Tag
Windows Port Forwarding Rule Addition via Registry Modification
2 rules 3 TTPsAn adversary may abuse port forwarding to bypass network segmentation restrictions by creating a new port forwarding rule through modification of the Windows registry.
Suspicious Zoom Child Process Execution
2 rules 6 TTPsA suspicious Zoom child process was detected, indicating a potential attempt to run unnoticed by masquerading as Zoom.exe or exploiting a vulnerability, resulting in the execution of cmd.exe, powershell.exe, pwsh.exe, or powershell_ise.exe.
Suspicious Execution via Windows Command Debugging Utility
2 rules 2 TTPsAdversaries can abuse the Windows command line debugging utility cdb.exe to execute commands or shellcode from non-standard paths, evading traditional security measures.
SIP Provider Modification for Defense Evasion
2 rules 1 TTPThis rule detects modifications to the registered Subject Interface Package (SIP) providers, which are used by the Windows cryptographic system to validate file signatures, potentially indicating an attempt to bypass signature validation or inject code for defense evasion.
Service DACL Modification via sc.exe
2 rules 2 TTPsDetection of service DACL modifications via `sc.exe` using the `sdset` command, potentially leading to defense evasion by denying service access to legitimate users or system accounts.
Remote Desktop File Opened from Suspicious Path
2 rules 2 TTPsAdversaries may abuse RDP files delivered via phishing from suspicious locations to gain unauthorized access to systems.
Potential WSUS Abuse for Lateral Movement via PsExec
2 rules 2 TTPsAdversaries may exploit Windows Server Update Services (WSUS) to execute PsExec for lateral movement within a network by abusing the trusted update mechanism to run signed binaries.
Potential WPAD Spoofing via DNS Record Creation
2 rules 1 TTPDetection of a Windows DNS record creation event (5137) with an ObjectDN attribute containing 'DC=wpad', which indicates a potential WPAD spoofing attack to enable privilege escalation and lateral movement.
Potential Secure File Deletion via SDelete Utility
2 rules 2 TTPsThis rule detects file name patterns generated by the use of Sysinternals SDelete utility, potentially used by attackers to delete forensic indicators and hinder data recovery efforts.
Potential Remote File Execution via MSIEXEC
2 rules 3 TTPsThe rule detects the execution of the built-in Windows Installer, msiexec.exe, to install a remote package potentially abused by adversaries for initial access and defense evasion.
Potential Pass-the-Hash (PtH) Attempt Detection
2 rules 1 TTPThis rule detects potential Pass-the-Hash (PtH) attempts in Windows environments by monitoring successful authentications with specific user IDs (S-1-5-21-* or S-1-12-1-*) and the `seclogo` logon process, where attackers use stolen password hashes to authenticate and move laterally across systems without needing plaintext passwords.
Potential NetNTLMv1 Downgrade Attack via Registry Modification
2 rules 2 TTPsThis brief details a registry modification attack that downgrades the system to NTLMv1 authentication, enabling NetNTLMv1 downgrade attacks, typically performed with local administrator privileges on Windows systems.
Potential DLL Side-Loading via Trusted Microsoft Programs
2 rules 2 TTPsThis rule detects potential DLL side-loading attempts by identifying instances of Windows trusted programs (WinWord.exe, EXPLORER.EXE, w3wp.exe, DISM.EXE) being started after being renamed or from a non-standard path, which is a common technique to evade defenses by side-loading a malicious DLL into the memory space of a trusted process.
Potential Computer Account NTLM Relay Activity
2 rules 2 TTPsDetection of potential NTLM relay attacks targeting computer accounts by identifying authentication events originating from hosts other than the account's owner, indicating possible credential theft and misuse.
Potential Account Takeover - Logon from New Source IP
2 rules 1 TTPThe rule identifies a user account that normally logs in with high volume from one source IP suddenly logging in from a different source IP, potentially indicating account takeover or use of stolen credentials from a new location.
Enumerating Domain Trusts via DSQUERY.EXE
2 rules 2 TTPsAdversaries may use the `dsquery.exe` command-line utility to enumerate trust relationships for lateral movement in Windows multi-domain environments.
Detection of VScode Remote Tunneling for Command and Control
2 rules 1 TTPThe rule detects the execution of the VScode portable binary with the tunnel command line option, potentially indicating an attempt to establish a remote tunnel session to Github or a remote VScode instance for unauthorized access and command and control.
Code Signing Policy Modification Through Built-in Tools
2 rules 1 TTPAttackers may attempt to disable or modify code signing policies on Windows systems by using built-in tools like bcdedit.exe in order to execute unsigned or self-signed malicious code.
Norton Secure VPN Privilege Escalation Vulnerability (CVE-2025-58074)
2 rules 1 TTP 1 CVEA privilege escalation vulnerability exists in Norton Secure VPN during installation via the Microsoft Store (CVE-2025-58074), allowing a low-privilege user to replace files leading to arbitrary file deletion and potential elevation of privileges.
Potential Kerberos SPN Spoofing via Suspicious DNS Query
2 rules 1 TTPDetects suspicious DNS queries containing a base64-encoded blob, indicating potential Kerberos coercion attacks and SPN spoofing via DNS to coerce authentication to attacker-controlled hosts, enabling Kerberos or NTLM relay attacks.
Unpatched Microsoft Windows RPC Vulnerability Allows Privilege Escalation
2 rules 1 TTPA local attacker can exploit an unpatched vulnerability in Microsoft Windows RPC to escalate privileges.
Alloksoft Video Joiner Buffer Overflow Vulnerability (CVE-2018-25315)
2 rules 1 TTP 1 CVEAlloksoft Video Joiner 4.6.1217 is vulnerable to a local buffer overflow (CVE-2018-25315) allowing attackers to execute arbitrary code via a crafted license name.
PhantomRPC: Windows RPC Privilege Escalation Vulnerability
2 rules 1 TTPA vulnerability in Windows RPC architecture allows an attacker to create a fake RPC server and escalate their privileges to SYSTEM level, leveraging processes with impersonation privileges.
CVE-2026-32223 Windows USB Printing Stack Elevation of Privilege Vulnerability
2 rules 1 TTP 1 CVECVE-2026-32223 is an elevation of privilege vulnerability affecting the Windows USB Printing Stack (usbprint.sys), potentially allowing a local attacker to gain elevated privileges on a vulnerable system.
Multiple Vulnerabilities in Microsoft Developer Tools
2 rules 4 TTPsMultiple vulnerabilities in Microsoft Visual Studio, .NET Framework, .NET, PowerShell, and Visual Studio Code can be exploited by an attacker to disclose sensitive information, conduct spoofing attacks, cause a denial of service, or bypass security measures, potentially leading to arbitrary code execution.
Suspicious RDP File Execution
2 rules 2 TTPsThis rule identifies attempts to open a remote desktop file from suspicious paths, indicative of adversaries abusing RDP files for initial access via phishing.
Google Chrome Sandbox Escape via Uninitialized Use in Accessibility (CVE-2026-6311)
2 rules 1 TTP 1 CVE 1 IOCA remote attacker who has compromised the renderer process in Google Chrome on Windows prior to version 147.0.7727.101 can potentially perform a sandbox escape via a crafted HTML page due to an uninitialized use in accessibility, as tracked by CVE-2026-6311.
Dragon Boss Solutions Adware Disabling Antivirus Protections
2 rules 2 TTPs 2 IOCsDigitally signed adware from Dragon Boss Solutions LLC deploys payloads with SYSTEM privileges to disable antivirus protections on thousands of endpoints across education, utilities, government, and healthcare sectors.
Microsoft April 2026 Patch Tuesday Addresses 163 Vulnerabilities
2 rules 4 TTPs 6 CVEsMicrosoft's April 2026 Patch Tuesday addresses 163 vulnerabilities, including 8 critical ones, ranging from Tampering to Remote Code Execution and Privilege Escalation, affecting various Microsoft products; it is recommended to apply patches immediately.
Simopro WinMatrix Agent Missing Authentication Vulnerability (CVE-2026-6348)
2 rules 2 TTPs 1 CVEThe WinMatrix agent by Simopro Technology suffers from a missing authentication vulnerability (CVE-2026-6348), enabling local authenticated attackers to execute arbitrary code with SYSTEM privileges on the local machine and all hosts within the agent's environment.
Barracuda RMM Privilege Escalation via Filesystem ACLs
2 rules 1 TTP 1 CVEBarracuda RMM versions prior to 2025.2.2 are vulnerable to local privilege escalation, allowing attackers to gain SYSTEM privileges by exploiting overly permissive filesystem ACLs on the C:\Windows\Automation directory.
Git for Windows NTLM Hash Leak Vulnerability (CVE-2026-32631)
2 rules 1 TTP 1 CVEGit for Windows versions prior to 2.53.0.windows.3 are vulnerable to NTLM hash theft by attackers who can trick users into cloning malicious repositories or checking out malicious branches, leading to potential credential compromise.
Windows WinSock Use-After-Free Privilege Escalation (CVE-2026-26177)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-26177 is a use-after-free vulnerability in the Windows Ancillary Function Driver for WinSock, allowing a local attacker to elevate privileges.
Windows WinSock Race Condition Privilege Escalation (CVE-2026-26173)
2 rules 1 TTP 1 CVECVE-2026-26173 is a race condition vulnerability in the Windows Ancillary Function Driver for WinSock that allows a local attacker to elevate privileges.
Windows Win32K GRFX Privilege Escalation via Race Condition (CVE-2026-33104)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-33104 is a race condition vulnerability in Windows Win32K - GRFX that allows an authorized local attacker to elevate privileges by exploiting concurrent execution using a shared resource with improper synchronization.
Windows WalletService Use-After-Free Privilege Escalation (CVE-2026-32080)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-32080 is a use-after-free vulnerability in the Windows WalletService, allowing a locally authorized attacker to elevate privileges.
Windows User Interface Core Race Condition Privilege Escalation (CVE-2026-27911)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-27911 is a race condition vulnerability in the Windows User Interface Core that allows a local attacker to elevate privileges due to improper synchronization when accessing shared resources.
Windows TCP/IP Race Condition Vulnerability (CVE-2026-33827)
2 rules 2 TTPs 1 CVECVE-2026-33827 is a race condition vulnerability in Windows TCP/IP that allows an attacker to execute arbitrary code over the network by exploiting improper synchronization during concurrent execution using shared resources.
Windows Storage Spaces Controller Out-of-Bounds Read Privilege Escalation (CVE-2026-32076)
2 rules 1 TTP 1 CVECVE-2026-32076 is an out-of-bounds read vulnerability in the Windows Storage Spaces Controller that allows an authorized local attacker to elevate privileges.
Windows SSDP Service Race Condition Privilege Escalation (CVE-2026-32068)
2 rules 1 TTP 1 CVECVE-2026-32068 is a race condition vulnerability in the Windows SSDP Service that allows an authorized attacker to elevate privileges locally.
Windows Remote Desktop Spoofing Vulnerability (CVE-2026-26151)
2 rules 2 TTPs 1 CVECVE-2026-26151 is a spoofing vulnerability in Windows Remote Desktop due to an insufficient UI warning for dangerous operations, allowing an unauthorized attacker to perform spoofing over a network.
Windows Push Notifications Race Condition Privilege Escalation (CVE-2026-32160)
2 rules 1 TTP 1 CVECVE-2026-32160 describes a race condition vulnerability in Windows Push Notifications that allows a locally authorized attacker to elevate privileges.
Windows Push Notifications Race Condition Privilege Escalation (CVE-2026-32158)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-32158 is a race condition vulnerability in Windows Push Notifications that allows an authorized attacker to elevate privileges locally due to improper synchronization when using shared resources.
Windows Push Notifications Race Condition Privilege Escalation (CVE-2026-26172)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-26172 is a race condition vulnerability in Windows Push Notifications, allowing a locally authenticated attacker to elevate privileges.
Windows Projected File System Race Condition Privilege Escalation (CVE-2026-27927)
2 rules 1 TTP 1 CVECVE-2026-27927 is a race condition vulnerability in the Windows Projected File System that allows an authorized attacker to escalate privileges locally.
Windows LUAFV TOCTOU Vulnerability Allows Local Privilege Escalation (CVE-2026-27929)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-27929 is a time-of-check time-of-use (TOCTOU) race condition in Windows LUAFV that allows an authorized local attacker to elevate privileges.
Windows Kerberos Improper Authorization Privilege Escalation (CVE-2026-27912)
2 rules 1 TTP 1 CVE 2 IOCsCVE-2026-27912 describes an improper authorization vulnerability in Windows Kerberos, enabling an attacker on an adjacent network with valid credentials to elevate privileges.
Windows Hyper-V Improper Input Validation Vulnerability (CVE-2026-32149)
2 rules 2 TTPs 1 CVE 1 IOCCVE-2026-32149 is a vulnerability in Windows Hyper-V due to improper input validation, which allows an authorized, local attacker to execute arbitrary code.
Windows BitLocker Security Feature Bypass Vulnerability (CVE-2026-27913)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-27913 describes an improper input validation vulnerability in Windows BitLocker that allows a local attacker to bypass security features.
Microsoft PowerShell Improper Input Validation Vulnerability (CVE-2026-26143)
2 rules 1 TTP 1 CVE 2 IOCsAn improper input validation vulnerability (CVE-2026-26143) in Microsoft PowerShell allows an unauthorized local attacker to bypass security features.
Microsoft Management Console Improper Access Control Vulnerability (CVE-2026-27914)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-27914 is an improper access control vulnerability in Microsoft Management Console that allows a locally authorized attacker to elevate privileges.
CVE-2026-33824: Windows IKE Extension Double Free Vulnerability
2 rules 3 TTPs 1 CVE 1 IOCA double free vulnerability in the Windows IKE Extension, tracked as CVE-2026-33824, allows an unauthenticated remote attacker to execute arbitrary code over the network.
CVE-2026-33101 Use-After-Free Vulnerability in Windows Print Spooler
2 rules 1 TTP 1 CVE 2 IOCsCVE-2026-33101 is a use-after-free vulnerability in the Windows Print Spooler Components that allows an authenticated local attacker to elevate privileges.
CVE-2026-33099: Windows WinSock Use-After-Free Privilege Escalation
2 rules 1 TTP 1 CVEA use-after-free vulnerability, CVE-2026-33099, in the Windows Ancillary Function Driver for WinSock, enables a locally authenticated attacker to elevate privileges on the system.
CVE-2026-33098 Use-After-Free in Windows Container Isolation FS Filter Driver
2 rules 1 TTP 1 CVECVE-2026-33098 is a use-after-free vulnerability in the Windows Container Isolation FS Filter Driver that allows a locally authorized attacker to elevate privileges.
CVE-2026-33096 HTTP.sys Out-of-Bounds Read Denial-of-Service
2 rules 2 TTPs 1 CVEAn unauthenticated, remote attacker can exploit an out-of-bounds read vulnerability (CVE-2026-33096) in Windows HTTP.sys to cause a denial-of-service condition.
CVE-2026-32195 Windows Kernel Stack-Based Buffer Overflow Privilege Escalation
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-32195 is a stack-based buffer overflow vulnerability in the Windows Kernel that allows an authorized attacker to elevate privileges locally.
CVE-2026-32164 Windows User Interface Core Race Condition Privilege Escalation
2 rules 1 TTP 1 CVECVE-2026-32164 is a race condition vulnerability in Windows User Interface Core that allows a locally authorized attacker to elevate privileges.
CVE-2026-32155: Desktop Window Manager Use-After-Free Privilege Escalation
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-32155 is a use-after-free vulnerability in the Desktop Window Manager that allows an authorized attacker to escalate privileges locally on a Windows system.
CVE-2026-32153 Windows Speech Use-After-Free Privilege Escalation
2 rules 1 TTP 1 CVECVE-2026-32153 is a use-after-free vulnerability in Microsoft Windows Speech that allows a locally authorized attacker to elevate privileges.
CVE-2026-32078: Windows Projected File System Use-After-Free Elevation of Privilege
2 rules 1 TTP 1 CVEA use-after-free vulnerability, CVE-2026-32078, exists in the Windows Projected File System, allowing a locally authenticated attacker to escalate privileges.
CVE-2026-32071: Windows LSASS Null Pointer Dereference DoS
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-32071 is a null pointer dereference vulnerability in the Windows Local Security Authority Subsystem Service (LSASS), allowing an unauthorized network attacker to cause a denial-of-service condition.
CVE-2026-27926 Windows Cloud Files Mini Filter Driver Privilege Escalation
3 rules 1 TTP 1 CVECVE-2026-27926 is a race condition vulnerability in the Windows Cloud Files Mini Filter Driver that allows a local attacker to elevate privileges.
CVE-2026-27917: Windows WFP NDIS Lightweight Filter Driver Use-After-Free Vulnerability
2 rules 1 TTP 1 CVECVE-2026-27917 is a use-after-free vulnerability in the Windows WFP NDIS Lightweight Filter Driver (wfplwfs.sys) that allows a locally authorized attacker to elevate privileges.
CVE-2026-27916 Use-After-Free in Windows UPnP Device Host
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-27916 is a use-after-free vulnerability in Windows Universal Plug and Play (UPnP) Device Host that allows an authorized attacker to elevate privileges locally.
CVE-2026-27910: Windows Installer Local Privilege Escalation
2 rules 1 TTP 1 CVE 2 IOCsCVE-2026-27910 describes a local privilege escalation vulnerability in Windows Installer due to improper handling of insufficient permissions, allowing an authorized attacker to gain elevated privileges.
CVE-2026-27909 Use-After-Free in Windows Search Component Allows Privilege Escalation
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-27909 is a use-after-free vulnerability in the Microsoft Windows Search Component that allows a locally authorized attacker to escalate privileges.
CVE-2026-27908 Use-After-Free in Windows TDI Translation Driver
2 rules 1 TTP 1 CVE 1 IOCA use-after-free vulnerability, CVE-2026-27908, exists in the Windows TDI Translation Driver (tdx.sys), allowing a locally authenticated attacker to elevate privileges.
CVE-2026-26182: Windows WinSock Use-After-Free Privilege Escalation
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-26182 is a use-after-free vulnerability in the Windows Ancillary Function Driver for WinSock, allowing a locally authorized attacker to elevate privileges.
CVE-2026-26181 - Microsoft Brokering File System Use-After-Free Vulnerability
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-26181 is a use-after-free vulnerability in the Microsoft Brokering File System that enables a locally authenticated attacker to escalate privileges on the system.
CVE-2026-26179 Windows Kernel Double Free Privilege Escalation
2 rules 1 TTP 1 CVECVE-2026-26179 is a double free vulnerability in the Windows Kernel, allowing a locally authenticated attacker to elevate privileges on the system.
CVE-2026-26163: Windows Kernel Double Free Privilege Escalation
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-26163 is a double free vulnerability in the Windows Kernel, allowing an authorized attacker to elevate privileges locally with a CVSS v3.1 score of 7.8.
CVE-2026-26153: Windows EFS Out-of-Bounds Read Privilege Escalation
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-26153 is an out-of-bounds read vulnerability in the Windows Encrypting File System (EFS) that allows an authorized local attacker to elevate privileges.
CVE-2026-26152: Windows Cryptographic Services Privilege Escalation
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-26152 is an insecure storage of sensitive information vulnerability in Windows Cryptographic Services that allows a local, authorized attacker to elevate privileges.
CVE-2026-32183: Windows Snipping Tool Command Injection Vulnerability
2 rules 2 TTPs 1 CVECVE-2026-32183 is a command injection vulnerability in the Windows Snipping Tool that allows a local attacker to execute arbitrary code.
Windows Win32K Untrusted Pointer Dereference Vulnerability (CVE-2026-32222)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-32222 is an untrusted pointer dereference vulnerability in the Windows Win32K ICOMP component, allowing a local attacker to escalate privileges.
CVE-2026-32156 Use-After-Free Vulnerability in Windows UPnP Device Host
2 rules 2 TTPs 1 CVE 1 IOCCVE-2026-32156 is a use-after-free vulnerability in the Windows Universal Plug and Play (UPnP) Device Host service that allows an unauthorized attacker to execute code locally.
CVE-2026-26183 Windows RPC API Local Privilege Escalation
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-26183 allows a locally authenticated attacker to escalate privileges due to improper access control within the Windows RPC API.
Windows Server Update Service (WSUS) Privilege Escalation via CVE-2026-26174
2 rules 1 TTP 1 CVE 2 IOCsCVE-2026-26174 is a race condition vulnerability in Windows Server Update Service that allows an authorized attacker to elevate privileges locally.
CVE-2026-33100: Windows WinSock Use-After-Free Privilege Escalation
2 rules 1 TTP 1 CVECVE-2026-33100 is a use-after-free vulnerability in the Windows Ancillary Function Driver for WinSock, allowing a locally authorized attacker to elevate privileges.
CVE-2026-32224 Use-After-Free in Windows Server Update Service
2 rules 1 TTP 1 CVECVE-2026-32224 is a use-after-free vulnerability in the Windows Server Update Service that allows a locally authenticated attacker to elevate privileges.
Microsoft Brokering File System Double Free Privilege Escalation (CVE-2026-32219)
2 rules 1 TTP 1 CVECVE-2026-32219 is a double free vulnerability in the Microsoft Brokering File System, allowing an authorized attacker to escalate privileges locally on a vulnerable Windows system.
CVE-2026-32165 Use-After-Free in Windows User Interface Core
2 rules 1 TTP 1 CVECVE-2026-32165 is a use-after-free vulnerability in Windows User Interface Core that allows a locally authenticated attacker to elevate privileges.
Windows COM Privilege Escalation via CVE-2026-32162
2 rules 1 TTP 1 CVE 2 IOCsCVE-2026-32162 allows an unauthorized attacker to achieve local privilege escalation in Windows COM by exploiting the acceptance of extraneous untrusted data with trusted data.
Windows Push Notifications Race Condition Privilege Escalation (CVE-2026-32159)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-32159 is a race condition vulnerability in Windows Push Notifications, allowing a local attacker with low privileges to elevate privileges by exploiting concurrent execution using a shared resource with improper synchronization.
Microsoft Brokering File System Race Condition Vulnerability (CVE-2026-32091)
2 rules 1 TTP 1 CVECVE-2026-32091 is a race condition vulnerability in the Microsoft Brokering File System, allowing an unauthenticated local attacker to escalate privileges.
CVE-2026-32087 Function Discovery Service Privilege Escalation
2 rules 1 TTP 1 CVECVE-2026-32087 is a heap-based buffer overflow vulnerability in the Function Discovery Service (fdwsd.dll) that allows an authorized local attacker to elevate privileges on a Windows system.
CVE-2026-32070: Windows CLFS Driver Use-After-Free Privilege Escalation
2 rules 1 TTP 1 CVE 1 IOCA use-after-free vulnerability, CVE-2026-32070, exists in the Windows Common Log File System (CLFS) driver, enabling a locally authenticated attacker to escalate privileges on a vulnerable system.
Windows UPnP Device Host Untrusted Pointer Dereference Vulnerability (CVE-2026-27920)
2 rules 1 TTP 1 CVE 2 IOCsCVE-2026-27920 is a local privilege escalation vulnerability in the Windows Universal Plug and Play (UPnP) Device Host due to an untrusted pointer dereference.
Windows Shell Race Condition Vulnerability (CVE-2026-27918)
2 rules 1 TTP 1 CVECVE-2026-27918 is a race condition vulnerability in Windows Shell, allowing a local attacker to elevate privileges due to improper synchronization when accessing shared resources.
Windows Projected File System Buffer Over-Read Privilege Escalation (CVE-2026-26184)
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-26184 is a buffer over-read vulnerability in the Windows Projected File System (ProjFS) that allows a local attacker to elevate privileges.
Windows WARP Integer Truncation Privilege Escalation (CVE-2026-26178)
2 rules 1 TTP 1 CVECVE-2026-26178 is an integer size truncation vulnerability in the Windows Advanced Rasterization Platform (WARP) that allows an unauthorized attacker to elevate privileges locally.
CVE-2026-26176 Windows CSC Driver Privilege Escalation
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-26176 is a heap-based buffer overflow vulnerability in the Windows Client Side Caching driver (csc.sys), which allows an authorized attacker to elevate privileges locally.
Windows Remote Desktop Licensing Service Privilege Escalation via CVE-2026-26159
2 rules 1 TTP 1 CVE 1 IOCCVE-2026-26159 allows a local attacker to escalate privileges on Windows systems due to a missing authentication check in the Remote Desktop Licensing Service (RDLS).
Easy Video to iPod Converter 1.6.20 Local Buffer Overflow Vulnerability
2 rules 2 TTPs 1 CVEEasy Video to iPod Converter 1.6.20 is vulnerable to a local buffer overflow in the user registration field, allowing a local attacker to overwrite the structured exception handler (SEH) by providing a crafted payload exceeding 996 bytes in the username field, potentially leading to arbitrary code execution with user privileges.
RGui 3.5.0 Local Buffer Overflow Vulnerability
2 rules 2 TTPs 1 CVERGui 3.5.0 contains a local buffer overflow vulnerability in the GUI preferences dialog that allows attackers to bypass DEP protections through structured exception handling exploitation, leading to arbitrary code execution.
Unauthenticated Denial-of-Service and Information Disclosure in Podman Desktop
2 rules 4 TTPs 1 CVEPodman Desktop versions prior to 1.26.2 expose an unauthenticated HTTP server, allowing remote attackers to trigger denial-of-service conditions by exhausting resources and extract sensitive information through verbose error responses.
libssh Insecure Configuration Allows Local MITM Attacks (CVE-2025-14821)
2 rules 2 TTPs 1 CVECVE-2025-14821 in libssh allows local man-in-the-middle attacks, SSH downgrade attacks, and trusted host manipulation due to insecure default configuration loading from a world-writable directory on Windows.
Remote Code Execution Vulnerability in JP1/IT Desktop Management Products (CVE-2025-65115)
2 rules 1 TTP 1 CVECVE-2025-65115 is a remote code execution vulnerability affecting multiple versions of JP1/IT Desktop Management and related products on Windows, potentially allowing attackers to execute arbitrary code on vulnerable systems.
Potential File Download via a Headless Browser
2 rules 1 TTPDetects the execution of headless browsers from suspicious parent processes with arguments indicative of scripted retrieval, bypassing application control policies and restrictions on direct download tools.
River Past Video Cleaner 7.6.3 SEH Buffer Overflow Vulnerability
2 rules 2 TTPs 1 CVERiver Past Video Cleaner 7.6.3 contains a structured exception handler buffer overflow vulnerability allowing local attackers to execute arbitrary code by providing a malicious string in the Lame_enc.dll field.
R i386 3.5.0 Local Buffer Overflow Vulnerability (CVE-2019-25656)
2 rules 2 TTPs 1 CVE 5 IOCsR i386 version 3.5.0 is susceptible to a local buffer overflow in the GUI Preferences dialog, allowing a local attacker to overwrite the structured exception handler (SEH) by supplying a malicious string to the 'Language for menus and messages' field, leading to arbitrary code execution.
AIRBUS PSS TETRA Connectivity Server Privilege Escalation via Incorrect Permissions
2 rules 1 TTP 1 CVEAIRBUS PSS TETRA Connectivity Server version 7.0 on Windows Server is vulnerable to incorrect default permissions, allowing local privilege escalation to SYSTEM by placing a malicious file in a specific directory.
Electron Use-After-Free Vulnerability in PowerMonitor Module
2 rules 1 TTP 1 IOCA use-after-free vulnerability exists in the `powerMonitor` module of Electron applications on Windows and macOS. When the native `PowerMonitor` object is garbage-collected, dangling references are retained by OS-level resources. Subsequent session-change events on Windows or system shutdowns on macOS may dereference freed memory, potentially leading to a crash or memory corruption.
DeepLoad Malware Distributed via ClickFix
2 rules 3 TTPsThe DeepLoad malware steals credentials, installs malicious browser extensions, spreads via USB drives, and is being distributed via ClickFix campaigns using PowerShell loaders.
Qilin Ransomware EDR Killer Infection Chain
2 rules 3 TTPs 1 IOCQilin ransomware employs a malicious msimg32.dll in a multi-stage infection chain to disable endpoint detection and response (EDR) solutions by evading detection and terminating EDR processes.
HCL BigFix Platform Insecure Permissions Vulnerability (CVE-2026-21765)
2 rules 2 TTPs 1 CVEHCL BigFix Platform is vulnerable to insecure permissions on private cryptographic keys, where keys on a Windows host may have overly permissive file system permissions, potentially leading to unauthorized access and privilege escalation.
Lakeside SysTrack Agent Local Privilege Escalation via Race Condition (CVE-2026-35099)
2 rules 1 TTP 1 CVELakeside SysTrack Agent 11 before 11.2.1.28 is vulnerable to a race condition that allows for local privilege escalation to SYSTEM, as tracked by CVE-2026-35099.
7-Zip Multiple Vulnerabilities Allow Remote Code Execution
2 rules 1 TTPMultiple vulnerabilities in 7-Zip allow an attacker to execute arbitrary program code with the privileges of the service, potentially leading to system compromise.
vcpkg OpenSSL Windows Build Path Vulnerability (CVE-2026-34054)
2 rules 2 TTPs 1 CVEA vulnerability exists in vcpkg versions prior to 3.6.1#3, where Windows builds of OpenSSL set openssldir to a path on the build machine, making that path vulnerable to attack on customer machines.
Symantec DLP Windows Endpoint Elevation of Privilege Vulnerability (CVE-2026-3991)
2 rules 1 TTPCVE-2026-3991 is an elevation of privilege vulnerability in Symantec Data Loss Prevention (DLP) Windows Endpoint that could allow a local attacker to gain elevated access to resources.
X-NetStat Pro 5.63 Local Buffer Overflow Vulnerability
2 rules 1 TTPX-NetStat Pro 5.63 contains a local buffer overflow vulnerability (CVE-2019-25637) allowing local attackers to execute arbitrary code by overwriting the EIP register.
AIDA64 Business SEH Buffer Overflow Vulnerability (CVE-2019-25631)
2 rules 3 TTPsAIDA64 Business 5.99.4900 is vulnerable to a local Structured Exception Handling (SEH) buffer overflow (CVE-2019-25631) allowing attackers to execute arbitrary code by overwriting SEH pointers with malicious shellcode.
FlexHEX 2.71 Local Buffer Overflow Vulnerability (CVE-2019-25627)
2 rules 2 TTPsFlexHEX 2.71 is vulnerable to a local buffer overflow in the Stream Name field, allowing local attackers to execute arbitrary code via a structured exception handler (SEH) overflow.
Lucky Pasta Shellcode Loader for Windows
2 rules 3 TTPs 2 IOCsA shellcode loader dubbed 'Lucky Pasta' employs JIT decryption, string obfuscation, dynamic library loading, fiber-based execution, and AES instruction patching to evade AV detection, retrieving shellcode via HTTP/HTTPS and executing it on Windows systems.
JetAudio jetCast Server 2.0 Stack-Based Buffer Overflow
2 rules 2 TTPs 5 IOCsJetAudio jetCast Server 2.0 is vulnerable to a stack-based buffer overflow in the Log Directory configuration, enabling local attackers to overwrite structured exception handling pointers and execute arbitrary code.
DNS Queries to RMM Domains from Non-Browser Processes
2 rules 74 IOCsDetection of DNS queries to known remote monitoring and management (RMM) domains originating from non-browser processes on Windows systems indicates potential abuse of legitimate software for command and control.
Lavavo CD Ripper 4.20 SEH Buffer Overflow Vulnerability
2 rules 1 TTPLavavo CD Ripper 4.20 is vulnerable to a structured exception handling (SEH) buffer overflow, allowing local attackers to execute arbitrary code by supplying a malicious string in the License Activation Name field leading to arbitrary code execution and a bind shell.
Admin Express 1.2.5.485 Local SEH Buffer Overflow Vulnerability
2 rules 2 TTPsAdmin Express 1.2.5.485 is susceptible to a local structured exception handling buffer overflow vulnerability, enabling local attackers to execute arbitrary code via a crafted payload in the Folder Path field of the System Compare feature.
RegPwnBOF Registry Symlink Race Condition Exploit
2 rules 2 TTPsRegPwnBOF exploits a registry symlink race condition in the Windows Accessibility ATConfig mechanism, enabling a normal user to write arbitrary values to protected HKLM registry keys for persistence and privilege escalation.
EmEditor Supply Chain Compromise Delivering Infostealer
2 rules 1 TTPA trojanized EmEditor installer was distributed through a trusted source, delivering an infostealer, highlighting how attackers exploit legitimate software distribution channels to bypass user trust and security controls.
NetNTLM Hash Phishing via Archive Extraction (CVE-2025-59284)
2 rules 1 TTPA phishing technique, potentially still viable due to incomplete patching, allows attackers to obtain NetNTLM hashes from archive extraction on Windows systems (CVE-2025-59284).
Credential Guard Bypass and Detection Strategies
2 rules 2 TTPs 1 IOCThis brief covers offensive techniques to bypass Credential Guard, a Windows security feature designed to protect credentials, and provides detection strategies for these bypass attempts.
Stealthy WMI Lateral Movement via StealthyWMIExec.py
2 rules 1 TTPThe StealthyWMIExec.py script facilitates lateral movement via WMI, potentially evading standard detection mechanisms by employing stealthy techniques.
GlassWorm Campaign Deploying Wave 3 Windows Payload
2 rules 2 TTPsThe GlassWorm campaign has been observed deploying a Wave 3 Windows payload, indicating ongoing malicious activity targeting Windows systems.
Malware Spreading Through Fake 'Claude Code' Google Ads
2 rules 1 TTPMalware is distributed via malicious advertisements on Google impersonating 'Claude Code', targeting both Windows and macOS operating systems with the goal of infecting users.
RegPwn Windows Local Privilege Escalation Vulnerability
2 rules 1 TTPRegPwn is a now-fixed local privilege escalation vulnerability in Windows that allowed an attacker to gain elevated privileges.
Potential Web Shell ASPX File Creation
2 rules 1 TTPThe creation of ASPX files in web server directories, excluding legitimate processes, indicates potential web shell deployment for persistence on Windows systems.
Active Directory Group Modification by SYSTEM Account
2 rules 2 TTPsDetection of a user being added to an Active Directory group by the SYSTEM account (S-1-5-18) can indicate an attacker with SYSTEM privileges attempting to pivot to a domain account.
WDAC Policy File Creation by Unusual Process
2 rules 1 TTPAdversaries may use a specially crafted Windows Defender Application Control (WDAC) policy to restrict the execution of security products, detected by unusual process creation of WDAC policy files.
MsiExec Child Process Spawning Network Connections for Defense Evasion
2 rules 1 TTPDetection of MsiExec spawning child processes that initiate network connections, potentially indicating abuse of Windows Installers for malware delivery and defense evasion.
Persistence via Windows Installer (Msiexec)
3 rules 3 TTPsAdversaries may establish persistence by abusing the Windows Installer (msiexec.exe) to create scheduled tasks or modify registry run keys, allowing for malicious code execution upon system startup or user logon.
Unsigned DLL Loaded by DNS Service
2 rules 3 TTPsThe rule identifies the loading of unusual or unsigned DLLs by the DNS Server process, which can indicate exploitation of the ServerLevelPluginDll functionality, potentially leading to privilege escalation and remote code execution with SYSTEM privileges.
Potential Veeam Credential Access via SQL Commands
2 rules 5 TTPsAttackers can leverage sqlcmd.exe or PowerShell commands like Invoke-Sqlcmd to access Veeam credentials stored in MSSQL databases, potentially targeting backups for destructive operations such as ransomware attacks.
NTDS Dump via Wbadmin
2 rules 2 TTPsAttackers with Backup Operator privileges may abuse wbadmin.exe to access the NTDS.dit file, enabling credential dumping and domain compromise.
Microsoft Management Console File Execution from Unusual Path
2 rules 4 TTPsAdversaries may use Microsoft Management Console (MMC) files from untrusted paths to bypass security controls for initial access and execution on Windows systems.
DNS Global Query Block List Modified or Disabled
2 rules 3 TTPsAttackers with DNSAdmin privileges can modify or disable the DNS Global Query Block List (GQBL) in Windows, allowing exploitation of hosts running WPAD with default settings for privilege escalation and lateral movement.
Suspicious Registry Hive Access via RegBack
2 rules 1 TTPThis rule detects attempts to access registry backup hives (SAM, SECURITY, SYSTEM) via RegBack on Windows systems, which can contain or enable access to credential material.
Suspicious DNS-Named Record Creation in Active Directory Integrated DNS
2 rules 1 TTPDetection of DNS record creation by non-system accounts within Active Directory Integrated DNS (ADIDNS), which attackers can abuse to perform Dynamic Spoofing attacks, potentially targeting services like WPAD for credential access.
Windows Parent Process PID Spoofing Detection
3 rules 1 TTPAdversaries use parent process PID spoofing to evade detection by creating processes with mismatched parent-child relationships, hindering process monitoring and potentially elevating privileges on Windows systems.
Potential ADIDNS Poisoning via Wildcard Record Creation
2 rules 1 TTPAttackers can create wildcard records in Active Directory Integrated DNS (ADIDNS) to redirect traffic, enabling adversary-in-the-middle attacks for credential interception or relay.
Suspicious Child Processes from Communication Applications
3 rules 3 TTPsThe detection rule identifies suspicious child processes spawned from communication applications on Windows systems, potentially indicating masquerading or exploitation of vulnerabilities within these applications.
Network-Level Authentication (NLA) Disabled via Registry Modification
2 rules 2 TTPsAdversaries may disable Network-Level Authentication (NLA) by modifying specific registry keys to bypass authentication requirements for Remote Desktop Protocol (RDP) and enable persistence mechanisms.
Potential Enumeration via Active Directory Web Service
2 rules 3 TTPsAdversaries may abuse the Active Directory Web Service (ADWS) to enumerate network resources and user accounts, by loading AD-related modules followed by a network connection to the ADWS dedicated TCP port.
Wireless Credential Dumping via Netsh
2 rules 2 TTPsAdversaries use the Windows built-in utility Netsh to dump Wireless saved access keys in clear text, potentially leading to credential compromise.
Windows Console History Clearing
2 rules 2 TTPsAdversaries may clear the command history of a compromised account to conceal the actions undertaken during an intrusion on a Windows system.
System File Ownership Change for Defense Evasion
3 rules 1 TTPAdversaries may modify file or directory ownership to evade access control lists (ACLs) and access protected files, often using icacls.exe or takeown.exe to reset permissions on system files.
Suspicious Windows Process Cluster from Parent Process via Machine Learning
2 rules 2 TTPsA machine learning model detected a parent process spawning a cluster of suspicious Windows processes with high malicious probability scores, potentially indicating LOLBins usage and defense evasion.
Potential Account Takeover via Mixed Logon Types
2 rules 1 TTPA Windows account, usually a service account, exhibiting a sudden shift in logon type patterns may indicate account compromise and lateral movement.
Netsh Helper DLL Persistence
2 rules 2 TTPsAttackers may abuse the Netsh Helper DLL functionality by adding malicious DLLs to execute payloads every time the netsh utility is executed via administrators or scheduled tasks, achieving persistence.
Expired or Revoked Driver Loaded
2 rules 3 TTPsAn expired or revoked driver being loaded on a Windows system may indicate an attempt to gain code execution in kernel mode or abuse revoked certificates for malicious purposes, potentially leading to privilege escalation or defense evasion.
MsXsl.exe Network Connection for Defense Evasion
2 rules 2 TTPsMsxsl.exe, a legitimate Windows utility, is being abused by adversaries to make network connections to non-local IPs for command and control or data exfiltration, potentially bypassing security measures.
VaultCmd Usage for Listing Windows Credentials
2 rules 2 TTPsAdversaries may use vaultcmd.exe to list credentials stored in the Windows Credential Manager to gain unauthorized access to saved usernames and passwords, potentially in preparation for lateral movement.
Suspicious Managed Code Hosting Process
2 rules 1 TTPThis rule detects suspicious managed code hosting processes on Windows systems, potentially indicating code injection or defense evasion tactics by monitoring file events associated with processes commonly used to host managed code, such as wscript.exe, cscript.exe, and mshta.exe.
Program Files Directory Masquerading
2 rules 1 TTPAdversaries may masquerade malicious executables within directories mimicking the legitimate Windows Program Files directory to evade defenses and execute untrusted code.
Multiple Logon Failure from the Same Source Address
2 rules 2 TTPsDetection of multiple consecutive logon failures from the same source address within a short time interval on Windows systems, indicating potential brute force or password spraying attacks targeting multiple user accounts.
Potential Remote Install via MsiExec
2 rules 1 TTPThis rule detects attempts to install a file from a remote server using MsiExec, which adversaries may abuse to deliver malware, by identifying msiexec.exe processes running with arguments indicative of remote installations and executed from suspicious parent processes.
Potential Exploitation of an Unquoted Service Path Vulnerability
2 rules 1 TTPThis rule detects potential exploitation of unquoted service path vulnerabilities, where adversaries may escalate privileges by placing a malicious executable in a higher-level directory within the path of an unquoted service executable.
Remote File Download via Script Interpreter
2 rules 3 TTPsAttackers are using Windows script interpreters (cscript.exe or wscript.exe) to download executable files from remote locations to deliver second-stage payloads or download tools.
Kerberos Pre-authentication Disabled for User Account
3 rules 4 TTPsDetection of Kerberos pre-authentication being disabled for a user account, potentially leading to AS-REP roasting and offline password cracking by attackers with GenericWrite or GenericAll rights over the account.
AMSI Enable Registry Key Modification for Defense Evasion
2 rules 1 TTPAdversaries modify the AmsiEnable registry key to 0 to disable Windows Script AMSI scanning, bypassing AMSI protections for Windows Script Host or JScript execution.
Microsoft Office 'Office Test' Registry Persistence Abuse
2 rules 2 TTPsAttackers modify the Microsoft Office 'Office Test' Registry key to achieve persistence by specifying a malicious DLL that executes upon application startup.
Active Directory msPKIAccountCredentials Modification
2 rules 2 TTPsAttackers can modify the msPKIAccountCredentials attribute in Active Directory user objects to abuse credential roaming, potentially overwriting files for privilege escalation, by injecting malicious credential objects.
Suspicious Alternate Data Stream (ADS) File Creation
2 rules 1 TTPDetects suspicious creation of Alternate Data Streams (ADS) on targeted files using script or command interpreters, indicative of malware hiding in ADS for defense evasion.
System Shells Launched via Windows Services
2 rules 4 TTPsAttackers may configure existing services or create new ones to execute system shells to elevate their privileges from administrator to SYSTEM, using services.exe as the parent process of the shell.
PowerShell Kerberos Ticket Dumping via LSA Authentication Package Access
2 rules 1 TTPDetection of PowerShell scripts attempting to dump Kerberos tickets from memory by accessing LSA authentication packages, potentially leading to credential access and lateral movement.
LSASS Credential Dumping via Windows Error Reporting (WER) Abuse
2 rules 2 TTPsAttackers can enable full user-mode dumps system-wide via registry modification to facilitate LSASS credential dumping, allowing extraction of credentials from process memory without deploying malware.
Group Policy Discovery via Microsoft GPResult Utility
2 rules 1 TTPDetects the execution of `gpresult.exe` with arguments `/z`, `/v`, `/r`, or `/x` on Windows systems, which attackers may use during reconnaissance to enumerate Group Policy Objects and identify opportunities for privilege escalation or lateral movement.
Detection of Malicious Browser Extension Installation
2 rulesThis rule identifies the installation of potentially malicious browser extensions, which adversaries can leverage for persistence and unauthorized activity by monitoring file creation events in common browser extension directories on Windows systems.
Unusual Network Connection via RunDLL32
2 rules 2 TTPsThe rule detects unusual outbound network connections made by rundll32.exe, specifically when executed with minimal arguments, which may indicate command and control activity or defense evasion tactics on Windows systems.
Persistence via BITS Job Notify Cmdline
2 rules 1 TTPAdversaries can achieve persistence by abusing the Background Intelligent Transfer Service (BITS) SetNotifyCmdLine method to execute a program after a job finishes, leading to arbitrary code execution and system compromise.
Suspicious Microsoft Diagnostics Wizard Execution
3 rules 1 TTPThis rule detects potential abuse of the Microsoft Diagnostics Troubleshooting Wizard (MSDT) to proxy malicious command or binary execution via malicious process arguments on Windows systems.
Unusual Executable File Creation by a System Critical Process
2 rules 1 TTPThe rule identifies unexpected executable file creation or modification by critical Windows processes, potentially indicating remote code execution or exploitation attempts.
First Time Seen Account Performing DCSync
2 rules 1 TTPDetection of a user account initiating the Active Directory replication process for the first time, potentially indicating a DCSync attack for credential theft and domain compromise.
Detecting Rare SMB Connections for Potential NTLM Credential Theft
2 rules 2 TTPsThis brief details a detection strategy for rare SMB connections originating from internal networks to the internet, potentially indicating NTLM credential theft via rogue UNC path injection.
Windows Script Execution from Archive File
2 rules 3 TTPsThis rule identifies attempts to execute Jscript/Vbscript files from an archive file, a common delivery method for malicious scripts on Windows systems.
Unusual Process Performing NewCredentials Logon
2 rules 1 TTPAnomalous NewCredentials logon events triggered by uncommon processes may indicate access token manipulation for privilege escalation.
Unusual Group Name Accessed by User via Privileged Access Detection
2 rules 5 TTPsA machine learning job detected a user accessing an uncommon group name for privileged operations, potentially indicating privilege escalation or unauthorized account manipulation on a Windows system.
Executable File Creation with Multiple Extensions
2 rules 2 TTPsDetection of executable files created with multiple extensions, a masquerading technique to evade defenses.
Credential Acquisition via Registry Hive Dumping
2 rules 1 TTPDetects attempts to export sensitive Windows registry hives (SAM/SECURITY) using reg.exe, potentially leading to credential compromise.
Spike in Number of Processes in an RDP Session
2 rules 2 TTPsA machine learning job has detected an unusually high number of processes started within a single Remote Desktop Protocol (RDP) session, potentially indicating lateral movement activity.
Windows Defender Disabled via Registry Modification
2 rules 3 TTPsAttackers modify the Windows Defender registry settings to disable the service or set the service to be started manually, evading defenses.
Unusual Process Spawned by a Parent Process via Machine Learning
2 rules 2 TTPsA machine learning job detected a suspicious Windows process, predicted malicious by the ProblemChild model and flagged as an unusual child process name for its parent, potentially indicating LOLbins usage and evading traditional detection.
Renamed Automation Script Interpreter
2 rules 1 TTPDetects the renaming of automation script interpreter processes like AutoIt, AutoHotkey, and KIX32, a tactic used by malware operators to evade detection by obscuring the true nature of the executable.
Suspicious WMIC XSL Script Execution
2 rules 3 TTPsThis rule detects suspicious execution of scripts via WMIC, potentially used for allowlist bypass, by identifying WMIC executions with atypical arguments and the loading of specific libraries like jscript.dll or vbscript.dll for defense evasion and execution.
ProblemChild ML Detection of Suspicious Windows Processes
2 rules 2 TTPsThe ProblemChild machine learning model has detected a user with suspicious Windows processes exhibiting unusually high malicious probability scores, potentially indicating defense evasion via masquerading or LOLbins.
Potential Ransomware Behavior - Note Files Dropped via SMB
2 rules 4 TTPsThis rule detects potential ransomware behavior by identifying the creation of multiple files with the same name over SMB by the SYSTEM account, potentially indicating remote execution of ransomware dropping note files.
Detection of Sensitive LDAP Attribute Access
2 rules 5 TTPsThis rule detects unauthorized access to sensitive Active Directory object attributes such as unixUserPassword, ms-PKI-AccountCredentials, and msPKI-CredentialRoamingTokens, potentially leading to credential theft and privilege escalation.
Detect Suspicious Windows Service Installation
2 rules 1 TTPThis detection identifies the creation of new Windows services with suspicious command values, often used for privilege escalation and persistence by malicious actors.
NLTEST.EXE Used for Domain Trust Discovery
2 rules 2 TTPsAdversaries may use the `nltest.exe` command-line utility to enumerate domain trusts and gain insight into trust relationships to facilitate lateral movement within a Microsoft Windows NT Domain.
Windows Sandbox Abuse with Sensitive Configuration
3 rules 1 TTPThis rule detects the abuse of Windows Sandbox with sensitive configurations to evade detection, where malware may abuse the sandbox feature to gain write access to the host file system, enable network connections, and automatically execute commands via logon, identifying the start of a new container with these sensitive configurations.
PowerShell Kerberos Ticket Request via KerberosRequestorSecurityToken
2 rules 1 TTPThis rule detects PowerShell scripts that request Kerberos service tickets using KerberosRequestorSecurityToken, potentially indicating Kerberoasting attacks for offline password cracking of service accounts.
Unsigned DLL Loaded by Svchost for Persistence and Privilege Escalation
2 rules 4 TTPs 5 IOCsAdversaries may load unsigned DLLs into svchost.exe to establish persistence or escalate privileges, leveraging a shared Windows service to execute malicious code with elevated permissions.
Microsoft Build Engine Started by an Office Application
2 rules 1 TTPThe Microsoft Build Engine (MSBuild) being started by an Office application is unusual behavior and could indicate a malicious document executing a script payload for defense evasion.
Potential Antimalware Scan Interface Bypass via PowerShell
3 rules 1 TTPThis rule detects PowerShell scripts that attempt to bypass the Antimalware Scan Interface (AMSI) in order to disable scanning and execute malicious PowerShell code undetected.
Potential Local NTLM Relay via HTTP
2 rules 1 TTPAdversaries may coerce local NTLM authentication over HTTP via WebDAV named-pipe paths (Print Spooler, SRVSVC), then relay credentials to elevate privileges.
Multiple Logon Failure Followed by Logon Success
2 rules 1 TTPThis rule identifies potential password guessing/brute force activity from a single address, followed by a successful logon, indicating that an attacker may have compromised an account by brute-forcing login attempts across multiple users.
Account Discovery Command via SYSTEM Account
3 rules 3 TTPsThe rule identifies when the SYSTEM account uses an account discovery utility, potentially indicating discovery activity after privilege escalation, focusing on utilities like whoami.exe and net1.exe executed under the SYSTEM account.
Suspicious LSASS Access via Malicious Secondary Logon Service
3 rules 1 TTPAn attacker abuses the Secondary Logon service (seclogon.dll) to gain unauthorized access to the LSASS process, potentially leaking credentials.
Persistence via Scheduled Job Creation
2 rules 1 TTPThis detection rule identifies attempts to establish persistence on Windows systems by creating scheduled jobs in the Windows Tasks directory, excluding known legitimate jobs.
LSASS Process Access via Windows API
2 rules 2 TTPsDetection of access attempts to the LSASS handle, indicating potential credential dumping by monitoring API calls (OpenProcess, OpenThread, ReadProcessMemory) targeting lsass.exe.
Potential Timestomping of Executable Files on Windows
2 rules 1 TTPThis rule identifies potential timestomping behavior on Windows systems where the creation time of executable files in sensitive system directories is modified, potentially to blend malicious executables with legitimate system files and evade detection.
MSBuild Making Network Connections
2 rules 2 TTPsDetection of MsBuild.exe making outbound network connections which may indicate adversarial activity used to execute code and evade detection.
IIS AppCmd Tool Used to Dump Service Account Credentials
2 rules 2 TTPsAttackers with access to IIS web servers may use the AppCmd command-line tool to dump sensitive configuration data, including application pool credentials, potentially leading to lateral movement and privilege escalation.
Disabling Windows Defender Security Settings via PowerShell
2 rules 2 TTPsAttackers use PowerShell commands, including base64-encoded variants, to disable or weaken Windows Defender settings, impairing defenses on compromised systems.
Detection of Custom Shim Database Installation for Persistence
2 rules 1 TTPAttackers abuse the Application Compatibility Shim functionality in Windows to establish persistence and achieve arbitrary code execution by installing malicious shim databases, which this detection identifies through monitoring registry changes.
Rundll32 Execution with DLL Stored in Alternate Data Stream (ADS)
2 rules 1 TTPAdversaries may use rundll32.exe to execute DLLs stored within alternate data streams (ADS) to bypass security controls and conceal malicious code.
Detection of Downloaded URL Files Used in Phishing Campaigns
2 rules 3 TTPsThis detection rule identifies downloaded .url shortcut files on Windows systems, often used in phishing campaigns, by monitoring their creation events and flagging those from non-local sources, enabling early threat detection.
Detection of Wevtutil.exe Used to Disable Event Logs
2 rules 1 TTPThe execution of `wevtutil.exe` with parameters to disable event logs is a tactic commonly employed by ransomware to evade detection and hinder forensic investigations, leading to a significant reduction in visibility for defenders.
Unusual Service Host Child Process - Childless Service
2 rules 2 TTPsThis detection identifies unusual child processes of Service Host (svchost.exe) that traditionally do not spawn child processes, potentially indicating code injection or exploitation.
UAC Bypass via DiskCleanup Scheduled Task Hijack
2 rules 3 TTPsAttackers bypass User Account Control (UAC) by hijacking the DiskCleanup Scheduled Task to stealthily execute code with elevated permissions on Windows systems.
Process Execution from Suspicious Windows Directories
2 rules 1 TTPAdversaries may execute processes from unusual default Windows directories to masquerade malware and evade defenses by blending in with trusted paths, making malicious activity harder to detect.
Persistence via Malicious Microsoft Outlook VBA Template
2 rules 1 TTPAttackers establish persistence by installing a malicious VBA template in Microsoft Outlook, triggering scripts upon application startup by modifying the VBAProject.OTM file, detected by monitoring for unauthorized file modifications.
Detection of Command and Control Activity via Commonly Abused Web Services
2 rules 2 TTPsThis rule detects command and control activity using common web services by identifying Windows hosts making DNS requests to a list of commonly abused web services from processes outside of known program locations, potentially indicating adversaries attempting to blend malicious traffic with legitimate network activity.
DCOM Lateral Movement via ShellWindows/ShellBrowserWindow
2 rules 2 TTPsThis analytic identifies the use of Distributed Component Object Model (DCOM) to execute commands on a remote host, specifically when launched via ShellBrowserWindow or ShellWindows Application COM objects, indicating potential lateral movement by an attacker.
Abuse of Windows Update Client for DLL Loading
2 rules 3 TTPsThe Windows Update Auto Update Client (wuauclt.exe) is being abused to load arbitrary DLLs, a defense evasion technique where malicious activity blends with legitimate Windows software by using specific process arguments and placing DLLs in writable paths.
Disable Windows Event and Security Logs Using Built-in Tools
3 rules 3 TTPsAttackers attempt to disable Windows Event and Security Logs using logman, PowerShell, or auditpol to evade detection and cover their tracks.
Unusual Time or Day for an RDP Session Detected by Machine Learning
2 rules 2 TTPsA machine learning job detected an RDP session initiated at an unusual time or day, potentially indicating lateral movement activity within a network.
Process Activity via Compiled HTML File Execution
2 rules 5 TTPsAdversaries may conceal malicious code in compiled HTML files (.chm) and deliver them to a victim for execution, using the HTML Help executable (hh.exe) to proxy the execution of scripting interpreters and bypass security controls.
Detection of Downloaded Shortcut Files
2 rules 3 TTPsThis rule detects potentially malicious .lnk shortcut files downloaded from outside the local network on Windows systems, which are commonly used in phishing campaigns.
Symbolic Link Creation to Shadow Copies for Credential Access
2 rules 3 TTPsAdversaries may create symbolic links to shadow copies to access sensitive files such as ntds.dit and browser credentials, enabling credential dumping using cmd.exe or powershell.exe.
InstallUtil Process Making Network Connections for Defense Evasion
2 rules 1 TTPDetection of InstallUtil.exe making outbound network connections, which can indicate adversaries leveraging it to execute code and evade detection by proxying execution through a trusted system binary.
Browser Process Spawned from an Unusual Parent
2 rules 1 TTPAttackers may attempt credential theft by launching browsers (Chrome, Edge) with remote debugging, headless automation, or minimal arguments from an unusual parent process on Windows systems.
Potential Command and Control via Internet Explorer COM Abuse
2 rules 4 TTPsThis rule detects potential command and control activity where Internet Explorer (iexplore.exe) is started via the Component Object Model (COM) and makes unusual network connections, indicating adversaries might exploit Internet Explorer via COM to evade detection and bypass host-based firewall restrictions.
Suspicious Windows Process Cluster Detection via Machine Learning
2 rules 2 TTPsA machine learning job combination has identified a host with one or more suspicious Windows processes that exhibit unusually high malicious probability scores, potentially indicating masquerading and defense evasion tactics.
Suspicious Execution via Scheduled Task
2 rules 2 TTPsThis rule identifies execution of suspicious programs via scheduled tasks by looking at process lineage and command line usage, detecting processes such as cscript.exe, powershell.exe, and cmd.exe when executed from suspicious paths like C:\Users\ and C:\ProgramData\.
PowerShell Suspicious Payload Encoded and Compressed
2 rules 1 TTPDetects PowerShell scripts employing Base64 decoding combined with .NET decompression (Deflate/GZip) to deobfuscate and reconstruct malicious payloads in memory, evading traditional defenses.
Potential Credential Access via LSASS Handle Duplication
2 rules 1 TTPDetection of suspicious LSASS handle access via DuplicateHandle from an unknown call trace module, indicating a potential attempt to bypass the NtOpenProcess API to evade detection and dump LSASS memory for credential access.
SeEnableDelegationPrivilege Assignment Detection
3 rules 2 TTPsDetection of the assignment of the SeEnableDelegationPrivilege user right to a principal can indicate potential Active Directory compromise and privilege elevation by attackers.
Windows Account Discovery of Administrator Accounts
2 rules 4 TTPsAdversaries may execute the `net.exe` or `wmic.exe` commands to enumerate administrator accounts or groups, both locally and within the domain, to gather information for follow-on actions.
Mimikatz MemSSP Log File Detection
2 rules 1 TTP 1 IOCThis rule detects the creation of the default Mimikatz MemSSP credential log file, mimilsa.log, which is created after the misc::memssp module injects a malicious Security Support Provider into LSASS, potentially capturing credentials from subsequent logons.
Windows Subsystem for Linux Distribution Installed via Registry Modification
2 rules 3 TTPsThis rule detects registry modifications indicative of a new Windows Subsystem for Linux (WSL) distribution installation, a technique adversaries may leverage to evade detection by utilizing Linux environments within Windows.
Detection of Bcdedit Boot Configuration Modification
2 rules 1 TTPThis rule identifies the use of bcdedit.exe to modify boot configuration data, which may be indicative of a destructive attack or ransomware activity aimed at inhibiting system recovery by disabling error recovery or ignoring boot failures.
Remote File Download via PowerShell
2 rules 2 TTPsDetects PowerShell being used to download executable files from untrusted remote destinations, a common technique for attackers to introduce tooling or malware into a compromised environment.
Windows Time-Based Evasion via Choice Exec
2 rules 1 TTPDetection of choice.exe used in batch files for time-based evasion, a technique observed in SnakeKeylogger malware, indicating potential stealthy code execution and persistence.
Windows Service Security Descriptor Tampering via sc.exe
2 rules 2 TTPsAdversaries may modify service security descriptors to deny access to specific groups, potentially escalating privileges and hindering security services, by using sc.exe to set new deny ACEs (Access Control Entries) on Windows services.
Windows Backup Deletion via Wbadmin
2 rules 2 TTPsAdversaries may delete Windows backup catalogs and system state backups using wbadmin.exe to inhibit system recovery, often as part of ransomware or other destructive attacks.
Unusual Network Activity from Windows System Binaries
3 rules 5 TTPsDetection of network connections initiated by unusual Windows system binaries, often leveraged by adversaries to proxy execution of malicious code and evade detection, indicating potential defense evasion and command and control activity.
Suspicious Process Access via Direct System Call
2 rules 3 TTPsDetects suspicious process access events where the call trace does not originate from known Windows system DLLs, indicating potential defense evasion by bypassing hooked APIs via direct syscalls.
Suspicious MSIExec Remote Download
2 rules 2 TTPsThe analytic detects the execution of msiexec.exe with an HTTP or HTTPS URL, which indicates an attempt to download and execute potentially malicious software from a remote server, leading to potential unauthorized code execution, system compromise, or malware deployment.
Suspicious Enumeration Commands Spawned via WMIPrvSE
2 rules 12 TTPsThis rule detects suspicious execution of system enumeration commands by the Windows Management Instrumentation Provider Service (WMIPrvSE), indicating potential reconnaissance or malicious activity on Windows systems.
Suspicious Antimalware Scan Interface DLL Creation
2 rules 1 TTPAn adversary may attempt to bypass AMSI by creating a rogue AMSI DLL in an unusual location to evade detection.
Spike in Special Privilege Use Events
2 rules 4 TTPsA machine learning job detected an unusual increase in special privilege usage events on Windows, such as privileged operations and service calls, potentially indicating unauthorized privileged access and privilege escalation attempts.
Script Execution via Microsoft HTML Application
3 rules 1 TTPDetects the execution of scripts via HTML applications using Windows utilities rundll32.exe or mshta.exe to bypass defenses by proxying execution of malicious content with signed binaries.
Potential Remote Credential Access via Registry
2 rules 2 TTPsDetects remote access to the registry, potentially dumping credential data from the Security Account Manager (SAM) registry hive, indicating preparation for credential access and privilege elevation.
Potential NTLM Relay Attack against a Computer Account
2 rulesThis rule detects potential NTLM relay attacks against computer accounts by identifying coercion attempts followed by authentication events originating from a different host, indicating that an attacker has captured and relayed the server's computer account hash to execute code on behalf of the compromised system.
Execution of Persistent Suspicious Programs via Run Keys
2 rules 8 TTPsThis analytic identifies suspicious programs such as script interpreters, rundll32, or MSBuild being executed shortly after user logon, indicating potential persistence mechanisms abusing the registry run keys.
Detection of Command and Control Activity via Common Web Services
2 rules 1 TTPThis rule detects command and control (C2) communications that use common web services to hide malicious activity on Windows hosts by identifying network connections to commonly abused web services from processes outside of known legitimate program locations, indicating potential exfiltration or C2 activity blended with legitimate traffic.
Conhost Proxy Execution for Defense Evasion
3 rules 1 TTPAdversaries abuse the Console Window Host (conhost.exe) with the `--headless` argument to proxy execution of malicious commands, evading detection by blending in with legitimate Windows software.
Attrib.exe Used to Hide Files and Directories
2 rules 1 TTPDetection of attrib.exe being used with the +h flag to hide files and directories on Windows systems, a technique used by attackers for defense evasion and persistence.
Potential Shadow Credentials added to AD Object
2 rules 2 TTPsThis rule detects the modification of the msDS-KeyCredentialLink attribute in an Active Directory Computer or User Object, which could indicate an attacker is creating shadow credentials to gain persistent and stealthy access.
Windows Firewall Disabled via Netsh
2 rules 1 TTPDetection of adversaries disabling Windows Firewall rules using the `netsh.exe` command-line tool to weaken defenses and facilitate unauthorized network activity.
Unusual Process Loading Mozilla NSS/Mozglue Module
2 rules 1 TTPDetection of processes loading Mozilla NSS/Mozglue libraries (mozglue.dll, nss3.dll) outside of known Mozilla applications, potentially indicating malware or unauthorized activity.
Suspicious Scripts in the Startup Directory
2 rules 2 TTPsThis rule identifies script engines creating files or the creation of script files in the Windows Startup folder, a persistence technique used by adversaries to automatically execute scripts upon user login.
Suspicious PowerShell Execution via Windows Script Host
2 rules 4 TTPsDetection of PowerShell processes launched by cscript.exe or wscript.exe, indicative of potential malicious initial access or execution attempts.
MSIExec Spawning Discovery Commands
2 rules 1 TTPDetection of msiexec.exe spawning discovery commands indicating potential reconnaissance activity by attackers for system information gathering and lateral movement.
Suspicious Process Accessing Browser Password Store
2 rules 1 TTPDetection of non-browser processes accessing browser user data folders, a tactic used by malware such as Snake Keylogger to steal credentials and sensitive information.
Windows User Account Creation via Net.exe
2 rules 2 TTPsThis rule identifies attempts to create new users on Windows systems using net.exe, a common tactic used by attackers to increase access or establish persistence.
Unusual Network Connection via DllHost
2 rules 2 TTPsThe rule identifies unusual instances of dllhost.exe making outbound network connections to non-local IPs, which may indicate adversarial Command and Control activity and defense evasion.
Unsigned DLL Side-Loading from Suspicious Folders by Trusted Processes
2 rules 2 TTPsThis detection identifies a Windows trusted program running from locations often abused by adversaries to masquerade as a trusted program and loading a recently dropped unsigned DLL, which indicates an attempt to evade defenses via side-loading a malicious DLL within the memory space of a signed process.
Suspicious Process Writing to Startup Folder for Persistence
2 rules 1 TTPAdversaries may establish persistence by writing malicious files to the Windows Startup folder, allowing them to automatically execute upon user logon; this detection identifies suspicious processes creating files in these locations.
Suspicious PowerShell Engine ImageLoad
2 rules 1 TTPThis rule identifies instances where the PowerShell engine is loaded by processes other than powershell.exe, potentially indicating attackers attempting to use PowerShell functionality stealthily by using the underlying System.Management.Automation namespace and bypassing PowerShell security features.
Suspicious Execution from a Mounted Device
2 rules 9 TTPsAttackers may use mounted devices as a non-standard working directory to execute signed binaries or script interpreters, evading traditional defense mechanisms, particularly when launched via explorer.exe.
Suspicious CertUtil Commands Used for Defense Evasion
2 rules 3 TTPsAttackers abuse certutil.exe, a native Windows utility, to download/deobfuscate malware for command and control or data exfiltration, evading defenses.
Remote Execution via File Shares
2 rules 2 TTPsThis rule identifies the execution of a file that was created by the virtual system process, potentially indicating lateral movement via network file shares in Windows environments.
Remote Execution via File Shares
2 rules 2 TTPsThe rule identifies the execution of a file created by the virtual system process, potentially indicating lateral movement via network file shares, by detecting a sequence of file creation/modification followed by process execution, excluding trusted vendors.
Potential RemoteMonologue Attack via Registry Modification
2 rules 4 TTPsThis rule detects potential RemoteMonologue attacks by identifying attempts to perform session hijacking via COM object registry modification, specifically when the RunAs value is set to Interactive User.
Potential Defense Evasion via Filter Manager (fltMC.exe)
2 rules 1 TTPAdversaries may abuse the Filter Manager Control Program (fltMC.exe) to unload filter drivers, thereby evading security software defenses such as malware detection and file system monitoring.
Kerberos Traffic from Unusual Process
2 rules 2 TTPsDetects network connections to the standard Kerberos port from an unusual process other than lsass.exe, potentially indicating Kerberoasting or Pass-the-Ticket activity on Windows systems.
Execution from Unusual Directory - Command Line
2 rules 2 TTPsThis rule identifies process execution from suspicious default Windows directories, which adversaries may abuse to hide malware in trusted paths to evade defenses.
Detecting Remote Windows Service Installation for Lateral Movement
2 rules 3 TTPsThis rule detects a network logon followed by Windows service creation with the same LogonId on a Windows host, which could indicate lateral movement or persistence by adversaries.
WMI Incoming Lateral Movement
3 rules 2 TTPsDetection of processes executed via Windows Management Instrumentation (WMI) on a remote host indicating potential adversary lateral movement.
Windows USN Journal Deletion via Fsutil
2 rules 1 TTPAdversaries may delete the volume USN Journal on Windows systems using `fsutil.exe` to eliminate evidence of post-exploitation file activity.
Windows Subsystem for Linux Enabled via Dism Utility
2 rules 1 TTPAdversaries may enable and use Windows Subsystem for Linux (WSL) using the Microsoft Dism utility to evade detection on Windows systems by running Linux applications and tools.
Windows Script Interpreter Executing Process via WMI
2 rules 4 TTPsThe rule identifies the use of Windows script interpreters (cscript.exe or wscript.exe) executing a process via Windows Management Instrumentation (WMI), which may indicate malicious activity, especially when initiated by non-system accounts.
Windows Scheduled Tasks AT Command Enabled via Registry Modification
2 rules 2 TTPsAttackers may enable the deprecated Windows AT command via registry modification to achieve local persistence or lateral movement.
Windows Remote Desktop Network Bruteforce Attempt
2 rules 1 TTPThis detection identifies potential RDP brute force attacks by monitoring network traffic for RDP application activity by detecting source IPs that have made more than 10 connection attempts to the same RDP port on a host within a one-hour window.
Windows Netsh Tool Used for Firewall Discovery
2 rules 1 TTPThe analytic detects the execution of the Windows built-in tool netsh.exe to display the state, configuration, and profile of the host firewall, potentially leading to unauthorized network access or data exfiltration.
Windows Host Network Discovery Enabled via Netsh
2 rules 1 TTPAttackers can enable host network discovery via netsh.exe to weaken host firewall settings, facilitating lateral movement by identifying other systems on the network.
Windows Firewall Disabled via PowerShell
2 rules 2 TTPsAttackers may disable the Windows firewall or its rules using the `Set-NetFirewallProfile` PowerShell cmdlet to enable lateral movement and command and control activity.
Windows Files and Dirs Access Rights Modification via Icacls
2 rules 1 TTPDetection of icacls.exe, cacls.exe, or xcacls.exe being used to modify file or directory permissions, often used by APTs and coinminers for defense evasion and persistence.
Windows Defender Exclusions Added via PowerShell
2 rules 3 TTPsAdversaries may attempt to bypass Windows Defender's capabilities by using PowerShell to add exclusions for folders or processes, and this activity can be detected by monitoring PowerShell command lines that use `Add-MpPreference` or `Set-MpPreference` with exclusion parameters.
Unusual System Utilities Initiating Network Connections
2 rules 3 TTPsAdversaries may leverage unusual system utilities such as Microsoft.Workflow.Compiler.exe, bginfo.exe, cdb.exe, cmstp.exe, csi.exe, dnx.exe, fsi.exe, ieexec.exe, iexpress.exe, odbcconf.exe, rcsi.exe and xwizard.exe to execute code and evade detection, as identified by network connections originating from these processes.
Unusual Scheduled Task Update
2 rules 1 TTPThis rule detects modifications to scheduled tasks by user accounts, excluding system activity and machine accounts, which adversaries can exploit for persistence by modifying them to execute malicious code.
Unusual Persistence via Services Registry Modification
2 rules 3 TTPsDetection of processes modifying the Windows services registry key directly, potentially indicating stealthy persistence attempts via abnormal service creation or modification.
Unusual Parent Process for cmd.exe
2 rules 1 TTPThe detection rule identifies cmd.exe instances spawned by uncommon parent processes, such as lsass.exe, csrss.exe, or regsvr32.exe, which may indicate unauthorized or suspicious activity, thus aiding in early threat detection.
Unsecured Outlook Credentials Access in Windows Registry
2 rules 1 TTPAn attacker attempts to access unsecured Outlook credentials stored in the Windows registry, potentially leading to unauthorized access to email accounts and sensitive information.
Uncommon Registry Persistence Change Detection
2 rules 2 TTPsThis rule detects changes to uncommon registry persistence keys on Windows systems that are not commonly used or modified by legitimate programs, which could indicate an adversary's attempt to persist in a stealthy manner by modifying registry keys for persistence, ensuring malicious code executes on startup or during specific events.
Suspicious Whoami Process Activity
2 rules 2 TTPsThis rule detects suspicious use of whoami.exe to display user, group, and privileges information for the user who is currently logged on to the local system, potentially indicating post-compromise discovery activity.
Suspicious Use of sc.exe for Remote Service Manipulation
3 rules 3 TTPsThe rule identifies the use of sc.exe to create, modify, or start services on remote hosts, potentially indicating lateral movement by adversaries.
Suspicious SMB Connections via LOLBin or Untrusted Process
3 rules 1 TTPThis rule identifies potentially suspicious processes, excluding those signed by Microsoft, making Server Message Block (SMB) network connections over port 445, which could indicate lateral movement attempts.
Suspicious Script Object Execution via scrobj.dll
2 rules 2 TTPsDetection of scrobj.dll loaded into unusual Microsoft processes indicates potential malicious scriptlet execution for defense evasion and execution by abusing legitimate system binaries.
Suspicious Process Execution from Unusual File Paths
2 rules 2 TTPsAttackers may execute malicious code from unusual file paths such as Windows fonts or debug directories to evade defenses and gain unauthorized access, as detected by endpoint detection and response (EDR) agents.
Suspicious Network Connection via Registration Utility
2 rules 4 TTPsThe native Windows tools regsvr32.exe, regsvr64.exe, RegSvcs.exe, or RegAsm.exe making a network connection may indicate an attacker bypassing allowlists or running arbitrary scripts via a signed Microsoft binary.
Suspicious MS Office Child Process
2 rules 18 TTPsDetects suspicious child processes of Microsoft Office applications, indicating potential exploitation or malicious macros for initial access, defense evasion, and execution.
Suspicious Mofcomp Activity
2 rules 2 TTPsThis rule detects suspicious mofcomp.exe activity, which attackers may leverage MOF files to manipulate the Windows Management Instrumentation (WMI) repository for execution and persistence by filtering out legitimate processes and focusing on unusual executions, excluding known safe parent processes and system accounts.
Suspicious Microsoft Antimalware Service Executable Execution
3 rules 1 TTPDetects suspicious execution of the Microsoft Antimalware Service Executable (MsMpEng.exe) from non-standard paths or renamed instances, which may indicate an attempt to evade defenses through DLL side-loading or masquerading.
Suspicious LSASS Process Access
3 rules 1 TTPThis rule identifies suspicious access attempts to the LSASS process, potentially indicating credential dumping attempts by filtering out legitimate processes and access patterns to focus on anomalies.
Suspicious Image Load (taskschd.dll) from MS Office
2 rules 2 TTPsDetection of taskschd.dll image loads from Microsoft Office applications indicates potential COM-based scheduled task creation for persistence, bypassing traditional schtasks.exe usage.
Suspicious HTML File Creation Leading to Potential Payload Delivery
3 rules 3 TTPsThis detection identifies the creation of HTML files with high entropy and large size, followed by execution via a browser process, indicating potential HTML smuggling and malicious payload delivery on Windows systems.
Suspicious Execution via Windows Subsystem for Linux
2 rules 3 TTPsAdversaries may leverage the Windows Subsystem for Linux (WSL) to execute malicious Linux commands, bypassing traditional Windows security measures, detected by monitoring process execution and command-line arguments.
Suspicious Endpoint Security Parent Process Detected
2 rules 2 TTPsThis rule detects suspicious parent processes of endpoint security solutions such as Elastic Defend, Microsoft Defender, and SentinelOne, indicating potential process hollowing or code injection attempts to evade detection.
Suspicious DNS Queries to RMM Domains from Non-Browser Processes
2 rulesDetection of DNS queries to remote monitoring and management (RMM) domains from non-browser processes indicating potential misuse of legitimate remote access tools for command and control.
Suspicious Copy from or to System Directory
3 rules 1 TTPThis threat involves the suspicious copying of files from or to Windows system directories (System32, SysWOW64, WinSxS) using command-line tools, often employed by attackers to relocate LOLBINs for defense evasion.
Signed Proxy Execution via MS Work Folders
2 rules 3 TTPsAttackers can abuse Windows Work Folders to execute a masqueraded control.exe file from untrusted locations, potentially bypassing application controls for defense evasion and privilege escalation.
SeDebugPrivilege Enabled by a Suspicious Process
2 rules 1 TTPThe rule identifies a process running with a non-SYSTEM account that enables the SeDebugPrivilege privilege, which can be used by adversaries to debug and modify other processes to escalate privileges and bypass access controls.
Scheduled Task Creation via Scripting
3 rules 3 TTPsDetection of scheduled task creation by Windows scripting engines like cscript.exe, wscript.exe, or powershell.exe, used by adversaries to establish persistence on compromised systems.
Renamed Utility Executed with Short Program Name
2 rules 1 TTPThis rule detects the execution of renamed utilities with a single-character process name, differing from the original filename, a common technique used by adversaries for staging, executing temporary utilities, or bypassing security detections.
Remote Scheduled Task Creation via RPC
2 rules 2 TTPsThe creation of scheduled tasks from a remote source via RPC, where the RpcCallClientLocality and ClientProcessId are 0, indicates potential adversary lateral movement within a Windows environment.
Remote Management Access Launch After MSI Install
2 rulesDetects an MSI installer execution followed by the execution of commonly abused Remote Management Software like ScreenConnect, potentially indicating abuse where an attacker triggers an MSI install then connects via a guest link with a known session key.
Remote File Download via Desktopimgdownldr Utility
3 rules 1 TTPThe desktopimgdownldr utility can be abused to download remote files, potentially bypassing standard download restrictions and acting as an alternative to certutil for malware or tool deployment.
Remote File Copy to a Hidden Share
2 rules 3 TTPsThis rule detects remote file copy attempts to hidden network shares, which may indicate lateral movement or data staging activity, by identifying suspicious file copy operations using command-line tools like cmd.exe and powershell.exe focused on hidden share patterns.
Registry Persistence via AppInit DLL Modification
2 rules 2 TTPsModification of the AppInit DLLs registry keys on Windows systems allows attackers to execute code in every process that loads user32.dll, establishing persistence and potentially escalating privileges.
Rare Connection to WebDAV Target via Rundll32
2 rules 2 TTPsThis rule identifies rare connection attempts to a Web Distributed Authoring and Versioning (WebDAV) resource, where attackers may inject WebDAV paths in files opened by a victim to leak NTLM credentials via forced authentication using rundll32.exe.
PsExec Lateral Movement via Network Connection
2 rules 3 TTPsThe rule identifies the use of PsExec.exe making a network connection, indicative of potential lateral movement by adversaries executing commands with SYSTEM privileges on Windows systems to disable defenses.
Process Created with a Duplicated Token
2 rules 2 TTPsThis rule identifies the creation of a process impersonating the token of another user logon session on Windows, potentially indicating privilege escalation.
Print.exe Used to Dump Sensitive Files for Credential Access
2 rules 2 TTPsAttackers are abusing the legitimate Windows Print.exe utility to copy sensitive files like NTDS.DIT and SAM in order to extract credentials, enabling local or remote credential access.
PowerShell Script with Encryption/Decryption Capabilities
2 rules 3 TTPsPowerShell scripts employing .NET cryptography APIs are used to encrypt data for impact or decrypt payloads for defense evasion.
PowerShell Obfuscation via String Concatenation
2 rules 1 TTPThis rule detects PowerShell scripts employing string concatenation to evade static analysis and AMSI by fragmenting keywords or URLs at runtime.
PowerShell Obfuscation via Character Array Reconstruction
2 rules 1 TTPDetects PowerShell scripts using character array reconstruction to hide commands, URLs, or payloads, evading static analysis and AMSI.
PowerShell MiniDump Script Detection
2 rules 1 TTPThis brief detects PowerShell scripts that reference MiniDumpWriteDump or full-memory minidump types, potentially used to capture process memory from credential-bearing processes like LSASS.
Potential Windows Error Manager Masquerading
2 rules 1 TTPAdversaries may masquerade malicious processes as legitimate Windows Error Reporting processes (WerFault.exe or Wermgr.exe) to evade detection by establishing network connections without arguments, thus blending into normal system activity.
Potential PowerShell Obfuscation via Special Character Overuse
2 rules 3 TTPsThis rule detects PowerShell scripts heavily obfuscated with whitespace and special characters, often used to evade static analysis and AMSI, by identifying scripts with low symbol diversity and a high proportion of whitespace and special characters.
Potential Port Monitor or Print Processor Registration Abuse
2 rules 4 TTPsThis rule detects registry modifications indicative of privilege escalation and persistence attempts by adversaries abusing port monitors and print processors to execute malicious DLLs with SYSTEM privileges on Windows systems.
Potential Persistence via Mandatory User Profile Modification
2 rules 2 TTPsAdversaries may abuse Windows mandatory profiles by dropping a malicious NTUSER.MAN file containing pre-populated persistence-related registry keys to establish persistence, which can evade traditional registry-based monitoring.
Potential Masquerading as Communication Apps
2 rules 3 TTPsAttackers may attempt to evade defenses by masquerading malicious processes as legitimate communication applications such as Slack, WebEx, Teams, Discord, RocketChat, Mattermost, WhatsApp, Zoom, Outlook and Thunderbird.
Potential Machine Account Relay Attack via SMB
2 rules 2 TTPsThe rule identifies potential relay attacks against a machine account by detecting network share access events originating from a remote source IP but utilizing the target server's computer account, which may indicate an SMB relay attack.
Potential LSA Authentication Package Abuse
2 rules 2 TTPsAdversaries can abuse the Local Security Authority (LSA) authentication packages by modifying the Windows registry to achieve privilege escalation or persistence by executing binaries with SYSTEM privileges.
Potential Lateral Tool Transfer via SMB Share
2 rules 2 TTPsThe rule identifies the creation or change of a Windows executable file over network shares, indicating potential lateral tool transfer via SMB, which adversaries may use to move tools between systems in a compromised environment.
Potential Kerberos Relay Attack via Coerced Authentication against a Computer Account
3 rules 1 TTP 1 CVEDetects potential Kerberos relay attacks by identifying coercion attempts followed by authentication events using a target server's computer account, originating from a different host, indicating an attacker has captured and relayed Kerberos authentication material to execute code on behalf of the compromised system.
Potential DNS Tunneling via NsLookup
2 rules 2 TTPsDetection of multiple nslookup.exe executions with explicit query types from a single host, potentially indicating command and control activity via DNS tunneling, where attackers abuse DNS for data infiltration or exfiltration.
Potential Credential Access via Windows Utilities
3 rules 3 TTPsThis rule detects the execution of known Windows utilities often abused to dump LSASS memory or the Active Directory database (NTDS.dit) in preparation for credential access by identifying specific command-line arguments and process names associated with credential dumping activities.
Persistence via WMI Event Subscription
2 rules 2 TTPsAdversaries can leverage Windows Management Instrumentation (WMI) to establish persistence by creating event subscriptions that trigger malicious code execution when specific events occur, using tools like wmic.exe to create event consumers.
Non-Chrome Process Accessing Chrome Login Data
2 rules 1 TTPThis analytic identifies non-Chrome processes accessing the Chrome user data file 'login data', which is an SQLite database containing sensitive information like saved passwords, potentially leading to credential theft.
Multiple Remote Management Tool Vendors on Same Host
2 rulesThis rule identifies Windows hosts where two or more distinct remote monitoring and management (RMM) or remote-access tool vendors are observed starting processes within the same eight-minute window, potentially indicating compromise, shadow IT, or attacker staging of redundant access.
MSSQL xp_cmdshell Stored Procedure Abuse for Persistence
2 rules 2 TTPsAttackers may leverage the xp_cmdshell stored procedure in Microsoft SQL Server to execute arbitrary commands for privilege escalation and persistence, often bypassing default security configurations.
Mshta Making Network Connections Indicative of Defense Evasion
2 rules 1 TTPMshta.exe making outbound network connections may indicate adversarial activity, as it is often used to execute malicious scripts and evade detection by proxying execution of untrusted code.
MSBuild Started by System Process for Defense Evasion and Execution
2 rules 2 TTPsAdversaries are leveraging MSBuild, a Microsoft Build Engine, to execute malicious code by initiating it from system processes such as Explorer or WMI to evade defenses and execute unauthorized actions.
Microsoft IIS Connection String Decryption via aspnet_regiis
3 rules 1 TTPAn attacker with Microsoft IIS web server access can decrypt and dump hardcoded connection strings, such as MSSQL service account passwords, using the aspnet_regiis utility, potentially leading to credential compromise.
Microsoft Defender Tampering via Registry Modification
2 rules 2 TTPsAdversaries may disable or tamper with Microsoft Defender features via registry modifications to evade detection and conceal malicious behavior on Windows systems.
LSA PPL Protection Setting Modification via CommandLine
2 rules 1 TTPAttackers modify LSA PPL protection settings via command-line tools like reg.exe and PowerShell to weaken system security and enable credential dumping.
LOLBIN Network Connection for Defense Evasion
2 rules 1 TTPAdversaries can use Living-Off-The-Land Binaries (LOLBINs) such as expand.exe, extrac32.exe, ieexec.exe, and makecab.exe to establish network connections, potentially bypassing security controls and facilitating malicious activities on Windows systems.
Ingress Transfer via Windows BITS
2 rules 2 TTPsAdversaries may leverage Windows Background Intelligent Transfer Service (BITS) to download executable and archive files to evade defenses and establish command and control.
Incoming Execution via WinRM Remote Shell
2 rules 1 TTPThis rule detects incoming execution via Windows Remote Management (WinRM) remote shell on a target host, which could be an indication of lateral movement by monitoring network traffic on ports 5985 or 5986 and processes initiated by WinRM.
Host File System Changes via Windows Subsystem for Linux
2 rules 2 TTPsThis rule detects file creation and modification on the host system from the Windows Subsystem for Linux (WSL), potentially indicating defense evasion by adversaries.
GPO Scheduled Task or Service Creation/Modification
2 rules 3 TTPsDetection of the creation or modification of new Group Policy based scheduled tasks or services, which can be abused by attackers with domain admin permissions to execute malicious payloads remotely on domain-joined machines, leading to privilege escalation and persistence.
GPO Modification to Add Startup/Logon Scripts
2 rules 3 TTPsThis rule detects the modification of Group Policy Objects (GPO) to add a startup or logon script to user or computer objects, enabling attackers to achieve privilege escalation and persistence by executing arbitrary commands at scale.
First Time Seen Driver Loaded
2 rules 3 TTPsThe rule identifies the load of previously unseen drivers, which may indicate attackers exploiting vulnerable drivers for privilege escalation and persistence.
Execution via Windows Subsystem for Linux
2 rules 2 TTPsThis detection identifies attempts to execute programs from the Windows Subsystem for Linux (WSL) to evade detection by flagging suspicious executions initiated by WSL processes and excluding known safe executables.
Execution of a Downloaded Windows Script
3 rules 7 TTPsThis rule identifies the creation and subsequent execution of a Windows script downloaded from the internet, a technique used by adversaries for initial access and execution on Windows systems.
Execution from Removable Media with Network Connection
2 rules 1 TTPDetects process execution from removable media by an unusual process with untrusted code signature followed by network connection attempts, potentially indicating malware introduced via removable media for initial access.
Enumeration of Privileged Local Groups Membership
2 rules 1 TTPAn unusual process is enumerating built-in Windows privileged local groups membership, such as Administrators or Remote Desktop users, potentially revealing targets for credential compromise and post-exploitation activities.
Encoded Executable Stored in the Registry
2 rules 3 TTPs 1 IOCThis rule detects registry write modifications hiding encoded portable executables, indicative of adversary defense evasion by avoiding storing malicious content directly on disk.
Disabling LSA Protection via Registry Modification
2 rules 1 TTPAdversaries may modify the RunAsPPL registry key to disable LSA protection, which prevents nonprotected processes from reading memory and injecting code, potentially leading to credential access.
Detection of Encrypted Archive Creation with WinRAR or 7-Zip
2 rules 2 TTPsAdversaries use WinRAR or 7-Zip with encryption options to compress and protect stolen data before exfiltration, making detection more challenging.
Detect Suspicious WMI Event Subscription Creation for Persistence
2 rules 1 TTPThis threat brief details the detection of malicious Windows Management Instrumentation (WMI) event subscriptions, a technique used by attackers for persistence and privilege escalation on Windows systems.
Component Object Model (COM) Hijacking via Registry Modification
2 rules 4 TTPsAdversaries may establish persistence by executing malicious content triggered by hijacked references to COM objects through Component Object Model (COM) hijacking via registry modification on Windows systems.
Command Execution via ForFiles Utility
2 rules 1 TTPAdversaries may use the Windows forfiles utility to proxy command execution via a trusted parent process, potentially evading detection.
Active Directory Discovery via ADExplorer Execution
2 rules 5 TTPsDetects the execution of ADExplorer, a tool used for Active Directory viewing and editing, which can be abused by adversaries for domain reconnaissance and creating offline snapshots of the AD database.
Account Configured with Never-Expiring Password
2 rules 1 TTPDetects the creation and modification of an account with the 'Don't Expire Password' option enabled, which attackers can abuse to persist in the domain and maintain long-term access.
Unusual Process Spawned by a User Detected by Machine Learning
2 rules 2 TTPsA machine learning job detected a suspicious Windows process, predicted to be malicious by the ProblemChild supervised ML model and found to be unusual within the user's context, potentially indicating defense evasion techniques like masquerading or the use of LOLbins.
Unusual Parent-Child Relationship Detection
3 rules 4 TTPsThis rule identifies Windows programs run from unexpected parent processes, which could indicate masquerading or other strange activity on a system, potentially indicating process injection, masquerading, access token manipulation, or parent PID spoofing.
Suspicious Process Execution via Renamed PsExec Executable
2 rules 3 TTPsDetects suspicious PsExec activity where the PsExec service component is executed using a custom name, indicating an attempt to evade detections that look for the default PsExec service component name.
Suspicious Process Creation Followed by Memory Access from Unknown Region
2 rules 1 TTPThe rule identifies suspicious process creation where a process is created and immediately accessed from an unknown memory code region by the same parent process, indicating a potential code injection attempt, specifically process hollowing, commonly targeting processes spawned by Microsoft Office applications, scripting engines, and command-line tools for defense evasion.
Suspicious Outbound Scheduled Task Activity via PowerShell
2 rules 3 TTPsThis rule detects PowerShell loading the Task Scheduler COM DLL followed by an outbound RPC network connection, potentially indicating lateral movement or remote discovery via scheduled tasks.
Suspicious DNS Queries to Telegram API by Non-Telegram Processes
2 rules 2 TTPs 1 IOCDetection of a process making DNS queries to the Telegram API domain, which is indicative of malware utilizing Telegram bots for command and control (C2) communications.
ProblemChild ML Model Detects Unusual Process on Windows Host
2 rules 1 TTPThe ProblemChild machine learning model detected a rare Windows process indicative of defense evasion, potentially involving LOLbins, on a host not commonly associated with malicious activity.
Potential Application Shimming via Sdbinst
2 rules 2 TTPsAttackers abuse the Application Shim functionality in Windows by using `sdbinst.exe` with malicious arguments to achieve persistence and execute arbitrary code within legitimate Windows processes.
Non-Chrome Process Accessing Chrome Default Directory
2 rules 1 TTPDetection of non-Chrome processes accessing the Chrome user data directory, potentially indicating credential theft or data exfiltration attempts by malware such as RATs or APT groups.
MpCmdRun.exe Used for Remote File Download
2 rules 1 TTPAttackers are abusing the Windows Defender MpCmdRun.exe utility to download remote files, potentially delivering malware or offensive tools into compromised systems.
LSASS Loading Suspicious DLL
2 rules 2 TTPs 9 IOCsDetection of LSASS loading an unsigned or untrusted DLL, which can indicate credential access attempts by malicious actors targeting sensitive information stored in the LSASS process.
Logon Script Registry Modification for Persistence and Privilege Escalation
2 rules 2 TTPsThis brief details the detection of UserInitMprLogonScript registry entry modifications, a technique employed by threat actors for persistence and privilege escalation by ensuring payloads execute automatically at system startup.
Image File Execution Options (IFEO) Injection for Persistence and Defense Evasion
3 rules 2 TTPsAttackers can establish persistence and evade defenses by modifying the Debugger and SilentProcessExit registry keys to perform Image File Execution Options (IFEO) injection, allowing them to intercept file executions and run malicious code.
IIS HTTP Logging Disabled via AppCmd
2 rules 1 TTPAn attacker with IIS server access can disable HTTP Logging using `appcmd.exe` to evade defenses and prevent forensic analysis, as detected by the execution of `appcmd.exe` with arguments to disable logging.
Executable or Script Creation in Suspicious Paths
2 rules 1 TTPThis analytic identifies the creation of executables or scripts in suspicious file paths on Windows systems, where adversaries often use these paths to evade detection and maintain persistence, potentially leading to unauthorized code execution, privilege escalation, or persistence within the environment.
Detecting Remote Scheduled Task Creation for Lateral Movement
2 rules 2 TTPsThis rule identifies remote scheduled task creations on a target Windows host, potentially indicating lateral movement by adversaries, by monitoring network connections and registry modifications related to task scheduling.
Adding Hidden File Attribute via Attrib.exe
2 rules 2 TTPsAdversaries can use attrib.exe to add the 'hidden' attribute to files to hide them from users and evade detection, which can be detected by monitoring process executions related to attrib.exe.
Persistence via PowerShell Profile Modification
2 rules 2 TTPsAttackers can modify PowerShell profiles to inject malicious code that executes each time PowerShell starts, establishing persistence on a Windows system.
Account Password Reset Remotely
2 rules 2 TTPsThe rule detects attempts to reset potentially privileged account passwords remotely, a tactic used by adversaries to maintain access, evade password policies, and preserve compromised credentials.
Unusual Source IP for Windows Privileged Operations Detected via ML
2 rules 2 TTPsA machine learning job detected a user performing privileged operations in Windows from an uncommon source IP, potentially indicating account compromise or privilege escalation.
Unusual Privilege Type Assigned to User via Machine Learning Anomaly
2 rules 4 TTPsA machine learning job has identified a user leveraging an uncommon privilege type for privileged operations on Windows systems, potentially indicating privileged access activity and requiring investigation for privilege escalation or account manipulation.
Unusual Host Name for Windows Privileged Operations Detected via ML
2 rules 2 TTPsA machine learning job has identified a user performing privileged operations in Windows from an uncommon device, indicating potential privileged access activity associated with compromised accounts or insider threats.
Control Panel Process with Unusual Arguments
2 rules 1 TTPAdversaries may abuse control.exe to proxy execution of malicious code by using the Control Panel process to execute payloads from unusual locations, detected by identifying suspicious keywords or paths in the process command line.
Windows Delayed Execution via Ping Followed by Malicious Utilities
2 rules 14 TTPsAdversaries may use ping to delay execution of malicious commands, scripts, or binaries to evade detection, often observed during malware installation.
First Time Seen Removable Device Registry Modification
2 rules 2 TTPsDetection of newly seen removable devices via Windows registry modification events can indicate data exfiltration attempts or initial access via malicious USB drives.
WScript or CScript Dropper
2 rules 2 TTPsThe WScript or CScript Dropper technique involves using cscript.exe or wscript.exe to write malicious script files (js, jse, vba, vbe, vbs, wsf, wsh) to suspicious locations on a Windows system for later execution.
Windows Temporarily Scheduled Task Creation and Deletion
2 rules 2 TTPsDetection of rapid creation and deletion of scheduled tasks on Windows, indicating potential malicious activity abusing the task scheduler for execution and cleanup.
Windows Scheduled Task Creation for Persistence
3 rules 1 TTPAdversaries may create scheduled tasks on Windows systems to establish persistence, move laterally, or escalate privileges, and this detection identifies such activity by monitoring Windows event logs for scheduled task creation events, excluding known benign tasks and those created by system accounts.
Windows Peripheral Device Discovery via fsutil
2 rules 1 TTPAdversaries may use the Windows file system utility, fsutil.exe, with the fsinfo drives command to enumerate attached peripheral devices and gain information about a compromised system.
Windows Event Logs Cleared
2 rules 1 TTPAttackers attempt to clear Windows event logs to evade detection and remove forensic evidence of their activities.
Windows Audit Policy Sub-Category Disabled
2 rules 3 TTPsThis rule identifies attempts to disable auditing for security-sensitive audit policy sub-categories on Windows systems, often employed by attackers to evade detection and forensic analysis.
Windows Admin Account Brute Force Detection
2 rules 2 TTPsThis rule identifies potential password guessing/brute force activity from a single source IP targeting multiple Windows accounts with 'admin' in the username, indicating an attempt to compromise privileged accounts.
User Account ServicePrincipalName Attribute Modified
2 rules 2 TTPsDetection of modifications to the servicePrincipalName attribute on user accounts, potentially exposing them to Kerberoasting attacks by allowing attackers to request Kerberos tickets for the account.
Unusual Child Process from a System Virtual Process
2 rules 1 TTPA suspicious child process of the Windows virtual system process is detected, potentially indicating code injection and defense evasion.
Suspicious Svchost.exe Child Process: cmd.exe
2 rules 2 TTPsDetection of cmd.exe being spawned by svchost.exe, which is an unusual behavior indicative of potential masquerading or privilege escalation attempts on Windows systems.
Suspicious Remote Registry Access via SeBackupPrivilege
2 rules 3 TTPsDetection of remote registry access by an account with SeBackupPrivilege, potentially indicating credential exfiltration attempts via SAM registry hive dumping.
Suspicious RDP Client Image Load
2 rules 1 TTPThe rule detects suspicious loading of the Remote Desktop Services ActiveX Client (mstscax.dll) from unusual locations, potentially indicating RDP lateral movement on Windows systems.
Suspicious PowerShell Reconnaissance via WMI Queries
2 rules 2 TTPsDetection of suspicious PowerShell activity using Windows Management Instrumentation (WMI) to gather system information, indicative of reconnaissance efforts by adversaries potentially leading to further exploitation or lateral movement.
Suspicious Microsoft HTML Application Child Process
2 rules 1 TTPMshta.exe spawning a suspicious child process, such as cmd.exe or powershell.exe, indicates potential adversarial activity leveraging Mshta to execute malicious scripts and evade detection on Windows systems.
Suspicious Local Scheduled Task Creation
2 rules 1 TTPThis rule detects the creation of scheduled tasks on Windows systems by non-system accounts, a common technique used by adversaries for persistence, lateral movement, and privilege escalation.
Suspicious Inter-Process Communication via Outlook COM
2 rules 2 TTPsAdversaries may target user email to collect sensitive information or send email on their behalf via API by abusing Outlook's Component Object Model (COM) interface from unusual processes.
Suspicious Command Prompt Network Connection
2 rules 4 TTPsThis alert identifies suspicious network connections initiated by the command prompt (cmd.exe) when executed with arguments indicative of script execution, remote resource access, or originating from Microsoft Office applications, which is a common tactic for downloading payloads or establishing command and control.
Suspicious Access to LDAP Attributes
2 rules 3 TTPsThe rule detects suspicious access to LDAP attributes in Active Directory by identifying read access to a high number of Active Directory object attributes, which can help adversaries find vulnerabilities, elevate privileges, or collect sensitive information.
Suspicious .NET Code Compilation via Unusual Parent Processes
2 rules 3 TTPsAdversaries may use unusual parent processes to execute .NET compilers for compiling malicious code after delivery, evading security mechanisms, and this activity is detected by monitoring compiler executions initiated by scripting engines or system utilities.
SMB Registry Hive Exfiltration
2 rules 3 TTPsDetection of medium-sized registry hive files being created or modified on Server Message Block (SMB) shares, potentially indicating exfiltration of Security Account Manager (SAM) data for credential extraction.
Service Control Executed from Script Interpreters
2 rules 8 TTPsDetection of Service Control (sc.exe) being spawned from script interpreter processes, such as PowerShell or cmd.exe, to create, modify, or start services, which may indicate privilege escalation or persistence attempts by an attacker.
Potential Masquerading as Svchost
2 rules 1 TTPAttackers may attempt to masquerade as the Service Host process `svchost.exe` by executing from non-standard paths to evade detection and blend in with normal system activity.
Potential Credential Access via Renamed COM+ Services DLL
2 rules 3 TTPs 1 IOCDetection of renamed COMSVCS.DLL being loaded by rundll32.exe, potentially used to dump LSASS memory for credential access while evading command-line detection.
Potential Credential Access via MSBuild Loading Credential Management DLLs
2 rules 1 TTPThe detection rule identifies a potential credential access attempt via the trusted developer utility MSBuild by detecting instances where it loads DLLs associated with Windows credential management, specifically vaultcli.dll or SAMLib.DLL, which is often used for credential dumping.
Potential Credential Access via DCSync
2 rules 3 TTPsThis rule identifies when a User Account starts the Active Directory Replication Process, potentially indicating a DCSync attack, which allows attackers to steal credential information compromising the entire domain.
Netsh Used to Enable Remote Desktop Protocol (RDP) in Windows Firewall
2 rules 2 TTPsAdversaries may use the `netsh.exe` utility to enable inbound Remote Desktop Protocol (RDP) connections in the Windows Firewall, potentially allowing unauthorized remote access to compromised systems.
Multiple Remote Management Tool Vendors on Same Host
3 rulesThis detection identifies a Windows host where two or more distinct remote monitoring and management (RMM) or remote-access tool vendors are observed starting processes within the same eight-minute window, potentially indicating compromise, shadow IT, or attacker staging of redundant access.
MS Office Macro Security Registry Modifications
2 rules 2 TTPsAttackers may modify Microsoft Office registry settings related to macro security (AccessVBOM, VbaWarnings) to disable security warnings, enabling malicious macros for persistence and further compromise.
Mounting of Hidden or WebDav Remote Shares via Net Utility
2 rules 4 TTPsAdversaries may leverage the `net.exe` utility to mount WebDav or hidden remote shares, potentially indicating lateral movement, data exfiltration preparation, or initial access via discovery of accessible shares.
Modification of WDigest Security Provider
2 rules 1 TTPThe rule detects attempts to modify the WDigest security provider in the registry to force the user's password to be stored in clear text in memory, which could lead to credential dumping.
Microsoft IIS Service Account Password Dump via AppCmd
2 rules 2 TTPsAn attacker with IIS web server access via a web shell can extract service account passwords by requesting full configuration output or targeting credential-related fields using the AppCmd tool.
Masquerading Business Application Installers
2 rules 4 TTPsAttackers masquerade malicious executables as legitimate business application installers to trick users into downloading and executing malware, leveraging defense evasion and initial access techniques.
LSASS Memory Dump Handle Access Detection
2 rules 1 TTPThis rule detects handle requests for LSASS object access with specific access masks (0x1fffff, 0x1010, 0x120089, 0x1F3FFF) indicative of memory dumping, commonly employed by tools like SharpDump, Procdump, Mimikatz, and Comsvcs to extract credentials from the LSASS process on Windows systems.
LSASS Memory Dump Creation Detection
2 rules 1 TTPThis rule identifies the creation of LSASS memory dump files, often indicative of credential access attempts using tools like Task Manager, SQLDumper, Dumpert, or AndrewSpecial, by monitoring for specific filenames and excluding legitimate dump locations.
High Number of Process and/or Service Terminations Detected
2 rules 2 TTPsA high number of process terminations (stop, delete, or suspend) from the same Windows host within a short time period may indicate malicious activity such as an attacker attempting to disable security measures or prepare for ransomware deployment.
File with Right-to-Left Override Character (RTLO) Created/Executed
2 rules 2 TTPsThis rule detects the creation or execution of files or processes with names containing the Right-to-Left Override (RTLO) character, which can be used to disguise the file extension and trick users into executing malicious files on Windows systems.
Disabling Windows Defender Security Settings via PowerShell
3 rules 2 TTPsAttackers use PowerShell commands like Set-MpPreference or Add-MpPreference, often with base64 encoding, to disable or weaken Windows Defender security settings in order to evade detection and execute malicious payloads.
Disabling User Account Control via Registry Modification
2 rules 3 TTPsAttackers may disable User Account Control (UAC) by modifying specific registry values, allowing them to execute code with elevated privileges, bypass security restrictions, and potentially escalate privileges on Windows systems.
Detection of Kali Linux Installation or Usage via Windows Subsystem for Linux (WSL)
2 rules 1 TTPAdversaries may attempt to install or use Kali Linux via Windows Subsystem for Linux (WSL) to avoid detection, potentially enabling them to perform malicious activities within a Windows environment while blending in with legitimate WSL usage.
Detecting Suspicious Scheduled Task Creation in Windows
2 rules 1 TTPThis rule detects the creation of scheduled tasks in Windows using event logs, which adversaries may use for persistence, lateral movement, or privilege escalation by creating malicious tasks.
Detecting Execution from Alternate Data Streams
2 rules 1 TTPAdversaries may execute malicious code from Alternate Data Streams (ADS) on Windows to evade defenses by hiding malware within legitimate files, which this detection identifies by monitoring process execution paths and arguments.
AdFind Tool Used for Active Directory Reconnaissance
2 rules 5 TTPsThe execution of AdFind.exe, an Active Directory query tool, is often used by threat actors for post-exploitation Active Directory reconnaissance, as observed in campaigns involving Trickbot, Ryuk, Maze, and FIN6.
Xwizard COM Object Execution for Defense Evasion
2 rules 2 TTPsAdversaries may abuse Xwizard, a Windows system binary, to execute Component Object Model (COM) objects created in the registry to evade defensive countermeasures by proxying execution through a legitimate system tool.
Windows Privilege Escalation via Secondary Logon Service
2 rules 2 TTPsThe rule identifies process creation with alternate credentials, which can be used for privilege escalation, by detecting successful logins via the Secondary Logon service (seclogon) from a local source IP address (::1), followed by process creation using the same TargetLogonId.
Suspicious MS Outlook Child Process
2 rules 3 TTPsDetection of suspicious child processes spawned by Microsoft Outlook, indicative of spear phishing and malicious file execution leading to potential initial access and further exploitation.
Remote Execution of Windows Services via RPC
2 rules 2 TTPsDetection of remote execution of Windows services over RPC by correlating `services.exe` network connections and spawned child processes, potentially indicating lateral movement.
PowerShell Obfuscation via Backtick-Escaped Variable Expansion
2 rules 1 TTPPowerShell scripts use backtick-escaped characters inside `${}` variable expansion to reconstruct strings at runtime, enabling attackers to split keywords, hide commands, and evade static analysis and AMSI.
High Variance in RDP Session Duration Detected via Machine Learning
2 rules 2 TTPsA machine learning job has detected unusually high variance of RDP session duration, potentially indicating lateral movement and session persistence by threat actors.
NTDS or SAM Database File Copied
2 rules 1 TTPDetects copy operations of Active Directory Domain Database (ntds.dit) or Security Account Manager (SAM) files, potentially exposing sensitive hashed credentials on Windows systems.
Detection of IIS HTTP Logging Disabled via AppCmd.exe
2 rules 2 TTPsThis analytic detects the use of AppCmd.exe to disable HTTP logging on IIS servers, allowing adversaries to evade detection by removing evidence of their actions.