Skip to content
Threat Feed

Tag

Execution

89 briefs RSS
medium advisory

Suspicious Zoom Child Process Execution

A suspicious Zoom child process was detected, indicating a potential attempt to run unnoticed by masquerading as Zoom.exe or exploiting a vulnerability, resulting in the execution of cmd.exe, powershell.exe, pwsh.exe, or powershell_ise.exe.

Microsoft Defender XDR +1 defense-evasion execution windows
2r 6t
medium advisory

Suspicious Windows PowerShell Arguments Detected

This rule identifies the execution of PowerShell with suspicious argument values, often observed during malware installation, by detecting unusual PowerShell arguments indicative of abuse, focusing on patterns like encoded commands, suspicious downloads, and obfuscation techniques.

Elastic Defend +5 powershell malware execution
3r 4t
medium advisory

Potential DLL Side-Loading via Trusted Microsoft Programs

This rule detects potential DLL side-loading attempts by identifying instances of Windows trusted programs (WinWord.exe, EXPLORER.EXE, w3wp.exe, DISM.EXE) being started after being renamed or from a non-standard path, which is a common technique to evade defenses by side-loading a malicious DLL into the memory space of a trusted process.

WinWord.exe +4 defense-evasion execution dll-side-loading windows
2r 2t
low advisory

Command Shell Activity Started via RunDLL32

This rule detects command shell activity, such as cmd.exe or powershell.exe, initiated by RunDLL32, a technique commonly abused by attackers to execute malicious code and bypass security controls.

M365 Defender +2 execution command-shell rundll32
2r 4t
medium advisory

AWS SSM Session Manager Child Process Execution Abuse

Adversaries abuse AWS Systems Manager (SSM) Session Manager to gain remote execution and lateral movement within AWS environments by spawning malicious child processes from the SSM session worker, leveraging legitimate AWS credentials and IAM permissions.

AWS Systems Manager Session Manager aws ssm session-manager execution cloud
2r 3t
critical advisory

Multiple Vulnerabilities in CUPS

Multiple vulnerabilities in CUPS allow an attacker to bypass security measures, execute arbitrary code, escalate privileges, manipulate data, or cause a denial-of-service condition.

CUPS vulnerability privilege-escalation execution denial-of-service
2r 4t 1c
critical advisory

Multiple Vulnerabilities in Red Hat Linux Kernel

Multiple vulnerabilities in the Red Hat Linux kernel allow for arbitrary code execution, privilege escalation, and remote denial of service.

Red Hat CodeReady Linux Builder +1 vulnerability kernel redhat execution privilege-escalation denial-of-service
2r 3t 5c
high advisory

OpenClaw StrictInlineEval Approval Bypass Vulnerability (CVE-2026-42423)

OpenClaw before 2026.4.8 contains an approval-timeout fallback mechanism that allows attackers to bypass strictInlineEval explicit-approval requirements on gateway and node exec hosts, leading to arbitrary command execution.

OpenClaw vulnerability privilege-escalation execution
2r 1t 1c
high advisory

Bad Apples: Weaponizing Native macOS Primitives for Lateral Movement and Execution

Adversaries are increasingly targeting macOS environments, leveraging native tools like Remote Application Scripting (RAS) and Spotlight metadata to bypass security controls for remote code execution and lateral movement.

macos lotl lateral-movement execution
2r 2t
critical advisory

CVE-2026-32157 - Remote Desktop Client Use-After-Free Vulnerability

CVE-2026-32157 is a use-after-free vulnerability in the Remote Desktop Client that allows an unauthorized attacker to execute code over a network.

cve-2026-32157 use-after-free remote-desktop execution
2r 2t 1c 1i
low advisory

AWS SSM Command Document Created by Rare User

An AWS Systems Manager (SSM) command document creation by a user or role who does not typically perform this action, which can lead to unauthorized access, command and control, or data exfiltration.

cloud aws ssm execution
2r 1t
medium advisory

AWS EC2 LOLBin Execution via SSM SendCommand

Detection of Living Off the Land Binaries (LOLBins) or GTFOBins execution on EC2 instances via AWS Systems Manager (SSM) SendCommand API, potentially indicating malicious activity.

aws ec2 ssm lolbin execution cloud
2r 2t
medium advisory

OpenClaw Agent Suspicious Child Process Execution

Malicious actors are exploiting OpenClaw, Moltbot, and Clawdbot AI coding agents via Node.js to execute arbitrary shell commands and download-and-execute commands, potentially targeting cryptocurrency wallets and credentials.

ai-agent execution malware credential-theft
2r 10t 3i
high advisory

JetAudio jetCast Server 2.0 Stack-Based Buffer Overflow

JetAudio jetCast Server 2.0 is vulnerable to a stack-based buffer overflow in the Log Directory configuration, enabling local attackers to overwrite structured exception handling pointers and execute arbitrary code.

buffer-overflow privilege-escalation execution windows
2r 2t 5i
medium advisory

Powercat PowerShell Implementation Detection

Adversaries may leverage Powercat, a PowerShell implementation of Netcat, to establish command and control channels or perform lateral movement within a compromised network.

Windows command-and-control execution lateral-movement powershell
2r 2t
high advisory

Linux Shell Invocation via Env Command

The 'env' command is used to invoke a shell on Linux systems, potentially bypassing restricted environments or escalating privileges to execute arbitrary commands.

execution linux
2r 1t
medium advisory

Unsigned DLL Loaded by DNS Service

The rule identifies the loading of unusual or unsigned DLLs by the DNS Server process, which can indicate exploitation of the ServerLevelPluginDll functionality, potentially leading to privilege escalation and remote code execution with SYSTEM privileges.

Elastic Defend privilege-escalation execution persistence windows
2r 3t
medium advisory

Microsoft Management Console File Execution from Unusual Path

Adversaries may use Microsoft Management Console (MMC) files from untrusted paths to bypass security controls for initial access and execution on Windows systems.

Microsoft Management Console File +2 execution defense-evasion windows
2r 4t
medium advisory

Suspicious ScreenConnect Client Child Process Activity

This rule identifies suspicious child processes spawned by ScreenConnect client processes, potentially indicating unauthorized access and command execution abusing ScreenConnect remote access software to perform malicious activities such as data exfiltration or establishing persistence.

Elastic Defend +3 command-and-control defense-evasion execution persistence screenconnect
2r 11t 2c
medium advisory

Suspicious Registry Modifications by Scripting Engines

The use of scripting engines like WScript and CScript to modify the Windows registry can indicate an attempt to bypass standard tools and evade defenses, potentially for persistence or other malicious activities.

Windows defense-evasion persistence execution registry-modification
2r 3t
medium advisory

Remote File Download via Script Interpreter

Attackers are using Windows script interpreters (cscript.exe or wscript.exe) to download executable files from remote locations to deliver second-stage payloads or download tools.

Windows Script Host command-and-control execution windows script_interpreter
2r 3t
medium advisory

System Shells Launched via Windows Services

Attackers may configure existing services or create new ones to execute system shells to elevate their privileges from administrator to SYSTEM, using services.exe as the parent process of the shell.

Windows +2 persistence execution privilege_escalation
2r 4t
high advisory

Unusual Executable File Creation by a System Critical Process

The rule identifies unexpected executable file creation or modification by critical Windows processes, potentially indicating remote code execution or exploitation attempts.

Microsoft Defender XDR +3 defense-evasion execution windows
2r 1t
medium advisory

Windows Script Execution from Archive File

This rule identifies attempts to execute Jscript/Vbscript files from an archive file, a common delivery method for malicious scripts on Windows systems.

M365 Defender +2 execution windows scripting archive
2r 3t
medium advisory

Executable File Creation with Multiple Extensions

Detection of executable files created with multiple extensions, a masquerading technique to evade defenses.

Elastic Defend +3 defense-evasion execution masquerading windows
2r 2t
medium advisory

Curl or Wget Execution from Container Context

This rule detects the execution of curl or wget from within runc-backed containers on Linux systems monitored by Auditd Manager, indicating potential ingress tool transfer or data exfiltration by attackers who have compromised the container.

Auditd Manager command-and-control execution container auditd linux
2r 2t
medium advisory

Suspicious WMIC XSL Script Execution

This rule detects suspicious execution of scripts via WMIC, potentially used for allowlist bypass, by identifying WMIC executions with atypical arguments and the loading of specific libraries like jscript.dll or vbscript.dll for defense evasion and execution.

Elastic Defend defense-evasion execution windows
2r 3t
medium advisory

Unsigned DLL Loaded by Svchost for Persistence and Privilege Escalation

Adversaries may load unsigned DLLs into svchost.exe to establish persistence or escalate privileges, leveraging a shared Windows service to execute malicious code with elevated permissions.

Elastic Defend persistence defense-evasion execution windows dll-injection
2r 4t 5i
low advisory

Uncommon Destination Port Connection by Web Server on Linux

The rule identifies unusual outbound network connections on non-standard ports originating from web server processes on Linux systems, indicative of potential web shell activity or unauthorized communication.

Elastic Defend persistence execution command-and-control web shell linux
2r 4t
high advisory

Microsoft Build Engine Started by an Office Application

The Microsoft Build Engine (MSBuild) being started by an Office application is unusual behavior and could indicate a malicious document executing a script payload for defense evasion.

Microsoft Build Engine +2 defense-evasion execution msbuild windows
2r 1t
medium advisory

Suspicious WMI Image Load from MS Office

Adversaries may exploit Windows Management Instrumentation (WMI) to execute code stealthily, bypassing traditional security measures by loading `wmiutils.dll` from Microsoft Office applications, potentially indicating malicious execution.

WINWORD.EXE +4 wmi image load office execution
2r 1t
low advisory

Suspicious PDF Reader Child Process Activity

Adversaries may exploit PDF reader applications to execute arbitrary commands and establish a foothold within a system, often launching built-in utilities for reconnaissance and privilege escalation.

Elastic Defend execution initial-access defense-evasion discovery
2r 13t
medium advisory

Detection of Downloaded URL Files Used in Phishing Campaigns

This detection rule identifies downloaded .url shortcut files on Windows systems, often used in phishing campaigns, by monitoring their creation events and flagging those from non-local sources, enabling early threat detection.

Elastic Defend phishing execution url-file windows
2r 3t
medium advisory

Abuse of Windows Update Client for DLL Loading

The Windows Update Auto Update Client (wuauclt.exe) is being abused to load arbitrary DLLs, a defense evasion technique where malicious activity blends with legitimate Windows software by using specific process arguments and placing DLLs in writable paths.

Windows Auto Update Client defense-evasion execution lolbas windows
2r 3t
medium advisory

Process Activity via Compiled HTML File Execution

Adversaries may conceal malicious code in compiled HTML files (.chm) and deliver them to a victim for execution, using the HTML Help executable (hh.exe) to proxy the execution of scripting interpreters and bypass security controls.

Microsoft HTML Help system +5 execution defense-evasion compiled-html windows proxy-execution
2r 5t
medium advisory

Detection of Downloaded Shortcut Files

This rule detects potentially malicious .lnk shortcut files downloaded from outside the local network on Windows systems, which are commonly used in phishing campaigns.

Elastic Defend phishing lnk execution windows
2r 3t
medium advisory

Suspicious Execution via Scheduled Task

This rule identifies execution of suspicious programs via scheduled tasks by looking at process lineage and command line usage, detecting processes such as cscript.exe, powershell.exe, and cmd.exe when executed from suspicious paths like C:\Users\ and C:\ProgramData\.

Windows persistence execution
2r 2t
medium advisory

Network Connection via Compiled HTML File

This rule detects network connections initiated by hh.exe, the HTML Help executable, which may indicate the execution of malicious code embedded in compiled HTML files (.chm) to deliver malicious payloads, bypass security controls, and gain initial access via social engineering.

HTML Help execution defense-evasion command-and-control malicious-file html-help
2r 3t
high advisory

Long Base64 Encoded Command via Scripting Interpreter

Detection of oversized command lines used by Python, PowerShell, Node.js, or Deno interpreters containing base64 decoding or encoded-command patterns, indicating potential evasion and malicious execution.

Elastic Endpoint defense-evasion execution scripting-interpreter base64 command-line
2r 5t
medium advisory

MSBuild запускает необычные процессы

Adversaries may exploit MSBuild to execute malicious scripts or compile code, bypassing security controls; this rule detects unusual processes initiated by MSBuild, such as PowerShell or C# compiler, signaling potential misuse for executing unauthorized or harmful actions.

MSBuild +3 defense-evasion execution
2r 3t
high advisory

Suspicious Process Access via Direct System Call

Detects suspicious process access events where the call trace does not originate from known Windows system DLLs, indicating potential defense evasion by bypassing hooked APIs via direct syscalls.

EdgeWebView +4 defense-evasion execution windows
2r 3t
medium advisory

Suspicious Enumeration Commands Spawned via WMIPrvSE

This rule detects suspicious execution of system enumeration commands by the Windows Management Instrumentation Provider Service (WMIPrvSE), indicating potential reconnaissance or malicious activity on Windows systems.

Elastic Defend +3 enumeration wmi discovery execution windows
2r 12t
high advisory

Suspicious Script Interpreter Execution from Environment Variable Folders

Malware may execute scripts from suspicious directories accessible via environment variables using script interpreters like cscript, wscript, mshta, and powershell to evade detection.

Windows execution script-execution malware
2r 1t
medium advisory

Suspicious PowerShell Execution via Windows Script Host

Detection of PowerShell processes launched by cscript.exe or wscript.exe, indicative of potential malicious initial access or execution attempts.

Microsoft Defender XDR +2 initial-access execution windows powershell script
2r 4t
high advisory

Invoke-Obfuscation via Clip.exe

The use of `clip.exe` in conjunction with PowerShell and command-line obfuscation is used to evade detection.

Windows defense-evasion execution obfuscation
2r 2t
medium advisory

Suspicious PowerShell Engine ImageLoad

This rule identifies instances where the PowerShell engine is loaded by processes other than powershell.exe, potentially indicating attackers attempting to use PowerShell functionality stealthily by using the underlying System.Management.Automation namespace and bypassing PowerShell security features.

Elastic Defend powershell execution windows
2r 1t
medium advisory

Suspicious MSBuild Execution from Scripting Processes

Adversaries may use MSBuild, a legitimate Microsoft tool, to execute malicious code through script interpreters for defense evasion and execution on Windows systems.

MSBuild defense-evasion execution proxy-execution
2r 6t
medium advisory

Suspicious Execution from a Mounted Device

Attackers may use mounted devices as a non-standard working directory to execute signed binaries or script interpreters, evading traditional defense mechanisms, particularly when launched via explorer.exe.

Windows defense-evasion execution mounted-device
2r 9t
medium advisory

Execution from Unusual Directory - Command Line

This rule identifies process execution from suspicious default Windows directories, which adversaries may abuse to hide malware in trusted paths to evade defenses.

Microsoft Defender XDR +1 execution defense-evasion windows process-execution
2r 2t
medium advisory

Windows Script Interpreter Executing Process via WMI

The rule identifies the use of Windows script interpreters (cscript.exe or wscript.exe) executing a process via Windows Management Instrumentation (WMI), which may indicate malicious activity, especially when initiated by non-system accounts.

Sysmon windows wmi script_execution initial_access execution
2r 4t
medium advisory

Unusual Parent Process for cmd.exe

The detection rule identifies cmd.exe instances spawned by uncommon parent processes, such as lsass.exe, csrss.exe, or regsvr32.exe, which may indicate unauthorized or suspicious activity, thus aiding in early threat detection.

Elastic Defend +2 execution windows cmd.exe
2r 1t
medium advisory

Suspicious SolarWinds Child Process Execution

Detection of unusual child processes spawned by SolarWinds processes may indicate malicious program execution, potentially bypassing security controls.

Elastic Defend +3 supply-chain execution solarwinds
2r 2t
medium advisory

Suspicious Script Object Execution via scrobj.dll

Detection of scrobj.dll loaded into unusual Microsoft processes indicates potential malicious scriptlet execution for defense evasion and execution by abusing legitimate system binaries.

Elastic Defend +3 defense-evasion execution windows
2r 2t
medium advisory

Suspicious Network Connection via Registration Utility

The native Windows tools regsvr32.exe, regsvr64.exe, RegSvcs.exe, or RegAsm.exe making a network connection may indicate an attacker bypassing allowlists or running arbitrary scripts via a signed Microsoft binary.

Windows execution defense evasion regsvr32
2r 4t
medium advisory

Suspicious MS Office Child Process

Detects suspicious child processes of Microsoft Office applications, indicating potential exploitation or malicious macros for initial access, defense evasion, and execution.

Microsoft Office +4 initial-access defense-evasion execution discovery windows
2r 18t
medium advisory

Suspicious Mofcomp Activity

This rule detects suspicious mofcomp.exe activity, which attackers may leverage MOF files to manipulate the Windows Management Instrumentation (WMI) repository for execution and persistence by filtering out legitimate processes and focusing on unusual executions, excluding known safe parent processes and system accounts.

Elastic Defend +4 execution persistence windows
2r 2t
high advisory

Suspicious Microsoft Antimalware Service Executable Execution

Detects suspicious execution of the Microsoft Antimalware Service Executable (MsMpEng.exe) from non-standard paths or renamed instances, which may indicate an attempt to evade defenses through DLL side-loading or masquerading.

Microsoft Antimalware Service Executable +6 defense-evasion execution windows
3r 1t
low advisory

Suspicious Image Load (taskschd.dll) from MS Office

Detection of taskschd.dll image loads from Microsoft Office applications indicates potential COM-based scheduled task creation for persistence, bypassing traditional schtasks.exe usage.

Word +4 persistence execution windows image_load scheduled_task
2r 2t
low advisory

Suspicious Execution via Windows Subsystem for Linux

Adversaries may leverage the Windows Subsystem for Linux (WSL) to execute malicious Linux commands, bypassing traditional Windows security measures, detected by monitoring process execution and command-line arguments.

Elastic Defend +2 defense-evasion execution credential-access windows
2r 3t
medium advisory

Suspicious Execution from VS Code Extension

Malicious VS Code extensions can execute arbitrary commands, leading to initial access and subsequent payload deployment on Windows systems.

VS Code initial-access execution supply-chain-compromise vscode
2r 9t
medium advisory

Schtasks Run Task On Demand

Detection of on-demand execution of Windows Scheduled Tasks via the schtasks.exe command-line utility, a common technique for persistence and lateral movement.

Splunk Enterprise +2 schtasks scheduled-task persistence execution
2r 1t
medium advisory

Remote Scheduled Task Creation via RPC

The creation of scheduled tasks from a remote source via RPC, where the RpcCallClientLocality and ClientProcessId are 0, indicates potential adversary lateral movement within a Windows environment.

Windows lateral-movement execution
2r 2t
medium advisory

Persistence via WMI Event Subscription

Adversaries can leverage Windows Management Instrumentation (WMI) to establish persistence by creating event subscriptions that trigger malicious code execution when specific events occur, using tools like wmic.exe to create event consumers.

Microsoft Defender XDR +7 persistence execution windows wmi
2r 2t
medium advisory

MSBuild Started by System Process for Defense Evasion and Execution

Adversaries are leveraging MSBuild, a Microsoft Build Engine, to execute malicious code by initiating it from system processes such as Explorer or WMI to evade defenses and execute unauthorized actions.

Elastic Defend +3 defense-evasion execution msbuild proxy-execution windows
2r 2t
medium advisory

Microsoft Build Engine Executed After Renaming

Attackers may rename the Microsoft Build Engine (MSBuild) executable to evade detection and proxy execution of malicious code.

MSBuild defense-evasion execution masquerading
2r 2t
high advisory

Invoke-Obfuscation Obfuscated IEX Invocation via PowerShell

Attackers use Invoke-Obfuscation, a PowerShell obfuscation framework, to generate obfuscated IEX (Invoke-Expression) commands, evading detection and executing malicious code.

Windows defense-evasion execution powershell obfuscation
2r 2t
medium advisory

Execution via Windows Subsystem for Linux

This detection identifies attempts to execute programs from the Windows Subsystem for Linux (WSL) to evade detection by flagging suspicious executions initiated by WSL processes and excluding known safe executables.

Microsoft Defender XDR +3 defense-evasion execution windows wsl
2r 2t
medium advisory

Execution via Local SxS Shared Module

This rule detects the creation, modification, or deletion of DLL files within Windows SxS local folders, which could indicate an attempt to execute malicious payloads by abusing shared module loading.

M365 Defender +4 execution defense-evasion dll-hijacking
2r 2t
medium advisory

Execution of a Downloaded Windows Script

This rule identifies the creation and subsequent execution of a Windows script downloaded from the internet, a technique used by adversaries for initial access and execution on Windows systems.

Elastic Defend execution windows scripting threat-detection
3r 7t
high advisory

Executable or Script Creation in Temporary Paths

Adversaries may create executables or scripts in temporary directories to evade detection, maintain persistence, and execute unauthorized code on Windows systems.

defense-evasion persistence privilege-escalation execution temp-directory file-creation
2r 1t
medium advisory

Exchange Mailbox Export via PowerShell

Adversaries may use the New-MailboxExportRequest PowerShell cmdlet to export mailboxes in Exchange, potentially leading to sensitive information theft.

Microsoft Defender XDR +2 collection execution powershell exchange mailbox
2r 4t
high advisory

Detection of Python Base64 Encoded Execution on Linux

This brief focuses on detecting the execution of Python one-liners utilizing base64 decoding functions on Linux systems, a technique employed by malicious actors to obfuscate and execute payloads, thereby evading traditional security measures.

execution defense-evasion linux
2r 2t
high advisory

AWS EC2 Stop, Start, and User Data Modification Correlation

Detection of a sequence of AWS EC2 management API calls indicative of malicious modification of instance user data to execute arbitrary code upon instance restart, potentially leading to privilege escalation and persistence.

EC2 aws user-data privilege-escalation persistence execution
3r 2t
high advisory

Windows Proxy Execution of .NET Utilities via Scripts

Detects the execution of .NET utilities by script processes from unusual locations, indicative of signed binary proxy execution for defense evasion and code execution.

Windows proxy-execution net-utility defense-evasion execution signed-binary-proxy-execution
2r 2t
medium advisory

Suspicious Process Execution via Renamed PsExec Executable

Detects suspicious PsExec activity where the PsExec service component is executed using a custom name, indicating an attempt to evade detections that look for the default PsExec service component name.

Elastic Defend +2 psexec lateral-movement execution defense-evasion windows
2r 3t
medium advisory

Suspicious Outbound Scheduled Task Activity via PowerShell

This rule detects PowerShell loading the Task Scheduler COM DLL followed by an outbound RPC network connection, potentially indicating lateral movement or remote discovery via scheduled tasks.

Windows execution lateral-movement
2r 3t
high advisory

PowerShell Execution via Environment Variables

Adversaries use PowerShell to execute malicious code stored in environment variables, leveraging Invoke-Expression or its aliases to bypass static analysis and execute payloads dynamically, as seen in malware loaders and stagers like the VIP Keylogger.

Splunk Enterprise +2 powershell environment-variable invoke-expression execution
2r 1t
high advisory

Executable or Script Creation in Suspicious Paths

This analytic identifies the creation of executables or scripts in suspicious file paths on Windows systems, where adversaries often use these paths to evade detection and maintain persistence, potentially leading to unauthorized code execution, privilege escalation, or persistence within the environment.

Windows defense-evasion persistence privilege-escalation execution
2r 1t
medium advisory

Detecting Remote Scheduled Task Creation for Lateral Movement

This rule identifies remote scheduled task creations on a target Windows host, potentially indicating lateral movement by adversaries, by monitoring network connections and registry modifications related to task scheduling.

Elastic Defend +2 lateral-movement execution windows scheduled-task
2r 2t
high threat

Suspicious Script Execution from Temporary Directory

This brief covers a detection for suspicious script execution, such as PowerShell, WScript, or MSHTA, originating from common temporary directories, potentially indicating malware activity.

exploited Windows execution script temp
2r 1t
low advisory

Windows Delayed Execution via Ping Followed by Malicious Utilities

Adversaries may use ping to delay execution of malicious commands, scripts, or binaries to evade detection, often observed during malware installation.

Windows execution defense-evasion ping lolbas
2r 14t
medium advisory

Windows Temporarily Scheduled Task Creation and Deletion

Detection of rapid creation and deletion of scheduled tasks on Windows, indicating potential malicious activity abusing the task scheduler for execution and cleanup.

Windows persistence execution
2r 2t
medium advisory

Suspicious Svchost.exe Child Process: cmd.exe

Detection of cmd.exe being spawned by svchost.exe, which is an unusual behavior indicative of potential masquerading or privilege escalation attempts on Windows systems.

execution windows process_injection privilege_escalation
2r 2t
medium advisory

Suspicious Explorer Child Process via DCOM

Adversaries abuse the trusted status of explorer.exe to launch malicious scripts or executables, often using DCOM to start processes like PowerShell or cmd.exe, achieving initial access, defense evasion, and execution.

Microsoft Defender XDR +2 initial-access defense-evasion execution explorer.exe dcom
2r 9t
low advisory

Suspicious Command Prompt Network Connection

This alert identifies suspicious network connections initiated by the command prompt (cmd.exe) when executed with arguments indicative of script execution, remote resource access, or originating from Microsoft Office applications, which is a common tactic for downloading payloads or establishing command and control.

Elastic Defend +7 command-prompt network-connection windows execution command-and-control
2r 4t
low advisory

Service Control Executed from Script Interpreters

Detection of Service Control (sc.exe) being spawned from script interpreter processes, such as PowerShell or cmd.exe, to create, modify, or start services, which may indicate privilege escalation or persistence attempts by an attacker.

Elastic Defend +2 privilege-escalation defense-evasion execution windows service-creation
2r 8t
medium advisory

Xwizard COM Object Execution for Defense Evasion

Adversaries may abuse Xwizard, a Windows system binary, to execute Component Object Model (COM) objects created in the registry to evade defensive countermeasures by proxying execution through a legitimate system tool.

Microsoft Defender XDR +2 execution defense-evasion com-object xwizard windows
2r 2t
medium advisory

Remote Execution of Windows Services via RPC

Detection of remote execution of Windows services over RPC by correlating `services.exe` network connections and spawned child processes, potentially indicating lateral movement.

SCCM lateral-movement execution windows
2r 2t
medium advisory

Execution via GitHub Actions Runner

Adversaries compromising GitHub Actions workflows can execute arbitrary commands on runner hosts, leading to code execution, reconnaissance, credential harvesting, or network exfiltration.

github-actions supply-chain execution devops
3r 3t