoring registry changes.

Windows +7 persistence app-compat shim
2r 1t
high advisory

Suspicious Antimalware Scan Interface DLL Creation

An adversary may attempt to bypass AMSI by creating a rogue AMSI DLL in an unusual location to evade detection.

Microsoft Defender XDR +4 defense-evasion amsi-bypass dll-hijacking windows
2r 1t
high advisory

Script Execution via Microsoft HTML Application

Detects the execution of scripts via HTML applications using Windows utilities rundll32.exe or mshta.exe to bypass defenses by proxying execution of malicious content with signed binaries.

Windows +8 defense-evasion script-execution
3r 1t
medium advisory

Suspicious Script Object Execution via scrobj.dll

Detection of scrobj.dll loaded into unusual Microsoft processes indicates potential malicious scriptlet execution for defense evasion and execution by abusing legitimate system binaries.

Elastic Defend +3 defense-evasion execution windows
2r 2t
medium advisory

Suspicious Mofcomp Activity

This rule detects suspicious mofcomp.exe activity, which attackers may leverage MOF files to manipulate the Windows Management Instrumentation (WMI) repository for execution and persistence by filtering out legitimate processes and focusing on unusual executions, excluding known safe parent processes and system accounts.

Elastic Defend +4 execution persistence windows
2r 2t
medium advisory

Microsoft Defender Tampering via Registry Modification

Adversaries may disable or tamper with Microsoft Defender features via registry modifications to evade detection and conceal malicious behavior on Windows systems.

Microsoft Defender XDR +4 defense-evasion registry-modification windows
2r 2t
high advisory

Command Obfuscation via Unicode Modifier Letters

Adversaries use Unicode modifier letters to obfuscate command-line arguments, evading string-based detections on common Windows utilities like PowerShell and cmd.exe.

Microsoft Defender XDR +5 defense-evasion command-line unicode obfuscation
2r 1t
medium advisory

Suspicious Unshare Usage for Namespace Manipulation

The `unshare` command is used to create new namespaces in Linux, which can be exploited to break out of containers or elevate privileges by creating namespaces that bypass security controls.

Elastic Defend +3 privilege-escalation container-escape linux
2r 2t
medium advisory

Potential Protocol Tunneling via Yuze

This alert detects potential protocol tunneling activity via the execution of Yuze, a lightweight open-source tunneling tool often used by threat actors for intranet penetration via forward and reverse SOCKS5 proxy tunneling.

Defender XDR +2 command-and-control tunneling yuze proxy
2r 3t