Product
Detection of Wevtutil.exe Used to Disable Event Logs
2 rules 1 TTPThe execution of `wevtutil.exe` with parameters to disable event logs is a tactic commonly employed by ransomware to evade detection and hinder forensic investigations, leading to a significant reduction in visibility for defenders.
PowerShell P/Invoke Process Injection API Chain Detection
2 rules 8 TTPsThis analytic detects PowerShell code that uses P/Invoke to call Windows API functions associated with process injection, such as VirtualAlloc, WriteProcessMemory, and CreateRemoteThread, indicating potential malicious activity.
Suspicious PowerShell Script Using Cryptography Namespace
2 rules 1 TTPThe analytic detects suspicious PowerShell script execution involving the cryptography namespace (excluding SHA and MD5) via EventCode 4104, often associated with malware that decrypts or decodes additional malicious payloads leading to further code execution, privilege escalation, or persistence.
Non-Firefox Process Accessing Firefox Profile Directory
2 rules 1 TTPThis analytic detects non-Firefox processes accessing the Firefox profile directory, potentially indicating malware attempting to harvest sensitive user data like login credentials, browsing history, and cookies.
Windows Time-Based Evasion via Choice Exec
2 rules 1 TTPDetection of choice.exe used in batch files for time-based evasion, a technique observed in SnakeKeylogger malware, indicating potential stealthy code execution and persistence.
Windows Service Security Descriptor Tampering via sc.exe
2 rules 2 TTPsAdversaries may modify service security descriptors to deny access to specific groups, potentially escalating privileges and hindering security services, by using sc.exe to set new deny ACEs (Access Control Entries) on Windows services.
Suspicious MSIExec Remote Download
2 rules 2 TTPsThe analytic detects the execution of msiexec.exe with an HTTP or HTTPS URL, which indicates an attempt to download and execute potentially malicious software from a remote server, leading to potential unauthorized code execution, system compromise, or malware deployment.
Suspicious Child Processes Spawned by WScript or CScript
2 rules 3 TTPsDetects suspicious processes spawned by WScript or CScript, a common technique used by adversaries to execute LOLBINs, PowerShell, or inject code into suspended processes for defense evasion.
Attrib.exe Used to Hide Files and Directories
2 rules 1 TTPDetection of attrib.exe being used with the +h flag to hide files and directories on Windows systems, a technique used by attackers for defense evasion and persistence.
MSIExec Spawning Discovery Commands
2 rules 1 TTPDetection of msiexec.exe spawning discovery commands indicating potential reconnaissance activity by attackers for system information gathering and lateral movement.
Suspicious Process Accessing Browser Password Store
2 rules 1 TTPDetection of non-browser processes accessing browser user data folders, a tactic used by malware such as Snake Keylogger to steal credentials and sensitive information.
Windows Remote Desktop Network Bruteforce Attempt
2 rules 1 TTPThis detection identifies potential RDP brute force attacks by monitoring network traffic for RDP application activity by detecting source IPs that have made more than 10 connection attempts to the same RDP port on a host within a one-hour window.
Windows Netsh Tool Used for Firewall Discovery
2 rules 1 TTPThe analytic detects the execution of the Windows built-in tool netsh.exe to display the state, configuration, and profile of the host firewall, potentially leading to unauthorized network access or data exfiltration.
Windows Files and Dirs Access Rights Modification via Icacls
2 rules 1 TTPDetection of icacls.exe, cacls.exe, or xcacls.exe being used to modify file or directory permissions, often used by APTs and coinminers for defense evasion and persistence.
Unauthorized Access to Chrome Local State File
2 rules 1 TTPDetection of non-Chrome processes accessing the Chrome 'Local State' file, potentially leading to extraction of the master key used for decrypting saved passwords.
Suspicious Process Execution from Unusual File Paths
2 rules 2 TTPsAttackers may execute malicious code from unusual file paths such as Windows fonts or debug directories to evade defenses and gain unauthorized access, as detected by endpoint detection and response (EDR) agents.
Schtasks Run Task On Demand
2 rules 1 TTPDetection of on-demand execution of Windows Scheduled Tasks via the schtasks.exe command-line utility, a common technique for persistence and lateral movement.
Regsvr32 Silent and Install Parameter DLL Loading
2 rules 2 TTPsDetection of regsvr32.exe being used with the silent and DLL install parameter to load a DLL, a technique used by RATs like Remcos and njRAT to execute arbitrary code.
Outbound SMB Traffic Detection
2 rules 1 TTPThis analytic detects outbound SMB connections from internal hosts to external servers, potentially indicating lateral movement and credential theft attempts.
Non-Chrome Process Accessing Chrome Login Data
2 rules 1 TTPThis analytic identifies non-Chrome processes accessing the Chrome user data file 'login data', which is an SQLite database containing sensitive information like saved passwords, potentially leading to credential theft.
Suspicious DNS Queries to Telegram API by Non-Telegram Processes
2 rules 2 TTPs 1 IOCDetection of a process making DNS queries to the Telegram API domain, which is indicative of malware utilizing Telegram bots for command and control (C2) communications.
PowerShell Execution via Environment Variables
2 rules 1 TTPAdversaries use PowerShell to execute malicious code stored in environment variables, leveraging Invoke-Expression or its aliases to bypass static analysis and execute payloads dynamically, as seen in malware loaders and stagers like the VIP Keylogger.
Non-Chrome Process Accessing Chrome Default Directory
2 rules 1 TTPDetection of non-Chrome processes accessing the Chrome user data directory, potentially indicating credential theft or data exfiltration attempts by malware such as RATs or APT groups.
Logon Script Registry Modification for Persistence and Privilege Escalation
2 rules 2 TTPsThis brief details the detection of UserInitMprLogonScript registry entry modifications, a technique employed by threat actors for persistence and privilege escalation by ensuring payloads execute automatically at system startup.
Braodo Stealer Screen Capture in TEMP Directory
2 rules 1 TTPThis analytic detects the creation of screen capture files in the TEMP directory, specifically targeting activity associated with the Braodo stealer malware, which captures screenshots of the victim's desktop as part of its data theft activities.
Suspicious PowerShell Reconnaissance via WMI Queries
2 rules 2 TTPsDetection of suspicious PowerShell activity using Windows Management Instrumentation (WMI) to gather system information, indicative of reconnaissance efforts by adversaries potentially leading to further exploitation or lateral movement.
Large ICMP Traffic Detection
2 rules 1 TTPThis analytic identifies excessive ICMP traffic to external IP addresses exceeding 1,000 bytes, potentially indicating command and control activity, data exfiltration, or covert communication channels.
Detection of IIS HTTP Logging Disabled via AppCmd.exe
2 rules 2 TTPsThis analytic detects the use of AppCmd.exe to disable HTTP logging on IIS servers, allowing adversaries to evade detection by removing evidence of their actions.