Tag
Argo Workflows Template Referencing Restriction Bypass
3 rules 2 TTPs 1 CVEArgo Workflows has an incomplete fix for CVE-2026-31892, allowing bypass of templateReferencing restrictions to modify pod specifications, leading to potential privilege escalation and security context overrides.
Potential PowerShell Obfuscated Script via High Entropy
2 rules 3 TTPsThis detection identifies potentially obfuscated PowerShell scripts based on high entropy and non-uniform character distributions, often used by attackers to evade signature-based detections and hinder analysis.
Windows Port Forwarding Rule Addition via Registry Modification
2 rules 3 TTPsAn adversary may abuse port forwarding to bypass network segmentation restrictions by creating a new port forwarding rule through modification of the Windows registry.
Suspicious Zoom Child Process Execution
2 rules 6 TTPsA suspicious Zoom child process was detected, indicating a potential attempt to run unnoticed by masquerading as Zoom.exe or exploiting a vulnerability, resulting in the execution of cmd.exe, powershell.exe, pwsh.exe, or powershell_ise.exe.
Suspicious Execution via Windows Command Debugging Utility
2 rules 2 TTPsAdversaries can abuse the Windows command line debugging utility cdb.exe to execute commands or shellcode from non-standard paths, evading traditional security measures.
SIP Provider Modification for Defense Evasion
2 rules 1 TTPThis rule detects modifications to the registered Subject Interface Package (SIP) providers, which are used by the Windows cryptographic system to validate file signatures, potentially indicating an attempt to bypass signature validation or inject code for defense evasion.
Service DACL Modification via sc.exe
2 rules 2 TTPsDetection of service DACL modifications via `sc.exe` using the `sdset` command, potentially leading to defense evasion by denying service access to legitimate users or system accounts.
Potential Secure File Deletion via SDelete Utility
2 rules 2 TTPsThis rule detects file name patterns generated by the use of Sysinternals SDelete utility, potentially used by attackers to delete forensic indicators and hinder data recovery efforts.
Potential Remote File Execution via MSIEXEC
2 rules 3 TTPsThe rule detects the execution of the built-in Windows Installer, msiexec.exe, to install a remote package potentially abused by adversaries for initial access and defense evasion.
Potential NetNTLMv1 Downgrade Attack via Registry Modification
2 rules 2 TTPsThis brief details a registry modification attack that downgrades the system to NTLMv1 authentication, enabling NetNTLMv1 downgrade attacks, typically performed with local administrator privileges on Windows systems.
Potential Evasion via Windows Filtering Platform Blocking Security Software
2 rules 2 TTPsAdversaries may add malicious Windows Filtering Platform (WFP) rules to prevent endpoint security solutions from sending telemetry data, impairing defenses, which this rule detects by identifying multiple WFP block events where the process name is associated with endpoint security software.
Potential DLL Side-Loading via Trusted Microsoft Programs
2 rules 2 TTPsThis rule detects potential DLL side-loading attempts by identifying instances of Windows trusted programs (WinWord.exe, EXPLORER.EXE, w3wp.exe, DISM.EXE) being started after being renamed or from a non-standard path, which is a common technique to evade defenses by side-loading a malicious DLL into the memory space of a trusted process.
Local Account TokenFilter Policy Modification for Defense Evasion and Lateral Movement
2 rules 4 TTPsAdversaries may modify the LocalAccountTokenFilterPolicy registry key to bypass User Account Control (UAC) and gain elevated privileges remotely by granting high-integrity tokens to remote connections from local administrators, facilitating lateral movement and defense evasion.
Code Signing Policy Modification Through Built-in Tools
2 rules 1 TTPAttackers may attempt to disable or modify code signing policies on Windows systems by using built-in tools like bcdedit.exe in order to execute unsigned or self-signed malicious code.
Multiple Vulnerabilities in Progress Software MOVEit Automation
2 rules 2 TTPsMultiple vulnerabilities in Progress Software MOVEit Automation can be exploited by an attacker to bypass security measures or gain elevated privileges.
Libssh Denial-of-Service Vulnerability via Inefficient Regular Expression Processing (CVE-2026-0967)
2 rules 1 TTP 1 CVECVE-2026-0967 is a denial-of-service vulnerability in libssh, stemming from inefficient regular expression processing that could lead to defense evasion and impact availability on affected systems.
Multiple Vulnerabilities in Google Chrome
2 rules 5 TTPs 5 CVEsMultiple vulnerabilities in Google Chrome could allow an attacker to execute arbitrary code, bypass security mechanisms, disclose and manipulate data, and cause a denial-of-service condition.
OpenClaw Execution Approval Bypass Vulnerability (CVE-2026-41380)
2 rules 3 TTPs 1 CVEOpenClaw before 2026.3.28 contains an execution approval vulnerability in exec-approvals-allowlist.ts that allows attackers to bypass intended execution restrictions by exploiting trust relationships with wrapper carrier executables, leading to privilege escalation and defense evasion.
Multiple Vulnerabilities in Dell PowerProtect Data Domain OS
2 rules 4 TTPsMultiple vulnerabilities in Dell PowerProtect Data Domain OS allow an attacker to execute arbitrary code with root privileges, escalate privileges to administrator, bypass security measures, manipulate data, disclose sensitive information, or conduct unspecified attacks.
Payouts King Ransomware Abusing QEMU VMs for Defense Evasion
2 rules 8 TTPs 1 CVE 1 IOCThe Payouts King ransomware is leveraging QEMU VMs as a reverse SSH backdoor to execute payloads, store malicious files, and establish covert remote access tunnels, bypassing endpoint security measures.
Better Auth OAuth Provider Authorization Bypass Vulnerability
2 rules 2 TTPsAn authorization bypass vulnerability exists in Better Auth's OAuth provider, allowing low-privilege users to create OAuth clients despite configured clientPrivileges, potentially leading to unauthorized client registration and increased phishing risks.
@fastify/middie Middleware Bypass Vulnerability (CVE-2026-33804)
2 rules 1 TTP 1 CVEA middleware bypass vulnerability (CVE-2026-33804) exists in @fastify/middie versions 9.3.1 and earlier when the deprecated Fastify ignoreDuplicateSlashes option is enabled, potentially allowing unauthorized access.
Suspicious Registry Modifications by Scripting Engines
1 rule 3 TTPsScripting engines such as WScript, CScript, and MSHTA are being used to make registry modifications, potentially for persistence or defense evasion.
VMware Tanzu Spring Cloud Gateway Security Bypass Vulnerability
1 rule 1 TTPAn anonymous, remote attacker can exploit a vulnerability in VMware Tanzu Spring Cloud Gateway to bypass security measures, potentially gaining unauthorized access or control.
Electron VideoFrame Context Isolation Bypass Vulnerability (CVE-2026-34780)
2 rules 2 TTPs 1 CVEA context isolation bypass vulnerability exists in Electron applications that bridge VideoFrame objects via contextBridge, potentially allowing an attacker with JavaScript execution in the main world to access the isolated world and Node.js APIs.
Spike in Successful Logon Events from a Source IP
2 rules 3 TTPsA machine learning job detected a spike in successful authentication events from a source IP address, which can indicate password spraying, user enumeration, or brute force activity, potentially leading to credential access.
Qilin Ransomware EDR Killer Infection Chain
2 rules 3 TTPs 1 IOCQilin ransomware employs a malicious msimg32.dll in a multi-stage infection chain to disable endpoint detection and response (EDR) solutions by evading detection and terminating EDR processes.
WebServer Access Logs Deleted
2 rules 1 TTPDetection of web server access log deletion across Windows, Linux, and macOS systems indicates potential defense evasion and destruction of forensic evidence by threat actors.
Right-to-Left Override Character Used for Defense Evasion
2 rules 1 TTPAdversaries are using the Right-to-Left Override (RTLO) character (U+202E) in command-line arguments to obfuscate malicious file names and trick users into executing them, achieving defense evasion.
Potential Abuse of msDS-ManagedAccountPrecededByLink for Privilege Escalation
2 rules 4 TTPsDetection of PowerShell scripts modifying the msDS-ManagedAccountPrecededByLink attribute, potentially indicating exploitation of the BadSuccessor privilege escalation vulnerability in Windows Server 2025.
LIBPNG Out-of-Bounds Read/Write Vulnerability in Neon Optimization (CVE-2026-33636)
2 rules 2 TTPsAn out-of-bounds read and write vulnerability in LIBPNG's ARM/AArch64 Neon-optimized palette expansion path (CVE-2026-33636) allows attackers to potentially achieve denial-of-service or arbitrary code execution by crafting malicious PNG images.
IBM WebSphere Application Server Liberty Multiple Vulnerabilities
2 rules 3 TTPsA remote, authenticated attacker can exploit multiple vulnerabilities in IBM WebSphere Application Server Liberty to escalate privileges, bypass security measures, and disclose information.
Lucky Pasta Shellcode Loader for Windows
2 rules 3 TTPs 2 IOCsA shellcode loader dubbed 'Lucky Pasta' employs JIT decryption, string obfuscation, dynamic library loading, fiber-based execution, and AES instruction patching to evade AV detection, retrieving shellcode via HTTP/HTTPS and executing it on Windows systems.
MOTW Bypass via CAB, TAR, and 7-Zip Chaining
2 rules 2 TTPs 1 IOCA newly discovered Mark of the Web (MOTW) bypass technique utilizes a chain of CAB, TAR, and 7-Zip archives to circumvent SmartScreen and execute files without security warnings.
WDAC Policy File Creation by Unusual Process
2 rules 1 TTPAdversaries may use a specially crafted Windows Defender Application Control (WDAC) policy to restrict the execution of security products, detected by unusual process creation of WDAC policy files.
Potential Privilege Escalation via SUID/SGID on Linux
2 rules 2 TTPsAttackers may leverage misconfigured SUID/SGID permissions on Linux systems to escalate privileges to root or establish persistence by executing processes with root privileges initiated by non-root users.
GitHub Security Feature Disablement
3 rules 3 TTPsAn administrator or privileged user disables critical security features within a GitHub organization or repository, potentially leading to increased risk of unauthorized access, data breaches, and persistent compromise.
MsiExec Child Process Spawning Network Connections for Defense Evasion
2 rules 1 TTPDetection of MsiExec spawning child processes that initiate network connections, potentially indicating abuse of Windows Installers for malware delivery and defense evasion.
Persistence via Windows Installer (Msiexec)
3 rules 3 TTPsAdversaries may establish persistence by abusing the Windows Installer (msiexec.exe) to create scheduled tasks or modify registry run keys, allowing for malicious code execution upon system startup or user logon.
Alternate Data Stream Creation/Execution at Volume Root Directory
2 rules 1 TTPDetection of Alternate Data Stream (ADS) creation at a volume root directory, a technique used to hide malware and tools by exploiting how ADSs in root directories are not readily visible to standard system utilities, indicating a defense evasion attempt.
Potential Windows Session Hijacking via CcmExec
2 rules 1 TTPAdversaries may exploit Microsoft's System Center Configuration Manager by loading malicious DLLs into SCNotification.exe, a process associated with user notifications, potentially leading to Windows session hijacking.
Microsoft Management Console File Execution from Unusual Path
2 rules 4 TTPsAdversaries may use Microsoft Management Console (MMC) files from untrusted paths to bypass security controls for initial access and execution on Windows systems.
DNS Global Query Block List Modified or Disabled
2 rules 3 TTPsAttackers with DNSAdmin privileges can modify or disable the DNS Global Query Block List (GQBL) in Windows, allowing exploitation of hosts running WPAD with default settings for privilege escalation and lateral movement.
Otter Blocks Plugin Purchase Verification Bypass Vulnerability (CVE-2026-2892)
3 rules 1 TTP 1 CVECVE-2026-2892 is a purchase verification bypass vulnerability in the Otter Blocks plugin for WordPress, affecting versions up to 3.1.4, that allows unauthenticated attackers to access restricted content by forging a cookie used for purchase validation.
Suspicious ScreenConnect Client Child Process Activity
2 rules 11 TTPs 2 CVEsThis rule identifies suspicious child processes spawned by ScreenConnect client processes, potentially indicating unauthorized access and command execution abusing ScreenConnect remote access software to perform malicious activities such as data exfiltration or establishing persistence.
Windows Parent Process PID Spoofing Detection
3 rules 1 TTPAdversaries use parent process PID spoofing to evade detection by creating processes with mismatched parent-child relationships, hindering process monitoring and potentially elevating privileges on Windows systems.
Kubernetes Event Deletion for Defense Evasion
2 rules 1 TTPAn adversary may delete Kubernetes events to evade detection and hide malicious activity within a Kubernetes environment by removing audit logs.
Okta Admin Console Unusual Behavior Detection
2 rules 4 TTPsThis brief details detection of anomalous activity within the Okta Admin Console, potentially indicating privilege escalation, persistence, defense evasion, or initial access attempts by malicious actors.
Suspicious Child Processes from Communication Applications
3 rules 3 TTPsThe detection rule identifies suspicious child processes spawned from communication applications on Windows systems, potentially indicating masquerading or exploitation of vulnerabilities within these applications.
Network-Level Authentication (NLA) Disabled via Registry Modification
2 rules 2 TTPsAdversaries may disable Network-Level Authentication (NLA) by modifying specific registry keys to bypass authentication requirements for Remote Desktop Protocol (RDP) and enable persistence mechanisms.
Windows Console History Clearing
2 rules 2 TTPsAdversaries may clear the command history of a compromised account to conceal the actions undertaken during an intrusion on a Windows system.
System File Ownership Change for Defense Evasion
3 rules 1 TTPAdversaries may modify file or directory ownership to evade access control lists (ACLs) and access protected files, often using icacls.exe or takeown.exe to reset permissions on system files.
Suspicious Windows Process Cluster from Parent Process via Machine Learning
2 rules 2 TTPsA machine learning model detected a parent process spawning a cluster of suspicious Windows processes with high malicious probability scores, potentially indicating LOLBins usage and defense evasion.
Expired or Revoked Driver Loaded
2 rules 3 TTPsAn expired or revoked driver being loaded on a Windows system may indicate an attempt to gain code execution in kernel mode or abuse revoked certificates for malicious purposes, potentially leading to privilege escalation or defense evasion.
MsXsl.exe Network Connection for Defense Evasion
2 rules 2 TTPsMsxsl.exe, a legitimate Windows utility, is being abused by adversaries to make network connections to non-local IPs for command and control or data exfiltration, potentially bypassing security measures.
Suspicious Registry Modifications by Scripting Engines
2 rules 3 TTPsThe use of scripting engines like WScript and CScript to modify the Windows registry can indicate an attempt to bypass standard tools and evade defenses, potentially for persistence or other malicious activities.
Suspicious Managed Code Hosting Process
2 rules 1 TTPThis rule detects suspicious managed code hosting processes on Windows systems, potentially indicating code injection or defense evasion tactics by monitoring file events associated with processes commonly used to host managed code, such as wscript.exe, cscript.exe, and mshta.exe.
Program Files Directory Masquerading
2 rules 1 TTPAdversaries may masquerade malicious executables within directories mimicking the legitimate Windows Program Files directory to evade defenses and execute untrusted code.
Potential Remote Install via MsiExec
2 rules 1 TTPThis rule detects attempts to install a file from a remote server using MsiExec, which adversaries may abuse to deliver malware, by identifying msiexec.exe processes running with arguments indicative of remote installations and executed from suspicious parent processes.
AMSI Enable Registry Key Modification for Defense Evasion
2 rules 1 TTPAdversaries modify the AmsiEnable registry key to 0 to disable Windows Script AMSI scanning, bypassing AMSI protections for Windows Script Host or JScript execution.
Suspicious Alternate Data Stream (ADS) File Creation
2 rules 1 TTPDetects suspicious creation of Alternate Data Streams (ADS) on targeted files using script or command interpreters, indicative of malware hiding in ADS for defense evasion.
Unusual Network Connection via RunDLL32
2 rules 2 TTPsThe rule detects unusual outbound network connections made by rundll32.exe, specifically when executed with minimal arguments, which may indicate command and control activity or defense evasion tactics on Windows systems.
Google Workspace Suspicious Login Activity
3 rules 1 TTPDetect Google Workspace login activity that Google has classified as suspicious, potentially indicating initial access, privilege escalation, defense evasion, or persistence attempts.
Suspicious Microsoft Diagnostics Wizard Execution
3 rules 1 TTPThis rule detects potential abuse of the Microsoft Diagnostics Troubleshooting Wizard (MSDT) to proxy malicious command or binary execution via malicious process arguments on Windows systems.
Unusual Executable File Creation by a System Critical Process
2 rules 1 TTPThe rule identifies unexpected executable file creation or modification by critical Windows processes, potentially indicating remote code execution or exploitation attempts.
Executable File Creation with Multiple Extensions
2 rules 2 TTPsDetection of executable files created with multiple extensions, a masquerading technique to evade defenses.
Potential Process Injection via PowerShell
2 rules 2 TTPsThis detection identifies PowerShell scripts leveraging Win32 APIs for memory allocation, process access, and thread creation, indicative of potential process injection or in-memory payload execution on Windows systems.
Windows Defender Disabled via Registry Modification
2 rules 3 TTPsAttackers modify the Windows Defender registry settings to disable the service or set the service to be started manually, evading defenses.
Unusual Process Spawned by a Parent Process via Machine Learning
2 rules 2 TTPsA machine learning job detected a suspicious Windows process, predicted malicious by the ProblemChild model and flagged as an unusual child process name for its parent, potentially indicating LOLbins usage and evading traditional detection.
Uncommon Svchost Command Line Parameters Indicate Potential Masquerading or Injection
2 rules 2 TTPsDetection of svchost.exe executing with uncommon command-line parameters, excluding known legitimate patterns, which may indicate file masquerading, process injection, or process hollowing.
Renamed Automation Script Interpreter
2 rules 1 TTPDetects the renaming of automation script interpreter processes like AutoIt, AutoHotkey, and KIX32, a tactic used by malware operators to evade detection by obscuring the true nature of the executable.
AWS KMS Key Policy Updated via PutKeyPolicy
2 rules 2 TTPsDetection of successful PutKeyPolicy calls on AWS KMS keys to identify potential privilege escalation or unauthorized access by adversaries modifying key policies to decrypt or exfiltrate data.
Suspicious WMIC XSL Script Execution
2 rules 3 TTPsThis rule detects suspicious execution of scripts via WMIC, potentially used for allowlist bypass, by identifying WMIC executions with atypical arguments and the loading of specific libraries like jscript.dll or vbscript.dll for defense evasion and execution.
ProblemChild ML Detection of Suspicious Windows Processes
2 rules 2 TTPsThe ProblemChild machine learning model has detected a user with suspicious Windows processes exhibiting unusually high malicious probability scores, potentially indicating defense evasion via masquerading or LOLbins.
Windows Sandbox Abuse with Sensitive Configuration
3 rules 1 TTPThis rule detects the abuse of Windows Sandbox with sensitive configurations to evade detection, where malware may abuse the sandbox feature to gain write access to the host file system, enable network connections, and automatically execute commands via logon, identifying the start of a new container with these sensitive configurations.
Unsigned DLL Loaded by Svchost for Persistence and Privilege Escalation
2 rules 4 TTPs 5 IOCsAdversaries may load unsigned DLLs into svchost.exe to establish persistence or escalate privileges, leveraging a shared Windows service to execute malicious code with elevated permissions.
Azure Kubernetes Events Deleted
2 rules 1 TTPAdversaries may delete events in Azure Kubernetes to evade detection, which this rule detects via the MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/EVENTS.K8S.IO/EVENTS/DELETE operation.
Microsoft Build Engine Started by an Office Application
2 rules 1 TTPThe Microsoft Build Engine (MSBuild) being started by an Office application is unusual behavior and could indicate a malicious document executing a script payload for defense evasion.
Potential Antimalware Scan Interface Bypass via PowerShell
3 rules 1 TTPThis rule detects PowerShell scripts that attempt to bypass the Antimalware Scan Interface (AMSI) in order to disable scanning and execute malicious PowerShell code undetected.
MSBuild Making Network Connections Indicating Potential Defense Evasion
2 rules 2 TTPsMsBuild.exe making outbound network connections may indicate adversarial activity as attackers leverage MsBuild to execute code and evade detection.
Linux Log Clearing Attempts via Common Utilities
3 rules 1 TTPAdversaries attempt to clear Linux system logs using utilities like rm, rmdir, shred, and unlink to conceal malicious activity and evade detection.
Suspicious WerFault Child Process Abuse
2 rules 3 TTPsThis rule detects suspicious child processes of WerFault.exe, a Windows error reporting tool, indicating potential abuse of the SilentProcessExit registry key to execute malicious processes stealthily for defense evasion, persistence, and privilege escalation.
PowerShell Script Block Logging Disabled via Registry Modification
2 rules 2 TTPsAttackers may disable PowerShell Script Block Logging by modifying the registry to conceal their activities on the host and evade detection by setting the `EnableScriptBlockLogging` registry value to 0, impacting security monitoring and incident response capabilities.
Potential Timestomping of Executable Files on Windows
2 rules 1 TTPThis rule identifies potential timestomping behavior on Windows systems where the creation time of executable files in sensitive system directories is modified, potentially to blend malicious executables with legitimate system files and evade detection.
MSBuild Making Network Connections
2 rules 2 TTPsDetection of MsBuild.exe making outbound network connections which may indicate adversarial activity used to execute code and evade detection.
Disabling Windows Defender Security Settings via PowerShell
2 rules 2 TTPsAttackers use PowerShell commands, including base64-encoded variants, to disable or weaken Windows Defender settings, impairing defenses on compromised systems.
Rundll32 Execution with DLL Stored in Alternate Data Stream (ADS)
2 rules 1 TTPAdversaries may use rundll32.exe to execute DLLs stored within alternate data streams (ADS) to bypass security controls and conceal malicious code.
Suspicious PDF Reader Child Process Activity
2 rules 13 TTPsAdversaries may exploit PDF reader applications to execute arbitrary commands and establish a foothold within a system, often launching built-in utilities for reconnaissance and privilege escalation.
Detection of Wevtutil.exe Used to Disable Event Logs
2 rules 1 TTPThe execution of `wevtutil.exe` with parameters to disable event logs is a tactic commonly employed by ransomware to evade detection and hinder forensic investigations, leading to a significant reduction in visibility for defenders.
Process Execution from Suspicious Windows Directories
2 rules 1 TTPAdversaries may execute processes from unusual default Windows directories to masquerade malware and evade defenses by blending in with trusted paths, making malicious activity harder to detect.
Abuse of Windows Update Client for DLL Loading
2 rules 3 TTPsThe Windows Update Auto Update Client (wuauclt.exe) is being abused to load arbitrary DLLs, a defense evasion technique where malicious activity blends with legitimate Windows software by using specific process arguments and placing DLLs in writable paths.
Disable Windows Event and Security Logs Using Built-in Tools
3 rules 3 TTPsAttackers attempt to disable Windows Event and Security Logs using logman, PowerShell, or auditpol to evade detection and cover their tracks.
Process Activity via Compiled HTML File Execution
2 rules 5 TTPsAdversaries may conceal malicious code in compiled HTML files (.chm) and deliver them to a victim for execution, using the HTML Help executable (hh.exe) to proxy the execution of scripting interpreters and bypass security controls.
Azure Firewall Modification or Deletion Detected
2 rules 1 TTPAn Azure firewall was created, modified, or deleted, potentially indicating malicious activity aimed at impairing network defenses.
PowerShell P/Invoke Process Injection API Chain Detection
2 rules 8 TTPsThis analytic detects PowerShell code that uses P/Invoke to call Windows API functions associated with process injection, such as VirtualAlloc, WriteProcessMemory, and CreateRemoteThread, indicating potential malicious activity.
Symbolic Link Creation to Shadow Copies for Credential Access
2 rules 3 TTPsAdversaries may create symbolic links to shadow copies to access sensitive files such as ntds.dit and browser credentials, enabling credential dumping using cmd.exe or powershell.exe.
InstallUtil Process Making Network Connections for Defense Evasion
2 rules 1 TTPDetection of InstallUtil.exe making outbound network connections, which can indicate adversaries leveraging it to execute code and evade detection by proxying execution through a trusted system binary.
Suspicious Windows Process Cluster Detection via Machine Learning
2 rules 2 TTPsA machine learning job combination has identified a host with one or more suspicious Windows processes that exhibit unusually high malicious probability scores, potentially indicating masquerading and defense evasion tactics.
PowerShell Suspicious Payload Encoded and Compressed
2 rules 1 TTPDetects PowerShell scripts employing Base64 decoding combined with .NET decompression (Deflate/GZip) to deobfuscate and reconstruct malicious payloads in memory, evading traditional defenses.
Network Connection via Compiled HTML File
2 rules 3 TTPsThis rule detects network connections initiated by hh.exe, the HTML Help executable, which may indicate the execution of malicious code embedded in compiled HTML files (.chm) to deliver malicious payloads, bypass security controls, and gain initial access via social engineering.
Long Base64 Encoded Command via Scripting Interpreter
2 rules 5 TTPsDetection of oversized command lines used by Python, PowerShell, Node.js, or Deno interpreters containing base64 decoding or encoded-command patterns, indicating potential evasion and malicious execution.
Windows Subsystem for Linux Distribution Installed via Registry Modification
2 rules 3 TTPsThis rule detects registry modifications indicative of a new Windows Subsystem for Linux (WSL) distribution installation, a technique adversaries may leverage to evade detection by utilizing Linux environments within Windows.
MSBuild запускает необычные процессы
2 rules 3 TTPsAdversaries may exploit MSBuild to execute malicious scripts or compile code, bypassing security controls; this rule detects unusual processes initiated by MSBuild, such as PowerShell or C# compiler, signaling potential misuse for executing unauthorized or harmful actions.
Detection of Invoke-Obfuscation via Standard Input
2 rules 2 TTPsThis brief outlines detection strategies for adversaries leveraging Invoke-Obfuscation techniques within PowerShell scripts executed via standard input, a method commonly used to evade traditional detection mechanisms.
Windows Time-Based Evasion via Choice Exec
2 rules 1 TTPDetection of choice.exe used in batch files for time-based evasion, a technique observed in SnakeKeylogger malware, indicating potential stealthy code execution and persistence.
Windows Service Security Descriptor Tampering via sc.exe
2 rules 2 TTPsAdversaries may modify service security descriptors to deny access to specific groups, potentially escalating privileges and hindering security services, by using sc.exe to set new deny ACEs (Access Control Entries) on Windows services.
Unusual Network Activity from Windows System Binaries
3 rules 5 TTPsDetection of network connections initiated by unusual Windows system binaries, often leveraged by adversaries to proxy execution of malicious code and evade detection, indicating potential defense evasion and command and control activity.
Suspicious Process Access via Direct System Call
2 rules 3 TTPsDetects suspicious process access events where the call trace does not originate from known Windows system DLLs, indicating potential defense evasion by bypassing hooked APIs via direct syscalls.
Suspicious Child Processes Spawned by WScript or CScript
2 rules 3 TTPsDetects suspicious processes spawned by WScript or CScript, a common technique used by adversaries to execute LOLBINs, PowerShell, or inject code into suspended processes for defense evasion.
Suspicious Antimalware Scan Interface DLL Creation
2 rules 1 TTPAn adversary may attempt to bypass AMSI by creating a rogue AMSI DLL in an unusual location to evade detection.
Script Execution via Microsoft HTML Application
3 rules 1 TTPDetects the execution of scripts via HTML applications using Windows utilities rundll32.exe or mshta.exe to bypass defenses by proxying execution of malicious content with signed binaries.
PowerShell Obfuscation via Concatenated Dynamic Command Invocation
2 rules 1 TTPThis rule detects PowerShell scripts that build commands from concatenated string literals within dynamic invocation constructs, a technique used by attackers to obscure execution intent, bypass keyword-based detections, and evade AMSI.
Conhost Proxy Execution for Defense Evasion
3 rules 1 TTPAdversaries abuse the Console Window Host (conhost.exe) with the `--headless` argument to proxy execution of malicious commands, evading detection by blending in with legitimate Windows software.
Attrib.exe Used to Hide Files and Directories
2 rules 1 TTPDetection of attrib.exe being used with the +h flag to hide files and directories on Windows systems, a technique used by attackers for defense evasion and persistence.
Windows Firewall Disabled via Netsh
2 rules 1 TTPDetection of adversaries disabling Windows Firewall rules using the `netsh.exe` command-line tool to weaken defenses and facilitate unauthorized network activity.
Unusual Process Loading Mozilla NSS/Mozglue Module
2 rules 1 TTPDetection of processes loading Mozilla NSS/Mozglue libraries (mozglue.dll, nss3.dll) outside of known Mozilla applications, potentially indicating malware or unauthorized activity.
Invoke-Obfuscation via Clip.exe
2 rules 2 TTPsThe use of `clip.exe` in conjunction with PowerShell and command-line obfuscation is used to evade detection.
AWS SecurityHub Findings Evasion via API Calls
3 rules 2 TTPsAttackers can impair defenses by modifying or deleting findings and insights within AWS SecurityHub using API calls such as BatchUpdateFindings, DeleteInsight, UpdateFindings, and UpdateInsight.
AWS Identity Center Identity Provider Modification
2 rules 1 TTPAn adversary modifies the AWS Identity Center identity provider configuration, potentially leading to persistent access and privilege escalation through user impersonation.
Proxy Execution via Windows OpenSSH Client
2 rulesDetection of command execution via proxy using the Windows OpenSSH client (ssh.exe or sftp.exe) to bypass application control using trusted Windows binaries.
Unusual Network Connection via DllHost
2 rules 2 TTPsThe rule identifies unusual instances of dllhost.exe making outbound network connections to non-local IPs, which may indicate adversarial Command and Control activity and defense evasion.
Unsigned DLL Side-Loading from Suspicious Folders by Trusted Processes
2 rules 2 TTPsThis detection identifies a Windows trusted program running from locations often abused by adversaries to masquerade as a trusted program and loading a recently dropped unsigned DLL, which indicates an attempt to evade defenses via side-loading a malicious DLL within the memory space of a signed process.
Suspicious MSBuild Execution from Scripting Processes
2 rules 6 TTPsAdversaries may use MSBuild, a legitimate Microsoft tool, to execute malicious code through script interpreters for defense evasion and execution on Windows systems.
Suspicious Execution from a Mounted Device
2 rules 9 TTPsAttackers may use mounted devices as a non-standard working directory to execute signed binaries or script interpreters, evading traditional defense mechanisms, particularly when launched via explorer.exe.
Suspicious CertUtil Commands Used for Defense Evasion
2 rules 3 TTPsAttackers abuse certutil.exe, a native Windows utility, to download/deobfuscate malware for command and control or data exfiltration, evading defenses.
Potential RemoteMonologue Attack via Registry Modification
2 rules 4 TTPsThis rule detects potential RemoteMonologue attacks by identifying attempts to perform session hijacking via COM object registry modification, specifically when the RunAs value is set to Interactive User.
Potential Defense Evasion via Filter Manager (fltMC.exe)
2 rules 1 TTPAdversaries may abuse the Filter Manager Control Program (fltMC.exe) to unload filter drivers, thereby evading security software defenses such as malware detection and file system monitoring.
MSBuild Process Injection Detection
2 rules 3 TTPsThe Microsoft Build Engine (MSBuild) is being abused to perform process injection by creating threads in other processes, a technique used to evade detection and potentially escalate privileges.
Execution from Unusual Directory - Command Line
2 rules 2 TTPsThis rule identifies process execution from suspicious default Windows directories, which adversaries may abuse to hide malware in trusted paths to evade defenses.
Windows USN Journal Deletion via Fsutil
2 rules 1 TTPAdversaries may delete the volume USN Journal on Windows systems using `fsutil.exe` to eliminate evidence of post-exploitation file activity.
Windows Subsystem for Linux Enabled via Dism Utility
2 rules 1 TTPAdversaries may enable and use Windows Subsystem for Linux (WSL) using the Microsoft Dism utility to evade detection on Windows systems by running Linux applications and tools.
Windows Scheduled Tasks AT Command Enabled via Registry Modification
2 rules 2 TTPsAttackers may enable the deprecated Windows AT command via registry modification to achieve local persistence or lateral movement.
Windows Root Certificate Modification Detection
2 rules 2 TTPsThe modification of root certificates on Windows systems by unauthorized processes can allow attackers to masquerade malicious files as valid signed components and intercept/decrypt SSL traffic, leading to defense evasion and data collection.
Windows Host Network Discovery Enabled via Netsh
2 rules 1 TTPAttackers can enable host network discovery via netsh.exe to weaken host firewall settings, facilitating lateral movement by identifying other systems on the network.
Windows Firewall Disabled via PowerShell
2 rules 2 TTPsAttackers may disable the Windows firewall or its rules using the `Set-NetFirewallProfile` PowerShell cmdlet to enable lateral movement and command and control activity.
Windows Files and Dirs Access Rights Modification via Icacls
2 rules 1 TTPDetection of icacls.exe, cacls.exe, or xcacls.exe being used to modify file or directory permissions, often used by APTs and coinminers for defense evasion and persistence.
Windows Defender Exclusions Added via PowerShell
2 rules 3 TTPsAdversaries may attempt to bypass Windows Defender's capabilities by using PowerShell to add exclusions for folders or processes, and this activity can be detected by monitoring PowerShell command lines that use `Add-MpPreference` or `Set-MpPreference` with exclusion parameters.
Unusual System Utilities Initiating Network Connections
2 rules 3 TTPsAdversaries may leverage unusual system utilities such as Microsoft.Workflow.Compiler.exe, bginfo.exe, cdb.exe, cmstp.exe, csi.exe, dnx.exe, fsi.exe, ieexec.exe, iexpress.exe, odbcconf.exe, rcsi.exe and xwizard.exe to execute code and evade detection, as identified by network connections originating from these processes.
Suspicious Script Object Execution via scrobj.dll
2 rules 2 TTPsDetection of scrobj.dll loaded into unusual Microsoft processes indicates potential malicious scriptlet execution for defense evasion and execution by abusing legitimate system binaries.
Suspicious Process Execution from Unusual File Paths
2 rules 2 TTPsAttackers may execute malicious code from unusual file paths such as Windows fonts or debug directories to evade defenses and gain unauthorized access, as detected by endpoint detection and response (EDR) agents.
Suspicious Network Connection via Registration Utility
2 rules 4 TTPsThe native Windows tools regsvr32.exe, regsvr64.exe, RegSvcs.exe, or RegAsm.exe making a network connection may indicate an attacker bypassing allowlists or running arbitrary scripts via a signed Microsoft binary.
Suspicious MS Office Child Process
2 rules 18 TTPsDetects suspicious child processes of Microsoft Office applications, indicating potential exploitation or malicious macros for initial access, defense evasion, and execution.
Suspicious Modifications to Windows Security Support Provider (SSP) Registry
2 rules 2 TTPsAdversaries may modify the Windows Security Support Provider (SSP) configuration in the registry to establish persistence or evade defenses.
Suspicious Microsoft Antimalware Service Executable Execution
3 rules 1 TTPDetects suspicious execution of the Microsoft Antimalware Service Executable (MsMpEng.exe) from non-standard paths or renamed instances, which may indicate an attempt to evade defenses through DLL side-loading or masquerading.
Suspicious Execution via Windows Subsystem for Linux
2 rules 3 TTPsAdversaries may leverage the Windows Subsystem for Linux (WSL) to execute malicious Linux commands, bypassing traditional Windows security measures, detected by monitoring process execution and command-line arguments.
Suspicious Endpoint Security Parent Process Detected
2 rules 2 TTPsThis rule detects suspicious parent processes of endpoint security solutions such as Elastic Defend, Microsoft Defender, and SentinelOne, indicating potential process hollowing or code injection attempts to evade detection.
Suspicious Dynamic .NET Compilation via Csc.exe
2 rules 1 TTPAttackers may use csc.exe to compile .NET code on the fly to evade detection, often placing the compiler and source code in suspicious locations, which can be detected by monitoring process creation events.
Suspicious Copy from or to System Directory
3 rules 1 TTPThis threat involves the suspicious copying of files from or to Windows system directories (System32, SysWOW64, WinSxS) using command-line tools, often employed by attackers to relocate LOLBINs for defense evasion.
SolarWinds Process Disabling Services via Registry Modification
2 rules 3 TTPsA SolarWinds binary is modifying the start type of a service to be disabled via registry modification, potentially to disable or impair security services.
Signed Proxy Execution via MS Work Folders
2 rules 3 TTPsAttackers can abuse Windows Work Folders to execute a masqueraded control.exe file from untrusted locations, potentially bypassing application controls for defense evasion and privilege escalation.
Renamed Utility Executed with Short Program Name
2 rules 1 TTPThis rule detects the execution of renamed utilities with a single-character process name, differing from the original filename, a common technique used by adversaries for staging, executing temporary utilities, or bypassing security detections.
Registry Persistence via AppInit DLL Modification
2 rules 2 TTPsModification of the AppInit DLLs registry keys on Windows systems allows attackers to execute code in every process that loads user32.dll, establishing persistence and potentially escalating privileges.
RDP Enabled via Registry Modification
2 rules 2 TTPsAn adversary may enable Remote Desktop Protocol (RDP) access by modifying the `fDenyTSConnections` registry key, potentially indicating lateral movement preparation or defense evasion.
PowerShell Token Obfuscation via Process Creation
3 rules 1 TTPAdversaries employ token obfuscation techniques within PowerShell commands to evade detection by security tools, leveraging methods such as character insertion, string concatenation, and environment variable manipulation to mask their malicious intent.
PowerShell Script with Encryption/Decryption Capabilities
2 rules 3 TTPsPowerShell scripts employing .NET cryptography APIs are used to encrypt data for impact or decrypt payloads for defense evasion.
PowerShell Obfuscation via String Concatenation
2 rules 1 TTPThis rule detects PowerShell scripts employing string concatenation to evade static analysis and AMSI by fragmenting keywords or URLs at runtime.
PowerShell Obfuscation via Character Array Reconstruction
2 rules 1 TTPDetects PowerShell scripts using character array reconstruction to hide commands, URLs, or payloads, evading static analysis and AMSI.
Potential Windows Error Manager Masquerading
2 rules 1 TTPAdversaries may masquerade malicious processes as legitimate Windows Error Reporting processes (WerFault.exe or Wermgr.exe) to evade detection by establishing network connections without arguments, thus blending into normal system activity.
Potential Vcruntime140 DLL Sideloading
2 rules 3 TTPsDetects potential DLL sideloading of vcruntime140.dll, a common C++ runtime library, often used by threat actors like APT29 (via WinELOADER) to load malicious payloads under the guise of legitimate applications, leading to defense evasion, persistence, and privilege escalation.
Potential PowerShell Obfuscation via Special Character Overuse
2 rules 3 TTPsThis rule detects PowerShell scripts heavily obfuscated with whitespace and special characters, often used to evade static analysis and AMSI, by identifying scripts with low symbol diversity and a high proportion of whitespace and special characters.
Potential Masquerading as Communication Apps
2 rules 3 TTPsAttackers may attempt to evade defenses by masquerading malicious processes as legitimate communication applications such as Slack, WebEx, Teams, Discord, RocketChat, Mattermost, WhatsApp, Zoom, Outlook and Thunderbird.
Potential Credential Access via Windows Utilities
3 rules 3 TTPsThis rule detects the execution of known Windows utilities often abused to dump LSASS memory or the Active Directory database (NTDS.dit) in preparation for credential access by identifying specific command-line arguments and process names associated with credential dumping activities.
NullSessionPipe Registry Modification for Lateral Movement
3 rules 2 TTPsAttackers modify the NullSessionPipe registry setting in Windows to enable anonymous access to named pipes, potentially facilitating lateral movement and unauthorized access to network resources.
Mshta Making Network Connections Indicative of Defense Evasion
2 rules 1 TTPMshta.exe making outbound network connections may indicate adversarial activity, as it is often used to execute malicious scripts and evade detection by proxying execution of untrusted code.
MSBuild Started by System Process for Defense Evasion and Execution
2 rules 2 TTPsAdversaries are leveraging MSBuild, a Microsoft Build Engine, to execute malicious code by initiating it from system processes such as Explorer or WMI to evade defenses and execute unauthorized actions.
Microsoft Defender Tampering via Registry Modification
2 rules 2 TTPsAdversaries may disable or tamper with Microsoft Defender features via registry modifications to evade detection and conceal malicious behavior on Windows systems.
Microsoft Build Engine Executed After Renaming
2 rules 2 TTPsAttackers may rename the Microsoft Build Engine (MSBuild) executable to evade detection and proxy execution of malicious code.
LSA PPL Protection Setting Modification via CommandLine
2 rules 1 TTPAttackers modify LSA PPL protection settings via command-line tools like reg.exe and PowerShell to weaken system security and enable credential dumping.
LOLBIN Network Connection for Defense Evasion
2 rules 1 TTPAdversaries can use Living-Off-The-Land Binaries (LOLBINs) such as expand.exe, extrac32.exe, ieexec.exe, and makecab.exe to establish network connections, potentially bypassing security controls and facilitating malicious activities on Windows systems.
Invoke-Obfuscation Obfuscated IEX Invocation via PowerShell
2 rules 2 TTPsAttackers use Invoke-Obfuscation, a PowerShell obfuscation framework, to generate obfuscated IEX (Invoke-Expression) commands, evading detection and executing malicious code.
Ingress Transfer via Windows BITS
2 rules 2 TTPsAdversaries may leverage Windows Background Intelligent Transfer Service (BITS) to download executable and archive files to evade defenses and establish command and control.
Host File System Changes via Windows Subsystem for Linux
2 rules 2 TTPsThis rule detects file creation and modification on the host system from the Windows Subsystem for Linux (WSL), potentially indicating defense evasion by adversaries.
Execution via Windows Subsystem for Linux
2 rules 2 TTPsThis detection identifies attempts to execute programs from the Windows Subsystem for Linux (WSL) to evade detection by flagging suspicious executions initiated by WSL processes and excluding known safe executables.
Execution via Local SxS Shared Module
2 rules 2 TTPsThis rule detects the creation, modification, or deletion of DLL files within Windows SxS local folders, which could indicate an attempt to execute malicious payloads by abusing shared module loading.
Executable or Script Creation in Temporary Paths
2 rules 1 TTPAdversaries may create executables or scripts in temporary directories to evade detection, maintain persistence, and execute unauthorized code on Windows systems.
Encoded Executable Stored in the Registry
2 rules 3 TTPs 1 IOCThis rule detects registry write modifications hiding encoded portable executables, indicative of adversary defense evasion by avoiding storing malicious content directly on disk.
DNS-over-HTTPS Enabled via Registry Modification
3 rules 2 TTPsDetection of DNS-over-HTTPS (DoH) being enabled via registry modifications on Windows systems, potentially indicating defense evasion and obfuscation of network activity by masking DNS queries.
Disabling LSA Protection via Registry Modification
2 rules 1 TTPAdversaries may modify the RunAsPPL registry key to disable LSA protection, which prevents nonprotected processes from reading memory and injecting code, potentially leading to credential access.
Detection of Python Base64 Encoded Execution on Linux
2 rules 2 TTPsThis brief focuses on detecting the execution of Python one-liners utilizing base64 decoding functions on Linux systems, a technique employed by malicious actors to obfuscate and execute payloads, thereby evading traditional security measures.
Component Object Model (COM) Hijacking via Registry Modification
2 rules 4 TTPsAdversaries may establish persistence by executing malicious content triggered by hijacked references to COM objects through Component Object Model (COM) hijacking via registry modification on Windows systems.
Command Obfuscation via Unicode Modifier Letters
2 rules 1 TTPAdversaries use Unicode modifier letters to obfuscate command-line arguments, evading string-based detections on common Windows utilities like PowerShell and cmd.exe.
Command Execution via ForFiles Utility
2 rules 1 TTPAdversaries may use the Windows forfiles utility to proxy command execution via a trusted parent process, potentially evading detection.
Chmod Activity Targeting Sensitive Linux Directories
2 rules 1 TTPAttackers may use chmod to modify file permissions within sensitive Linux directories such as /tmp/, /etc/, and /opt/ to maintain persistence, escalate privileges, or disrupt system operations.
AWS VPC Flow Logs Deletion for Defense Evasion
2 rules 1 TTPAn adversary may delete VPC Flow Logs in AWS EC2 by calling the DeleteFlowLogs API to evade detection and hinder forensic investigations.
Windows Proxy Execution of .NET Utilities via Scripts
2 rules 2 TTPsDetects the execution of .NET utilities by script processes from unusual locations, indicative of signed binary proxy execution for defense evasion and code execution.
Unusual Process Spawned by a User Detected by Machine Learning
2 rules 2 TTPsA machine learning job detected a suspicious Windows process, predicted to be malicious by the ProblemChild supervised ML model and found to be unusual within the user's context, potentially indicating defense evasion techniques like masquerading or the use of LOLbins.
Unusual Parent-Child Relationship Detection
3 rules 4 TTPsThis rule identifies Windows programs run from unexpected parent processes, which could indicate masquerading or other strange activity on a system, potentially indicating process injection, masquerading, access token manipulation, or parent PID spoofing.
Unusual Child Processes of RunDLL32 Execution Without Arguments
2 rules 1 TTPThe execution of `rundll32.exe` without arguments, followed by a child process execution, indicates potential abuse of Rundll32 for proxy execution or payload handoff, often employed for defense evasion on Windows systems.
Suspicious Process Execution via Renamed PsExec Executable
2 rules 3 TTPsDetects suspicious PsExec activity where the PsExec service component is executed using a custom name, indicating an attempt to evade detections that look for the default PsExec service component name.
Suspicious Process Creation Followed by Memory Access from Unknown Region
2 rules 1 TTPThe rule identifies suspicious process creation where a process is created and immediately accessed from an unknown memory code region by the same parent process, indicating a potential code injection attempt, specifically process hollowing, commonly targeting processes spawned by Microsoft Office applications, scripting engines, and command-line tools for defense evasion.
ProblemChild ML Model Detects Unusual Process on Windows Host
2 rules 1 TTPThe ProblemChild machine learning model detected a rare Windows process indicative of defense evasion, potentially involving LOLbins, on a host not commonly associated with malicious activity.
Image File Execution Options (IFEO) Injection for Persistence and Defense Evasion
3 rules 2 TTPsAttackers can establish persistence and evade defenses by modifying the Debugger and SilentProcessExit registry keys to perform Image File Execution Options (IFEO) injection, allowing them to intercept file executions and run malicious code.
IIS HTTP Logging Disabled via AppCmd
2 rules 1 TTPAn attacker with IIS server access can disable HTTP Logging using `appcmd.exe` to evade defenses and prevent forensic analysis, as detected by the execution of `appcmd.exe` with arguments to disable logging.
Executable or Script Creation in Suspicious Paths
2 rules 1 TTPThis analytic identifies the creation of executables or scripts in suspicious file paths on Windows systems, where adversaries often use these paths to evade detection and maintain persistence, potentially leading to unauthorized code execution, privilege escalation, or persistence within the environment.
Adding Hidden File Attribute via Attrib.exe
2 rules 2 TTPsAdversaries can use attrib.exe to add the 'hidden' attribute to files to hide them from users and evade detection, which can be detected by monitoring process executions related to attrib.exe.
Control Panel Process with Unusual Arguments
2 rules 1 TTPAdversaries may abuse control.exe to proxy execution of malicious code by using the Control Panel process to execute payloads from unusual locations, detected by identifying suspicious keywords or paths in the process command line.
Windows Delayed Execution via Ping Followed by Malicious Utilities
2 rules 14 TTPsAdversaries may use ping to delay execution of malicious commands, scripts, or binaries to evade detection, often observed during malware installation.
Windows Event Logs Cleared
2 rules 1 TTPAttackers attempt to clear Windows event logs to evade detection and remove forensic evidence of their activities.
Windows Audit Policy Sub-Category Disabled
2 rules 3 TTPsThis rule identifies attempts to disable auditing for security-sensitive audit policy sub-categories on Windows systems, often employed by attackers to evade detection and forensic analysis.
Unusual Child Process from a System Virtual Process
2 rules 1 TTPA suspicious child process of the Windows virtual system process is detected, potentially indicating code injection and defense evasion.
Suspicious Microsoft HTML Application Child Process
2 rules 1 TTPMshta.exe spawning a suspicious child process, such as cmd.exe or powershell.exe, indicates potential adversarial activity leveraging Mshta to execute malicious scripts and evade detection on Windows systems.
Suspicious Explorer Child Process via DCOM
2 rules 9 TTPsAdversaries abuse the trusted status of explorer.exe to launch malicious scripts or executables, often using DCOM to start processes like PowerShell or cmd.exe, achieving initial access, defense evasion, and execution.
Suspicious .NET Code Compilation via Unusual Parent Processes
2 rules 3 TTPsAdversaries may use unusual parent processes to execute .NET compilers for compiling malicious code after delivery, evading security mechanisms, and this activity is detected by monitoring compiler executions initiated by scripting engines or system utilities.
Service Control Executed from Script Interpreters
2 rules 8 TTPsDetection of Service Control (sc.exe) being spawned from script interpreter processes, such as PowerShell or cmd.exe, to create, modify, or start services, which may indicate privilege escalation or persistence attempts by an attacker.
Potential Masquerading as Svchost
2 rules 1 TTPAttackers may attempt to masquerade as the Service Host process `svchost.exe` by executing from non-standard paths to evade detection and blend in with normal system activity.
Potential Credential Access via Renamed COM+ Services DLL
2 rules 3 TTPs 1 IOCDetection of renamed COMSVCS.DLL being loaded by rundll32.exe, potentially used to dump LSASS memory for credential access while evading command-line detection.
Potential Credential Access via MSBuild Loading Credential Management DLLs
2 rules 1 TTPThe detection rule identifies a potential credential access attempt via the trusted developer utility MSBuild by detecting instances where it loads DLLs associated with Windows credential management, specifically vaultcli.dll or SAMLib.DLL, which is often used for credential dumping.
Okta User Session Start via Anonymizing Proxy Service
2 rules 1 TTPDetection of Okta user sessions initiated through anonymizing proxy services, potentially indicating malicious activity or attempts to evade security controls.
Netsh Used to Enable Remote Desktop Protocol (RDP) in Windows Firewall
2 rules 2 TTPsAdversaries may use the `netsh.exe` utility to enable inbound Remote Desktop Protocol (RDP) connections in the Windows Firewall, potentially allowing unauthorized remote access to compromised systems.
Msiexec Arbitrary DLL Execution
2 rules 1 TTPAdversaries may abuse the msiexec.exe utility to proxy the execution of malicious DLL payloads, bypassing application control and other defenses.
MS Office Macro Security Registry Modifications
2 rules 2 TTPsAttackers may modify Microsoft Office registry settings related to macro security (AccessVBOM, VbaWarnings) to disable security warnings, enabling malicious macros for persistence and further compromise.
Masquerading Business Application Installers
2 rules 4 TTPsAttackers masquerade malicious executables as legitimate business application installers to trick users into downloading and executing malware, leveraging defense evasion and initial access techniques.
High Number of Process and/or Service Terminations Detected
2 rules 2 TTPsA high number of process terminations (stop, delete, or suspend) from the same Windows host within a short time period may indicate malicious activity such as an attacker attempting to disable security measures or prepare for ransomware deployment.
Heimdall Host Matching Case-Sensitivity Vulnerability
2 rules 1 TTPHeimdall performs case-sensitive host matching, which can lead to policy bypass because HTTP hostnames are case-insensitive, potentially leading to unauthorized access, data modification, or privilege escalation if the request host is part of the rule.
File with Right-to-Left Override Character (RTLO) Created/Executed
2 rules 2 TTPsThis rule detects the creation or execution of files or processes with names containing the Right-to-Left Override (RTLO) character, which can be used to disguise the file extension and trick users into executing malicious files on Windows systems.
Disabling Windows Defender Security Settings via PowerShell
3 rules 2 TTPsAttackers use PowerShell commands like Set-MpPreference or Add-MpPreference, often with base64 encoding, to disable or weaken Windows Defender security settings in order to evade detection and execute malicious payloads.
Disabling User Account Control via Registry Modification
2 rules 3 TTPsAttackers may disable User Account Control (UAC) by modifying specific registry values, allowing them to execute code with elevated privileges, bypass security restrictions, and potentially escalate privileges on Windows systems.
Detection of Kali Linux Installation or Usage via Windows Subsystem for Linux (WSL)
2 rules 1 TTPAdversaries may attempt to install or use Kali Linux via Windows Subsystem for Linux (WSL) to avoid detection, potentially enabling them to perform malicious activities within a Windows environment while blending in with legitimate WSL usage.
Detecting Execution from Alternate Data Streams
2 rules 1 TTPAdversaries may execute malicious code from Alternate Data Streams (ADS) on Windows to evade defenses by hiding malware within legitimate files, which this detection identifies by monitoring process execution paths and arguments.
Code Signing Policy Modification Through Registry
2 rules 2 TTPsAttackers may modify the Windows registry to disable code signing policy, allowing the execution of unsigned or self-signed malicious code, thereby bypassing security controls and enabling defense evasion.
Xwizard COM Object Execution for Defense Evasion
2 rules 2 TTPsAdversaries may abuse Xwizard, a Windows system binary, to execute Component Object Model (COM) objects created in the registry to evade defensive countermeasures by proxying execution through a legitimate system tool.
PowerShell Obfuscation via Backtick-Escaped Variable Expansion
2 rules 1 TTPPowerShell scripts use backtick-escaped characters inside `${}` variable expansion to reconstruct strings at runtime, enabling attackers to split keywords, hide commands, and evade static analysis and AMSI.
Detection of IIS HTTP Logging Disabled via AppCmd.exe
2 rules 2 TTPsThis analytic detects the use of AppCmd.exe to disable HTTP logging on IIS servers, allowing adversaries to evade detection by removing evidence of their actions.