Severity
Potential PowerShell Obfuscated Script via High Entropy
2 rules 3 TTPsThis detection identifies potentially obfuscated PowerShell scripts based on high entropy and non-uniform character distributions, often used by attackers to evade signature-based detections and hinder analysis.
Potential Secure File Deletion via SDelete Utility
2 rules 2 TTPsThis rule detects file name patterns generated by the use of Sysinternals SDelete utility, potentially used by attackers to delete forensic indicators and hinder data recovery efforts.
Potential Remote File Execution via MSIEXEC
2 rules 3 TTPsThe rule detects the execution of the built-in Windows Installer, msiexec.exe, to install a remote package potentially abused by adversaries for initial access and defense evasion.
Enumerating Domain Trusts via DSQUERY.EXE
2 rules 2 TTPsAdversaries may use the `dsquery.exe` command-line utility to enumerate trust relationships for lateral movement in Windows multi-domain environments.
Command Shell Activity Started via RunDLL32
2 rules 4 TTPsThis rule detects command shell activity, such as cmd.exe or powershell.exe, initiated by RunDLL32, a technique commonly abused by attackers to execute malicious code and bypass security controls.
Microsoft CVE-2026-30656 Information Published
1 CVEMicrosoft published information regarding CVE-2026-30656, but the details of the vulnerability are not available.
Rapid Enumeration of AWS S3 Buckets
2 rules 4 TTPsAn AWS principal rapidly enumerates S3 bucket posture using read-only APIs, indicative of reconnaissance, scanning, or post-compromise activity.
AWS Discovery API Calls via CLI from a Single Resource
2 rules 2 TTPsThis rule detects when a single AWS identity executes more than five unique discovery-related API calls (Describe*, List*, Get*, or Generate*) within a 10-second window using the AWS CLI, potentially indicating reconnaissance activity following credential compromise or compromised EC2 instance access.
Microsoft CVE-2026-35236 Information Published
2 rulesMicrosoft has published information regarding CVE-2026-35236, but no details about the vulnerability or its exploitation are currently available.
AWS S3 Rapid Bucket Posture API Calls Indicate Reconnaissance
2 rules 4 TTPsAn AWS principal rapidly enumerates S3 bucket configurations using read-only APIs, potentially indicating reconnaissance activity by security scanners, CSPM tools, or malicious actors performing post-compromise enumeration.
AWS SSM Command Document Created by Rare User
2 rules 1 TTPAn AWS Systems Manager (SSM) command document creation by a user or role who does not typically perform this action, which can lead to unauthorized access, command and control, or data exfiltration.
Kubernetes Secret Access via Unusual User Agent
2 rules 1 TTPDetects unusual access to Kubernetes secrets, potentially indicating an attacker attempting to steal sensitive information after gaining initial access to the cluster.
Unusual City for Azure Activity Logs Event
2 rules 3 TTPsA machine learning job detected Azure Activity Logs activity that, while not inherently suspicious or abnormal, is sourcing from a geolocation (city) that is unusual for the event action, indicating potential compromised credentials.
Spike in Successful Logon Events from a Source IP
2 rules 3 TTPsA machine learning job detected a spike in successful authentication events from a source IP address, which can indicate password spraying, user enumeration, or brute force activity, potentially leading to credential access.
Unusual Spike in Bytes Written to External Device Detected by Machine Learning
2 rules 1 TTPA machine learning job has detected a spike in bytes written to an external device, which is anomalous and can signal illicit data copying or transfer activities, potentially leading to data exfiltration.
Kubectl Network Configuration Modification
3 rules 2 TTPsThis rule detects potential kubectl network configuration modification activity by monitoring for process events where the kubectl command is executed with arguments that suggest an attempt to modify network configurations in Kubernetes, potentially leading to unauthorized access or data exfiltration.
CrowdStrike Falcon Flex for Services Expansion
3 rules 2 TTPsCrowdStrike is expanding its Falcon Flex model to include its services, offering flexible consumption of expert-led cybersecurity services including incident response and proactive security measures.
SOC Analyst Toolkit with Threat Hunting Queries
2 rules 1 TTP 2 IOCsA free, offline SOC toolkit aimed at Tier 1 analysts includes IR checklists, triage playbooks, and threat hunting guides mapped to MITRE ATT&CK, with Splunk and Elastic queries for threats such as Kerberoasting, Pass-the-Hash, LOLBAS, scheduled task persistence, and C2 on non-standard ports.
JPCERT/CC Study on Reverse Engineering Rust Binaries
2 rulesJPCERT/CC published a study on the reverse engineering of binaries created with the Rust programming language, providing insights for malware analysis and detection engineering.
AWS STS Role Assumption by User
2 rules 2 TTPsDetection of a user assuming a role in AWS Security Token Service (STS) to obtain temporary credentials, which can indicate privilege escalation or lateral movement.
Unusual Spike in Okta User Lifecycle Management Change Events
2 rules 4 TTPsA machine learning job has identified an unusual spike in Okta user lifecycle management change events, indicating potential privileged access activity where threat actors may manipulate user accounts to gain higher access rights or persist within the environment.
New AWS Network ACL Entry Creation Detected
2 rules 1 TTPDetection of new Network ACL entries in AWS CloudTrail logs can indicate potential defense impairment or the opening of new attack vectors within an AWS account by an adversary.
Suspicious DNS-Named Record Creation in Active Directory Integrated DNS
2 rules 1 TTPDetection of DNS record creation by non-system accounts within Active Directory Integrated DNS (ADIDNS), which attackers can abuse to perform Dynamic Spoofing attacks, potentially targeting services like WPAD for credential access.
Potential Data Exfiltration to Unusual Geographic Region via Machine Learning
2 rules 1 TTPA machine learning job has detected potential data exfiltration activity to an unusual geographical region, specifically by region name, indicating exfiltration over command and control channels.
Unusual Remote File Size Indicating Lateral Movement
2 rules 3 TTPsA machine learning job has detected an unusually high file size shared by a remote host, indicating potential lateral movement as attackers bundle data into a single large file transfer to evade detection when exfiltrating valuable information.
GitHub Push Protection Bypass Detection
2 rulesDetection of a GitHub user bypassing push protection, potentially leading to the exposure of secrets.
Bitbucket Project Secret Scanning Allowlist Added
2 rulesAn adversary may impair defenses by adding a secret scanning allowlist rule for Bitbucket projects, potentially allowing secrets to be committed and exposed.
Spike in Number of RDP Connections from a Single Source IP
2 rules 2 TTPsA machine learning job detected a high count of destination IPs establishing RDP connections with a single source IP, indicating potential lateral movement attempts after initial compromise.
Netsh Helper DLL Persistence
2 rules 2 TTPsAttackers may abuse the Netsh Helper DLL functionality by adding malicious DLLs to execute payloads every time the netsh utility is executed via administrators or scheduled tasks, achieving persistence.
Detection of New GitHub Actions Secrets Creation
3 rules 3 TTPsThis analytic detects the creation of new GitHub Actions secrets at the organization, environment, codespaces, or repository level, potentially indicating malicious persistence or privilege escalation.
MsXsl.exe Network Connection for Defense Evasion
2 rules 2 TTPsMsxsl.exe, a legitimate Windows utility, is being abused by adversaries to make network connections to non-local IPs for command and control or data exfiltration, potentially bypassing security measures.
Potential Exploitation of an Unquoted Service Path Vulnerability
2 rules 1 TTPThis rule detects potential exploitation of unquoted service path vulnerabilities, where adversaries may escalate privileges by placing a malicious executable in a higher-level directory within the path of an unquoted service executable.
Microsoft Office 'Office Test' Registry Persistence Abuse
2 rules 2 TTPsAttackers modify the Microsoft Office 'Office Test' Registry key to achieve persistence by specifying a malicious DLL that executes upon application startup.
Group Policy Discovery via Microsoft GPResult Utility
2 rules 1 TTPDetects the execution of `gpresult.exe` with arguments `/z`, `/v`, `/r`, or `/x` on Windows systems, which attackers may use during reconnaissance to enumerate Group Policy Objects and identify opportunities for privilege escalation or lateral movement.
Detection of Malicious Browser Extension Installation
2 rulesThis rule identifies the installation of potentially malicious browser extensions, which adversaries can leverage for persistence and unauthorized activity by monitoring file creation events in common browser extension directories on Windows systems.
Unusually High Mean of RDP Session Duration Detected by Machine Learning
3 rules 2 TTPsA machine learning job detected an unusually high mean of RDP session duration, indicative of potential lateral movement or persistent access attempts by adversaries abusing RDP.
Unusual Group Name Accessed by User via Privileged Access Detection
2 rules 5 TTPsA machine learning job detected a user accessing an uncommon group name for privileged operations, potentially indicating privilege escalation or unauthorized account manipulation on a Windows system.
Spike in Number of Processes in an RDP Session
2 rules 2 TTPsA machine learning job has detected an unusually high number of processes started within a single Remote Desktop Protocol (RDP) session, potentially indicating lateral movement activity.
Windows Defender Disabled via Registry Modification
2 rules 3 TTPsAttackers modify the Windows Defender registry settings to disable the service or set the service to be started manually, evading defenses.
Unusual Process Spawned by a Parent Process via Machine Learning
2 rules 2 TTPsA machine learning job detected a suspicious Windows process, predicted malicious by the ProblemChild model and flagged as an unusual child process name for its parent, potentially indicating LOLbins usage and evading traditional detection.
Okta User Account Created
2 rules 1 TTPDetection of new user account creation in Okta, which could indicate malicious activity related to credential access.
Unusual Remote File Directory Lateral Movement Detection
2 rules 2 TTPsAn Elastic machine learning job detects anomalous remote file transfers to unusual directories, indicating potential lateral movement by attackers attempting to bypass standard security monitoring.
NLTEST.EXE Used for Domain Trust Discovery
2 rules 2 TTPsAdversaries may use the `nltest.exe` command-line utility to enumerate domain trusts and gain insight into trust relationships to facilitate lateral movement within a Microsoft Windows NT Domain.
Uncommon Destination Port Connection by Web Server on Linux
2 rules 4 TTPsThe rule identifies unusual outbound network connections on non-standard ports originating from web server processes on Linux systems, indicative of potential web shell activity or unauthorized communication.
Potential DGA Activity Detected by Machine Learning
2 rules 2 TTPsA machine learning job detected potential DGA (domain generation algorithm) activity indicative of malware command and control (C2) channels, identifying source IP addresses making DNS requests with a high probability of being DGA-generated, a technique used by adversaries to evade detection.
Account Discovery Command via SYSTEM Account
3 rules 3 TTPsThe rule identifies when the SYSTEM account uses an account discovery utility, potentially indicating discovery activity after privilege escalation, focusing on utilities like whoami.exe and net1.exe executed under the SYSTEM account.
Okta Group Lifecycle Change Spike Indicating Privilege Escalation
2 rules 4 TTPsA machine learning job has identified an unusual spike in Okta group lifecycle change events, indicating potential privilege escalation activity, where adversaries may be altering group structures to escalate privileges, maintain persistence, or facilitate lateral movement within an organization’s identity management system.
Unusual Source IP for Okta Privileged Operations Detected
2 rules 3 TTPsA machine learning job has identified a user performing privileged operations in Okta from an uncommon source IP, indicating potential privileged access activity indicative of account compromise or privilege escalation.
Suspicious PDF Reader Child Process Activity
2 rules 13 TTPsAdversaries may exploit PDF reader applications to execute arbitrary commands and establish a foothold within a system, often launching built-in utilities for reconnaissance and privilege escalation.
GitHub Repository Archive Status Changed
2 rules 3 TTPsDetection of GitHub repository archiving or unarchiving events, which could indicate malicious activity such as persistence, impact, or defense impairment.
Unusual Time or Day for an RDP Session Detected by Machine Learning
2 rules 2 TTPsA machine learning job detected an RDP session initiated at an unusual time or day, potentially indicating lateral movement activity within a network.
Suspicious Windows Process Cluster Detection via Machine Learning
2 rules 2 TTPsA machine learning job combination has identified a host with one or more suspicious Windows processes that exhibit unusually high malicious probability scores, potentially indicating masquerading and defense evasion tactics.
Windows Account Discovery of Administrator Accounts
2 rules 4 TTPsAdversaries may execute the `net.exe` or `wmic.exe` commands to enumerate administrator accounts or groups, both locally and within the domain, to gather information for follow-on actions.
Spike in Bytes Sent to an External Device via Airdrop
2 rules 1 TTPA machine learning job has detected a spike in bytes of data written to an external device via Airdrop, potentially indicating illicit data copying or transfer activities.
High Command Line Entropy Detected for Privileged Commands on Linux
2 rules 2 TTPsA machine learning job has identified an unusually high median command line entropy for privileged commands executed by a user on Linux systems, suggesting possible privileged access activity through command lines, indicating potential obfuscation or unauthorized use of privileged access.
Unusual Remote File Extension Detected via Machine Learning
2 rules 2 TTPsAn Elastic machine learning rule detects unusual remote file transfers with rare extensions, potentially indicating lateral movement activity on a host and suggesting adversaries bypassing security measures.
Spike in Special Privilege Use Events
2 rules 4 TTPsA machine learning job detected an unusual increase in special privilege usage events on Windows, such as privileged operations and service calls, potentially indicating unauthorized privileged access and privilege escalation attempts.
Machine Learning Detects High Bytes Written to External Device
2 rules 1 TTPA machine learning job has detected high bytes of data written to an external device, potentially indicating illicit data copying or transfer activities leading to data exfiltration over a physical medium such as USB.
Detection of Command and Control Activity via Common Web Services
2 rules 1 TTPThis rule detects command and control (C2) communications that use common web services to hide malicious activity on Windows hosts by identifying network connections to commonly abused web services from processes outside of known legitimate program locations, indicating potential exfiltration or C2 activity blended with legitimate traffic.
GitHub Self-Hosted Runner Configuration Changes Detected
3 rules 8 TTPsDetection of changes to self-hosted runner configurations in GitHub environments can indicate potential impact, discovery, collection, persistence, privilege escalation, initial access, or stealth activities.
Windows User Account Creation via Net.exe
2 rules 2 TTPsThis rule identifies attempts to create new users on Windows systems using net.exe, a common tactic used by attackers to increase access or establish persistence.
MSBuild Process Injection Detection
2 rules 3 TTPsThe Microsoft Build Engine (MSBuild) is being abused to perform process injection by creating threads in other processes, a technique used to evade detection and potentially escalate privileges.
Windows USN Journal Deletion via Fsutil
2 rules 1 TTPAdversaries may delete the volume USN Journal on Windows systems using `fsutil.exe` to eliminate evidence of post-exploitation file activity.
Werfault ReflectDebugger Persistence via Registry Modification
2 rules 2 TTPsAttackers may establish persistence by modifying the ReflectDebugger registry key associated with Windows Error Reporting to execute arbitrary code when Werfault is invoked with the '-pr' parameter.
Unusual Windows Processes Connecting to Domains Using Free SSL Certificates
2 rules 1 TTP 4 IOCsThis rule identifies unusual Windows processes connecting to domains using known free SSL certificates such as Let's Encrypt, which adversaries may use to conceal command and control traffic.
Unusual System Utilities Initiating Network Connections
2 rules 3 TTPsAdversaries may leverage unusual system utilities such as Microsoft.Workflow.Compiler.exe, bginfo.exe, cdb.exe, cmstp.exe, csi.exe, dnx.exe, fsi.exe, ieexec.exe, iexpress.exe, odbcconf.exe, rcsi.exe and xwizard.exe to execute code and evade detection, as identified by network connections originating from these processes.
Unusual Scheduled Task Update
2 rules 1 TTPThis rule detects modifications to scheduled tasks by user accounts, excluding system activity and machine accounts, which adversaries can exploit for persistence by modifying them to execute malicious code.
Unusual Persistence via Services Registry Modification
2 rules 3 TTPsDetection of processes modifying the Windows services registry key directly, potentially indicating stealthy persistence attempts via abnormal service creation or modification.
Suspicious Whoami Process Activity
2 rules 2 TTPsThis rule detects suspicious use of whoami.exe to display user, group, and privileges information for the user who is currently logged on to the local system, potentially indicating post-compromise discovery activity.
Suspicious Use of sc.exe for Remote Service Manipulation
3 rules 3 TTPsThe rule identifies the use of sc.exe to create, modify, or start services on remote hosts, potentially indicating lateral movement by adversaries.
Suspicious SMTP Activity on Port 26/TCP
2 rules 3 TTPsThis rule detects SMTP traffic on TCP port 26, an alternative to the standard port 25 that the BadPatch malware family has used for command and control of Windows systems.
Suspicious Image Load (taskschd.dll) from MS Office
2 rules 2 TTPsDetection of taskschd.dll image loads from Microsoft Office applications indicates potential COM-based scheduled task creation for persistence, bypassing traditional schtasks.exe usage.
Suspicious Execution via Windows Subsystem for Linux
2 rules 3 TTPsAdversaries may leverage the Windows Subsystem for Linux (WSL) to execute malicious Linux commands, bypassing traditional Windows security measures, detected by monitoring process execution and command-line arguments.
Startup or Run Key Registry Modification
3 rules 2 TTPsAttackers modify registry run keys or startup keys to achieve persistence by referencing a program that executes when a user logs in or the system boots.
PsExec Lateral Movement via Network Connection
2 rules 3 TTPsThe rule identifies the use of PsExec.exe making a network connection, indicative of potential lateral movement by adversaries executing commands with SYSTEM privileges on Windows systems to disable defenses.
Okta Policy Modification or Deletion Detected
2 rules 1 TTPAn Okta policy was modified or deleted, potentially indicating unauthorized changes to security configurations within the Okta identity management platform by a malicious actor or insider.
Okta Group Application Assignment Spike Indicates Privilege Escalation
2 rules 4 TTPsA machine learning job identified a spike in Okta group application assignment changes, potentially indicating threat actors escalating privileges, maintaining persistence, or moving laterally by assigning applications to groups.
LOLBIN Network Connection for Defense Evasion
2 rules 1 TTPAdversaries can use Living-Off-The-Land Binaries (LOLBINs) such as expand.exe, extrac32.exe, ieexec.exe, and makecab.exe to establish network connections, potentially bypassing security controls and facilitating malicious activities on Windows systems.
Ingress Transfer via Windows BITS
2 rules 2 TTPsAdversaries may leverage Windows Background Intelligent Transfer Service (BITS) to download executable and archive files to evade defenses and establish command and control.
Execution from Removable Media with Network Connection
2 rules 1 TTPDetects process execution from removable media by an unusual process with untrusted code signature followed by network connection attempts, potentially indicating malware introduced via removable media for initial access.
DNS-over-HTTPS Enabled via Registry Modification
3 rules 2 TTPsDetection of DNS-over-HTTPS (DoH) being enabled via registry modifications on Windows systems, potentially indicating defense evasion and obfuscation of network activity by masking DNS queries.
Component Object Model (COM) Hijacking via Registry Modification
2 rules 4 TTPsAdversaries may establish persistence by executing malicious content triggered by hijacked references to COM objects through Component Object Model (COM) hijacking via registry modification on Windows systems.
Active Directory Discovery via ADExplorer Execution
2 rules 5 TTPsDetects the execution of ADExplorer, a tool used for Active Directory viewing and editing, which can be abused by adversaries for domain reconnaissance and creating offline snapshots of the AD database.
Unusual Process Spawned by a User Detected by Machine Learning
2 rules 2 TTPsA machine learning job detected a suspicious Windows process, predicted to be malicious by the ProblemChild supervised ML model and found to be unusual within the user's context, potentially indicating defense evasion techniques like masquerading or the use of LOLbins.
ProblemChild ML Model Detects Unusual Process on Windows Host
2 rules 1 TTPThe ProblemChild machine learning model detected a rare Windows process indicative of defense evasion, potentially involving LOLbins, on a host not commonly associated with malicious activity.
Adding Hidden File Attribute via Attrib.exe
2 rules 2 TTPsAdversaries can use attrib.exe to add the 'hidden' attribute to files to hide them from users and evade detection, which can be detected by monitoring process executions related to attrib.exe.
Unusual Source IP for Windows Privileged Operations Detected via ML
2 rules 2 TTPsA machine learning job detected a user performing privileged operations in Windows from an uncommon source IP, potentially indicating account compromise or privilege escalation.
Unusual Privilege Type Assigned to User via Machine Learning Anomaly
2 rules 4 TTPsA machine learning job has identified a user leveraging an uncommon privilege type for privileged operations on Windows systems, potentially indicating privileged access activity and requiring investigation for privilege escalation or account manipulation.
Unusual Host Name for Windows Privileged Operations Detected via ML
2 rules 2 TTPsA machine learning job has identified a user performing privileged operations in Windows from an uncommon device, indicating potential privileged access activity associated with compromised accounts or insider threats.
Windows Delayed Execution via Ping Followed by Malicious Utilities
2 rules 14 TTPsAdversaries may use ping to delay execution of malicious commands, scripts, or binaries to evade detection, often observed during malware installation.
First Time Seen Removable Device Registry Modification
2 rules 2 TTPsDetection of newly seen removable devices via Windows registry modification events can indicate data exfiltration attempts or initial access via malicious USB drives.
Windows Scheduled Task Creation for Persistence
3 rules 1 TTPAdversaries may create scheduled tasks on Windows systems to establish persistence, move laterally, or escalate privileges, and this detection identifies such activity by monitoring Windows event logs for scheduled task creation events, excluding known benign tasks and those created by system accounts.
Windows Peripheral Device Discovery via fsutil
2 rules 1 TTPAdversaries may use the Windows file system utility, fsutil.exe, with the fsinfo drives command to enumerate attached peripheral devices and gain information about a compromised system.
Windows Event Logs Cleared
2 rules 1 TTPAttackers attempt to clear Windows event logs to evade detection and remove forensic evidence of their activities.
Unusual Process Writing Data to an External Device via Machine Learning
2 rules 1 TTPA machine learning job detects a rare process writing data to an external device, potentially indicating data exfiltration masked by benign-looking processes.
Suspicious Local Scheduled Task Creation
2 rules 1 TTPThis rule detects the creation of scheduled tasks on Windows systems by non-system accounts, a common technique used by adversaries for persistence, lateral movement, and privilege escalation.
Suspicious Command Prompt Network Connection
2 rules 4 TTPsThis alert identifies suspicious network connections initiated by the command prompt (cmd.exe) when executed with arguments indicative of script execution, remote resource access, or originating from Microsoft Office applications, which is a common tactic for downloading payloads or establishing command and control.
Suspicious Access to LDAP Attributes
2 rules 3 TTPsThe rule detects suspicious access to LDAP attributes in Active Directory by identifying read access to a high number of Active Directory object attributes, which can help adversaries find vulnerabilities, elevate privileges, or collect sensitive information.
Spike in Remote File Transfers via Lateral Movement
2 rules 2 TTPsA machine learning job detects an abnormal volume of remote file transfers, potentially indicating lateral movement by attackers attempting to blend in with normal network egress activity.
Service Control Executed from Script Interpreters
2 rules 8 TTPsDetection of Service Control (sc.exe) being spawned from script interpreter processes, such as PowerShell or cmd.exe, to create, modify, or start services, which may indicate privilege escalation or persistence attempts by an attacker.
Okta Privileged Operations from Unusual Host Name Detected
2 rules 2 TTPsA machine learning job detected a user performing privileged operations in Okta from an uncommon device, potentially indicating a compromised account or insider threat attempting privilege escalation.
Okta Group Membership Spike Detection
2 rules 4 TTPsA machine learning job has identified an unusual spike in Okta group membership events, indicating potential privileged access activity where attackers or malicious insiders might be adding accounts to privileged groups to escalate their access, potentially leading to unauthorized actions or data breaches.
AdFind Tool Used for Active Directory Reconnaissance
2 rules 5 TTPsThe execution of AdFind.exe, an Active Directory query tool, is often used by threat actors for post-exploitation Active Directory reconnaissance, as observed in campaigns involving Trickbot, Ryuk, Maze, and FIN6.
High Variance in RDP Session Duration Detected via Machine Learning
2 rules 2 TTPsA machine learning job has detected unusually high variance of RDP session duration, potentially indicating lateral movement and session persistence by threat actors.