Skip to content
Threat Feed

Vendor

Crowdstrike

105 briefs RSS
medium advisory

Windows Port Forwarding Rule Addition via Registry Modification

An adversary may abuse port forwarding to bypass network segmentation restrictions by creating a new port forwarding rule through modification of the Windows registry.

Elastic Defend +3 port-forwarding registry-modification command-and-control defense-evasion windows
2r 3t
medium advisory

Suspicious Zoom Child Process Execution

A suspicious Zoom child process was detected, indicating a potential attempt to run unnoticed by masquerading as Zoom.exe or exploiting a vulnerability, resulting in the execution of cmd.exe, powershell.exe, pwsh.exe, or powershell_ise.exe.

Microsoft Defender XDR +1 defense-evasion execution windows
2r 6t
medium advisory

Suspicious Windows PowerShell Arguments Detected

This rule identifies the execution of PowerShell with suspicious argument values, often observed during malware installation, by detecting unusual PowerShell arguments indicative of abuse, focusing on patterns like encoded commands, suspicious downloads, and obfuscation techniques.

Elastic Defend +5 powershell malware execution
3r 4t
medium advisory

Suspicious Execution via Windows Command Debugging Utility

Adversaries can abuse the Windows command line debugging utility cdb.exe to execute commands or shellcode from non-standard paths, evading traditional security measures.

Microsoft Defender XDR +5 lolbas defense-evasion windows
2r 2t
medium advisory

SIP Provider Modification for Defense Evasion

This rule detects modifications to the registered Subject Interface Package (SIP) providers, which are used by the Windows cryptographic system to validate file signatures, potentially indicating an attempt to bypass signature validation or inject code for defense evasion.

Microsoft Defender XDR +2 defense-evasion windows registry-modification
2r 1t
medium advisory

Service DACL Modification via sc.exe

Detection of service DACL modifications via `sc.exe` using the `sdset` command, potentially leading to defense evasion by denying service access to legitimate users or system accounts.

Microsoft Defender XDR +2 defense-evasion persistence windows
2r 2t
medium advisory

Remote Desktop File Opened from Suspicious Path

Adversaries may abuse RDP files delivered via phishing from suspicious locations to gain unauthorized access to systems.

M365 Defender +4 initial-access rdp phishing windows
2r 2t
low advisory

Potential Secure File Deletion via SDelete Utility

This rule detects file name patterns generated by the use of Sysinternals SDelete utility, potentially used by attackers to delete forensic indicators and hinder data recovery efforts.

Microsoft Defender XDR +3 defense evasion impact windows
2r 2t
medium advisory

Potential NetNTLMv1 Downgrade Attack via Registry Modification

This brief details a registry modification attack that downgrades the system to NTLMv1 authentication, enabling NetNTLMv1 downgrade attacks, typically performed with local administrator privileges on Windows systems.

Microsoft Defender XDR +2 defense-evasion ntlm registry-modification windows
2r 2t
medium advisory

Potential Evasion via Windows Filtering Platform Blocking Security Software

Adversaries may add malicious Windows Filtering Platform (WFP) rules to prevent endpoint security solutions from sending telemetry data, impairing defenses, which this rule detects by identifying multiple WFP block events where the process name is associated with endpoint security software.

Windows Filtering Platform +2 defense-evasion windows-filtering-platform endpoint-security
2r 2t
medium advisory

Local Account TokenFilter Policy Modification for Defense Evasion and Lateral Movement

Adversaries may modify the LocalAccountTokenFilterPolicy registry key to bypass User Account Control (UAC) and gain elevated privileges remotely by granting high-integrity tokens to remote connections from local administrators, facilitating lateral movement and defense evasion.

Elastic Defend +3 defense-evasion lateral-movement persistence registry-modification
2r 4t
low advisory

Enumerating Domain Trusts via DSQUERY.EXE

Adversaries may use the `dsquery.exe` command-line utility to enumerate trust relationships for lateral movement in Windows multi-domain environments.

Microsoft Defender XDR discovery domain-trust windows
2r 2t
medium advisory

Code Signing Policy Modification Through Built-in Tools

Attackers may attempt to disable or modify code signing policies on Windows systems by using built-in tools like bcdedit.exe in order to execute unsigned or self-signed malicious code.

M365 Defender +1 defense-evasion code-signing windows
2r 1t
high advisory

Potential Chroot Container Escape via Mount

The rule detects a potential chroot container escape via mount, which involves a user within a container mounting the host's root file system and using chroot to escape the containerized environment, indicating a privilege escalation attempt.

Elastic Defend +2 container-escape privilege-escalation linux
2r
high advisory

Potential Kerberos SPN Spoofing via Suspicious DNS Query

Detects suspicious DNS queries containing a base64-encoded blob, indicating potential Kerberos coercion attacks and SPN spoofing via DNS to coerce authentication to attacker-controlled hosts, enabling Kerberos or NTLM relay attacks.

Elastic Defend credential-access kerberos spn-spoofing dns windows
2r 1t
high advisory

WDAC Policy File Creation by Unusual Process

Adversaries may use a specially crafted Windows Defender Application Control (WDAC) policy to restrict the execution of security products, detected by unusual process creation of WDAC policy files.

Microsoft Defender XDR +5 wdac defense-evasion windows
2r 1t
medium advisory

NTDS Dump via Wbadmin

Attackers with Backup Operator privileges may abuse wbadmin.exe to access the NTDS.dit file, enabling credential dumping and domain compromise.

Microsoft Defender XDR +4 credential-access windows wbadmin ntds.dit
2r 2t
medium advisory

Microsoft Management Console File Execution from Unusual Path

Adversaries may use Microsoft Management Console (MMC) files from untrusted paths to bypass security controls for initial access and execution on Windows systems.

Microsoft Management Console File +2 execution defense-evasion windows
2r 4t
medium advisory

DNS Global Query Block List Modified or Disabled

Attackers with DNSAdmin privileges can modify or disable the DNS Global Query Block List (GQBL) in Windows, allowing exploitation of hosts running WPAD with default settings for privilege escalation and lateral movement.

Elastic Defend +4 defense-evasion registry-modification windows
2r 3t
medium advisory

Network-Level Authentication (NLA) Disabled via Registry Modification

Adversaries may disable Network-Level Authentication (NLA) by modifying specific registry keys to bypass authentication requirements for Remote Desktop Protocol (RDP) and enable persistence mechanisms.

Microsoft Defender XDR +4 defense-evasion lateral-movement registry-modification windows
2r 2t
high advisory

Wireless Credential Dumping via Netsh

Adversaries use the Windows built-in utility Netsh to dump Wireless saved access keys in clear text, potentially leading to credential compromise.

Defender XDR +2 credential-access netsh windows
2r 2t
medium advisory

Windows Console History Clearing

Adversaries may clear the command history of a compromised account to conceal the actions undertaken during an intrusion on a Windows system.

M365 Defender +1 defense-evasion powershell windows
2r 2t
medium advisory

System File Ownership Change for Defense Evasion

Adversaries may modify file or directory ownership to evade access control lists (ACLs) and access protected files, often using icacls.exe or takeown.exe to reset permissions on system files.

Microsoft Defender XDR +2 defense-evasion persistence windows
3r 1t
low advisory

Netsh Helper DLL Persistence

Attackers may abuse the Netsh Helper DLL functionality by adding malicious DLLs to execute payloads every time the netsh utility is executed via administrators or scheduled tasks, achieving persistence.

Microsoft Defender XDR +3 persistence windows netsh registry
2r 2t
medium advisory

VaultCmd Usage for Listing Windows Credentials

Adversaries may use vaultcmd.exe to list credentials stored in the Windows Credential Manager to gain unauthorized access to saved usernames and passwords, potentially in preparation for lateral movement.

Microsoft Defender XDR +1 credential-access windows vaultcmd
2r 2t
high advisory

Suspicious Managed Code Hosting Process

This rule detects suspicious managed code hosting processes on Windows systems, potentially indicating code injection or defense evasion tactics by monitoring file events associated with processes commonly used to host managed code, such as wscript.exe, cscript.exe, and mshta.exe.

M365 Defender +3 defense-evasion windows managed code lolbin
2r 1t
medium advisory

Program Files Directory Masquerading

Adversaries may masquerade malicious executables within directories mimicking the legitimate Windows Program Files directory to evade defenses and execute untrusted code.

Elastic Defend +2 defense-evasion masquerading windows
2r 1t
high advisory

Potential Remote Install via MsiExec

This rule detects attempts to install a file from a remote server using MsiExec, which adversaries may abuse to deliver malware, by identifying msiexec.exe processes running with arguments indicative of remote installations and executed from suspicious parent processes.

Microsoft Defender XDR +3 defense-evasion windows msiexec remote-install
2r 1t
low advisory

Potential Exploitation of an Unquoted Service Path Vulnerability

This rule detects potential exploitation of unquoted service path vulnerabilities, where adversaries may escalate privileges by placing a malicious executable in a higher-level directory within the path of an unquoted service executable.

Microsoft Defender XDR +4 privilege-escalation unquoted-service-path windows
2r 1t
medium advisory

Potential Abuse of Certreq for File Transfer via HTTP POST

Adversaries may abuse the Windows Certreq utility to download files or upload data to a remote URL by making an HTTP POST request, potentially for command and control or exfiltration, which can be detected by monitoring process execution events.

Microsoft Defender XDR +2 lolbin command-and-control exfiltration certreq
2r 4t
high advisory

AMSI Enable Registry Key Modification for Defense Evasion

Adversaries modify the AmsiEnable registry key to 0 to disable Windows Script AMSI scanning, bypassing AMSI protections for Windows Script Host or JScript execution.

Microsoft Defender XDR +4 defense-evasion amsi registry windows
2r 1t
low advisory

Microsoft Office 'Office Test' Registry Persistence Abuse

Attackers modify the Microsoft Office 'Office Test' Registry key to achieve persistence by specifying a malicious DLL that executes upon application startup.

Microsoft Office +4 persistence registry windows
2r 2t
low advisory

Group Policy Discovery via Microsoft GPResult Utility

Detects the execution of `gpresult.exe` with arguments `/z`, `/v`, `/r`, or `/x` on Windows systems, which attackers may use during reconnaissance to enumerate Group Policy Objects and identify opportunities for privilege escalation or lateral movement.

M365 Defender +1 discovery windows group_policy
2r 1t
high advisory

Unusual Executable File Creation by a System Critical Process

The rule identifies unexpected executable file creation or modification by critical Windows processes, potentially indicating remote code execution or exploitation attempts.

Microsoft Defender XDR +3 defense-evasion execution windows
2r 1t
medium advisory

Windows Script Execution from Archive File

This rule identifies attempts to execute Jscript/Vbscript files from an archive file, a common delivery method for malicious scripts on Windows systems.

M365 Defender +2 execution windows scripting archive
2r 3t
high advisory

Credential Acquisition via Registry Hive Dumping

Detects attempts to export sensitive Windows registry hives (SAM/SECURITY) using reg.exe, potentially leading to credential compromise.

Elastic Endgame +6 credential-access registry-dump windows
2r 1t
medium advisory

Windows Sandbox Abuse with Sensitive Configuration

This rule detects the abuse of Windows Sandbox with sensitive configurations to evade detection, where malware may abuse the sandbox feature to gain write access to the host file system, enable network connections, and automatically execute commands via logon, identifying the start of a new container with these sensitive configurations.

Microsoft Defender XDR +4 defense-evasion windows-sandbox windows
3r 1t
high advisory

Microsoft Build Engine Started by an Office Application

The Microsoft Build Engine (MSBuild) being started by an Office application is unusual behavior and could indicate a malicious document executing a script payload for defense evasion.

Microsoft Build Engine +2 defense-evasion execution msbuild windows
2r 1t
high advisory

Potential Local NTLM Relay via HTTP

Adversaries may coerce local NTLM authentication over HTTP via WebDAV named-pipe paths (Print Spooler, SRVSVC), then relay credentials to elevate privileges.

Microsoft Defender XDR +1 ntlm-relay credential-access windows webdav
2r 1t
medium advisory

Detection of Custom Shim Database Installation for Persistence

Attackers abuse the Application Compatibility Shim functionality in Windows to establish persistence and achieve arbitrary code execution by installing malicious shim databases, which this detection identifies through monitoring registry changes.

Windows +7 persistence app-compat shim
2r 1t
medium advisory

UAC Bypass via DiskCleanup Scheduled Task Hijack

Attackers bypass User Account Control (UAC) by hijacking the DiskCleanup Scheduled Task to stealthily execute code with elevated permissions on Windows systems.

Defender XDR +1 uac-bypass privilege-escalation windows diskcleanup scheduled-task
2r 3t
medium advisory

Disable Windows Event and Security Logs Using Built-in Tools

Attackers attempt to disable Windows Event and Security Logs using logman, PowerShell, or auditpol to evade detection and cover their tracks.

Microsoft Defender XDR +2 defense-evasion windows eventlog
3r 3t
medium advisory

Symbolic Link Creation to Shadow Copies for Credential Access

Adversaries may create symbolic links to shadow copies to access sensitive files such as ntds.dit and browser credentials, enabling credential dumping using cmd.exe or powershell.exe.

Microsoft Defender XDR +3 credential-access defense-evasion windows
2r 3t
low advisory

Windows Account Discovery of Administrator Accounts

Adversaries may execute the `net.exe` or `wmic.exe` commands to enumerate administrator accounts or groups, both locally and within the domain, to gather information for follow-on actions.

M365 Defender +2 discovery account-discovery windows
2r 4t
high advisory

Mimikatz MemSSP Log File Detection

This rule detects the creation of the default Mimikatz MemSSP credential log file, mimilsa.log, which is created after the misc::memssp module injects a malicious Security Support Provider into LSASS, potentially capturing credentials from subsequent logons.

Elastic Defend +3 credential-access mimikatz memssp windows
2r 1t 1i
medium advisory

Windows Subsystem for Linux Distribution Installed via Registry Modification

This rule detects registry modifications indicative of a new Windows Subsystem for Linux (WSL) distribution installation, a technique adversaries may leverage to evade detection by utilizing Linux environments within Windows.

Windows Subsystem for Linux +4 wsl defense-evasion windows
2r 3t
medium advisory

Detection of Bcdedit Boot Configuration Modification

This rule identifies the use of bcdedit.exe to modify boot configuration data, which may be indicative of a destructive attack or ransomware activity aimed at inhibiting system recovery by disabling error recovery or ignoring boot failures.

Microsoft Defender XDR +2 boot-configuration bcdedit impact windows
2r 1t
medium advisory

Windows Backup Deletion via Wbadmin

Adversaries may delete Windows backup catalogs and system state backups using wbadmin.exe to inhibit system recovery, often as part of ransomware or other destructive attacks.

Microsoft Defender XDR +3 impact backup-deletion windows
2r 2t
medium advisory

Suspicious Enumeration Commands Spawned via WMIPrvSE

This rule detects suspicious execution of system enumeration commands by the Windows Management Instrumentation Provider Service (WMIPrvSE), indicating potential reconnaissance or malicious activity on Windows systems.

Elastic Defend +3 enumeration wmi discovery execution windows
2r 12t
high advisory

Suspicious Antimalware Scan Interface DLL Creation

An adversary may attempt to bypass AMSI by creating a rogue AMSI DLL in an unusual location to evade detection.

Microsoft Defender XDR +4 defense-evasion amsi-bypass dll-hijacking windows
2r 1t
high advisory

Script Execution via Microsoft HTML Application

Detects the execution of scripts via HTML applications using Windows utilities rundll32.exe or mshta.exe to bypass defenses by proxying execution of malicious content with signed binaries.

Windows +8 defense-evasion script-execution
3r 1t
high advisory

Conhost Proxy Execution for Defense Evasion

Adversaries abuse the Console Window Host (conhost.exe) with the `--headless` argument to proxy execution of malicious commands, evading detection by blending in with legitimate Windows software.

Elastic Defend +2 defense-evasion proxy-execution windows
3r 1t
medium advisory

Windows Firewall Disabled via Netsh

Detection of adversaries disabling Windows Firewall rules using the `netsh.exe` command-line tool to weaken defenses and facilitate unauthorized network activity.

Microsoft Defender XDR +1 defense-evasion windows firewall
2r 1t
high advisory

Proxy Execution via Windows OpenSSH Client

Detection of command execution via proxy using the Windows OpenSSH client (ssh.exe or sftp.exe) to bypass application control using trusted Windows binaries.

M365 Defender +2 defense-evasion proxy-execution openssh application-control-bypass
2r
low advisory

Windows User Account Creation via Net.exe

This rule identifies attempts to create new users on Windows systems using net.exe, a common tactic used by attackers to increase access or establish persistence.

Microsoft Defender XDR +2 persistence user-account-creation windows
2r 2t
medium advisory

Windows Subsystem for Linux Enabled via Dism Utility

Adversaries may enable and use Windows Subsystem for Linux (WSL) using the Microsoft Dism utility to evade detection on Windows systems by running Linux applications and tools.

Microsoft Defender XDR +2 defense-evasion wsl windows
2r 1t
medium advisory

Windows Scheduled Tasks AT Command Enabled via Registry Modification

Attackers may enable the deprecated Windows AT command via registry modification to achieve local persistence or lateral movement.

Windows +5 defense-evasion persistence lateral-movement
2r 2t
medium advisory

Windows Host Network Discovery Enabled via Netsh

Attackers can enable host network discovery via netsh.exe to weaken host firewall settings, facilitating lateral movement by identifying other systems on the network.

Microsoft Defender XDR +3 defense-evasion windows firewall
2r 1t
medium advisory

Windows Firewall Disabled via PowerShell

Attackers may disable the Windows firewall or its rules using the `Set-NetFirewallProfile` PowerShell cmdlet to enable lateral movement and command and control activity.

Microsoft Defender XDR +3 defense-evasion powershell firewall windows
2r 2t
medium advisory

Windows Defender Exclusions Added via PowerShell

Adversaries may attempt to bypass Windows Defender's capabilities by using PowerShell to add exclusions for folders or processes, and this activity can be detected by monitoring PowerShell command lines that use `Add-MpPreference` or `Set-MpPreference` with exclusion parameters.

Microsoft Defender XDR +3 defense-evasion powershell windows
2r 3t
low advisory

Werfault ReflectDebugger Persistence via Registry Modification

Attackers may establish persistence by modifying the ReflectDebugger registry key associated with Windows Error Reporting to execute arbitrary code when Werfault is invoked with the '-pr' parameter.

Elastic Defend +1 persistence registry_modification werfault
2r 2t
medium advisory

Suspicious Mofcomp Activity

This rule detects suspicious mofcomp.exe activity, which attackers may leverage MOF files to manipulate the Windows Management Instrumentation (WMI) repository for execution and persistence by filtering out legitimate processes and focusing on unusual executions, excluding known safe parent processes and system accounts.

Elastic Defend +4 execution persistence windows
2r 2t
medium advisory

Suspicious Modifications to Windows Security Support Provider (SSP) Registry

Adversaries may modify the Windows Security Support Provider (SSP) configuration in the registry to establish persistence or evade defenses.

Microsoft Defender XDR +4 persistence defense-evasion registry-modification ssp
2r 2t
high advisory

Suspicious Microsoft Antimalware Service Executable Execution

Detects suspicious execution of the Microsoft Antimalware Service Executable (MsMpEng.exe) from non-standard paths or renamed instances, which may indicate an attempt to evade defenses through DLL side-loading or masquerading.

Microsoft Antimalware Service Executable +6 defense-evasion execution windows
3r 1t
medium advisory

SolarWinds Process Disabling Services via Registry Modification

A SolarWinds binary is modifying the start type of a service to be disabled via registry modification, potentially to disable or impair security services.

Microsoft Defender XDR +1 solarwinds defense-evasion registry-modification supply-chain
2r 3t
medium advisory

Signed Proxy Execution via MS Work Folders

Attackers can abuse Windows Work Folders to execute a masqueraded control.exe file from untrusted locations, potentially bypassing application controls for defense evasion and privilege escalation.

Windows Work Folders +3 defense-evasion masquerading windows
2r 3t
medium advisory

Renamed Utility Executed with Short Program Name

This rule detects the execution of renamed utilities with a single-character process name, differing from the original filename, a common technique used by adversaries for staging, executing temporary utilities, or bypassing security detections.

Elastic Defend +1 defense-evasion masquerading windows
2r 1t
medium advisory

Remote File Download via Desktopimgdownldr Utility

The desktopimgdownldr utility can be abused to download remote files, potentially bypassing standard download restrictions and acting as an alternative to certutil for malware or tool deployment.

Microsoft Defender XDR +1 command-and-control file-download windows desktopimgdownldr
3r 1t
medium advisory

Remote File Copy to a Hidden Share

This rule detects remote file copy attempts to hidden network shares, which may indicate lateral movement or data staging activity, by identifying suspicious file copy operations using command-line tools like cmd.exe and powershell.exe focused on hidden share patterns.

Elastic Defend +2 lateral-movement data-staging windows hidden-share
2r 3t
medium advisory

Registry Persistence via AppInit DLL Modification

Modification of the AppInit DLLs registry keys on Windows systems allows attackers to execute code in every process that loads user32.dll, establishing persistence and potentially escalating privileges.

Microsoft Windows +6 persistence defense-evasion appinit-dlls registry windows
2r 2t
medium advisory

Registry Persistence via AppCert DLL Modification

Detection of registry modifications related to AppCert DLLs, a persistence mechanism where malicious DLLs are loaded by every process using common API functions.

Elastic Defend +3 persistence privilege-escalation appcert-dll
2r 2t
medium advisory

RDP Enabled via Registry Modification

An adversary may enable Remote Desktop Protocol (RDP) access by modifying the `fDenyTSConnections` registry key, potentially indicating lateral movement preparation or defense evasion.

Microsoft Defender XDR +1 lateral-movement defense-evasion rdp registry-modification
2r 2t
medium advisory

Rare Connection to WebDAV Target via Rundll32

This rule identifies rare connection attempts to a Web Distributed Authoring and Versioning (WebDAV) resource, where attackers may inject WebDAV paths in files opened by a victim to leak NTLM credentials via forced authentication using rundll32.exe.

Microsoft Defender XDR +2 credential-access webdav windows
2r 2t
medium advisory

Persistence via WMI Event Subscription

Adversaries can leverage Windows Management Instrumentation (WMI) to establish persistence by creating event subscriptions that trigger malicious code execution when specific events occur, using tools like wmic.exe to create event consumers.

Microsoft Defender XDR +7 persistence execution windows wmi
2r 2t
medium advisory

NullSessionPipe Registry Modification for Lateral Movement

Attackers modify the NullSessionPipe registry setting in Windows to enable anonymous access to named pipes, potentially facilitating lateral movement and unauthorized access to network resources.

M365 Defender +3 lateral-movement defense-evasion registry-modification
3r 2t
medium advisory

New ActiveSync Allowed Device Added via PowerShell

The rule detects the use of the Exchange PowerShell cmdlet, Set-CASMailbox, to add a new ActiveSync allowed device, potentially allowing attackers to gain persistent access to sensitive email data by adding unauthorized devices.

Microsoft Defender XDR +4 exchange activesync powershell persistence
2r 3t
medium advisory

MSBuild Started by System Process for Defense Evasion and Execution

Adversaries are leveraging MSBuild, a Microsoft Build Engine, to execute malicious code by initiating it from system processes such as Explorer or WMI to evade defenses and execute unauthorized actions.

Elastic Defend +3 defense-evasion execution msbuild proxy-execution windows
2r 2t
medium advisory

Microsoft Defender Tampering via Registry Modification

Adversaries may disable or tamper with Microsoft Defender features via registry modifications to evade detection and conceal malicious behavior on Windows systems.

Microsoft Defender XDR +4 defense-evasion registry-modification windows
2r 2t
medium advisory

Execution via Windows Subsystem for Linux

This detection identifies attempts to execute programs from the Windows Subsystem for Linux (WSL) to evade detection by flagging suspicious executions initiated by WSL processes and excluding known safe executables.

Microsoft Defender XDR +3 defense-evasion execution windows wsl
2r 2t
medium advisory

Execution via Local SxS Shared Module

This rule detects the creation, modification, or deletion of DLL files within Windows SxS local folders, which could indicate an attempt to execute malicious payloads by abusing shared module loading.

M365 Defender +4 execution defense-evasion dll-hijacking
2r 2t
medium advisory

Exchange Mailbox Export via PowerShell

Adversaries may use the New-MailboxExportRequest PowerShell cmdlet to export mailboxes in Exchange, potentially leading to sensitive information theft.

Microsoft Defender XDR +2 collection execution powershell exchange mailbox
2r 4t
medium advisory

Encoded Executable Stored in the Registry

This rule detects registry write modifications hiding encoded portable executables, indicative of adversary defense evasion by avoiding storing malicious content directly on disk.

Elastic Defend +3 defense-evasion registry windows
2r 3t 1i
high advisory

Disabling LSA Protection via Registry Modification

Adversaries may modify the RunAsPPL registry key to disable LSA protection, which prevents nonprotected processes from reading memory and injecting code, potentially leading to credential access.

Elastic Defend +3 defense-evasion windows registry
2r 1t
high advisory

Command Obfuscation via Unicode Modifier Letters

Adversaries use Unicode modifier letters to obfuscate command-line arguments, evading string-based detections on common Windows utilities like PowerShell and cmd.exe.

Microsoft Defender XDR +5 defense-evasion command-line unicode obfuscation
2r 1t
medium advisory

Command Execution via ForFiles Utility

Adversaries may use the Windows forfiles utility to proxy command execution via a trusted parent process, potentially evading detection.

Microsoft Defender XDR +2 defense-evasion indirect-execution windows
2r 1t
low advisory

Active Directory Discovery via ADExplorer Execution

Detects the execution of ADExplorer, a tool used for Active Directory viewing and editing, which can be abused by adversaries for domain reconnaissance and creating offline snapshots of the AD database.

Microsoft Defender XDR +1 active-directory discovery reconnaissance windows
2r 5t
medium advisory

Image File Execution Options (IFEO) Injection for Persistence and Defense Evasion

Attackers can establish persistence and evade defenses by modifying the Debugger and SilentProcessExit registry keys to perform Image File Execution Options (IFEO) injection, allowing them to intercept file executions and run malicious code.

Elastic Defend +3 persistence defense-evasion registry ifeo windows
3r 2t
high advisory

IIS HTTP Logging Disabled via AppCmd

An attacker with IIS server access can disable HTTP Logging using `appcmd.exe` to evade defenses and prevent forensic analysis, as detected by the execution of `appcmd.exe` with arguments to disable logging.

Elastic Defend +3 defense-evasion iis httplogging appcmd windows
2r 1t
high advisory

Detects Kirbi File Creation

Detects the creation of .kirbi files, a suspicious Kerberos ticket artifact often produced by ticket export or dumping tools such as Rubeus or Mimikatz, indicating preparation for Kerberos ticket theft or Pass-The-Ticket (PTT) attacks.

Microsoft Defender XDR +2 credential-access kerberos pass-the-ticket mimikatz rubeus
2r 1t
low advisory

Adding Hidden File Attribute via Attrib.exe

Adversaries can use attrib.exe to add the 'hidden' attribute to files to hide them from users and evade detection, which can be detected by monitoring process executions related to attrib.exe.

M365 Defender +4 defense-evasion persistence windows attrib.exe
2r 2t
medium advisory

Persistence via PowerShell Profile Modification

Attackers can modify PowerShell profiles to inject malicious code that executes each time PowerShell starts, establishing persistence on a Windows system.

Microsoft Defender XDR +2 persistence powershell windows
2r 2t
high advisory

Control Panel Process with Unusual Arguments

Adversaries may abuse control.exe to proxy execution of malicious code by using the Control Panel process to execute payloads from unusual locations, detected by identifying suspicious keywords or paths in the process command line.

Elastic Defend +3 defense-evasion proxy-execution windows
2r 1t
low advisory

Windows Peripheral Device Discovery via fsutil

Adversaries may use the Windows file system utility, fsutil.exe, with the fsinfo drives command to enumerate attached peripheral devices and gain information about a compromised system.

Microsoft Defender XDR +1 discovery windows fsutil
2r 1t
high advisory

Suspicious Microsoft HTML Application Child Process

Mshta.exe spawning a suspicious child process, such as cmd.exe or powershell.exe, indicates potential adversarial activity leveraging Mshta to execute malicious scripts and evade detection on Windows systems.

Windows +2 defense-evasion mshta process-creation
2r 1t
medium advisory

Suspicious .NET Code Compilation via Unusual Parent Processes

Adversaries may use unusual parent processes to execute .NET compilers for compiling malicious code after delivery, evading security mechanisms, and this activity is detected by monitoring compiler executions initiated by scripting engines or system utilities.

Microsoft Defender XDR +3 defense-evasion compile-after-delivery windows
2r 3t
medium advisory

Potential Protocol Tunneling via Yuze

This alert detects potential protocol tunneling activity via the execution of Yuze, a lightweight open-source tunneling tool often used by threat actors for intranet penetration via forward and reverse SOCKS5 proxy tunneling.

Defender XDR +2 command-and-control tunneling yuze proxy
2r 3t
medium advisory

Netsh Used to Enable Remote Desktop Protocol (RDP) in Windows Firewall

Adversaries may use the `netsh.exe` utility to enable inbound Remote Desktop Protocol (RDP) connections in the Windows Firewall, potentially allowing unauthorized remote access to compromised systems.

Windows Firewall +4 defense-evasion lateral-movement windows netsh rdp
2r 2t
medium advisory

Mounting of Hidden or WebDav Remote Shares via Net Utility

Adversaries may leverage the `net.exe` utility to mount WebDav or hidden remote shares, potentially indicating lateral movement, data exfiltration preparation, or initial access via discovery of accessible shares.

Elastic Defend +2 lateral-movement data-exfiltration windows
2r 4t
medium advisory

Disabling User Account Control via Registry Modification

Attackers may disable User Account Control (UAC) by modifying specific registry values, allowing them to execute code with elevated privileges, bypass security restrictions, and potentially escalate privileges on Windows systems.

Microsoft Defender XDR +1 privilege-escalation defense-evasion windows
2r 3t
high advisory

Detection of Kali Linux Installation or Usage via Windows Subsystem for Linux (WSL)

Adversaries may attempt to install or use Kali Linux via Windows Subsystem for Linux (WSL) to avoid detection, potentially enabling them to perform malicious activities within a Windows environment while blending in with legitimate WSL usage.

Windows Subsystem for Linux +4 defense-evasion windows wsl kalilinux
2r 1t
medium advisory

Detecting Execution from Alternate Data Streams

Adversaries may execute malicious code from Alternate Data Streams (ADS) on Windows to evade defenses by hiding malware within legitimate files, which this detection identifies by monitoring process execution paths and arguments.

M365 Defender +1 defense-evasion windows alternate data stream
2r 1t
high advisory

Creation or Modification of Domain Backup DPAPI Private Keys

Detection of creation or modification of Domain Backup private keys, which adversaries may extract from a Domain Controller (DC) to decrypt domain user master key files.

Elastic Defend +2 credential-access dpapi domain-controller
3r 1t
medium advisory

Code Signing Policy Modification Through Registry

Attackers may modify the Windows registry to disable code signing policy, allowing the execution of unsigned or self-signed malicious code, thereby bypassing security controls and enabling defense evasion.

Elastic Defend +2 defense-evasion registry-modification code-signing
2r 2t
medium advisory

Xwizard COM Object Execution for Defense Evasion

Adversaries may abuse Xwizard, a Windows system binary, to execute Component Object Model (COM) objects created in the registry to evade defensive countermeasures by proxying execution through a legitimate system tool.

Microsoft Defender XDR +2 execution defense-evasion com-object xwizard windows
2r 2t
high advisory

NTDS or SAM Database File Copied

Detects copy operations of Active Directory Domain Database (ntds.dit) or Security Account Manager (SAM) files, potentially exposing sensitive hashed credentials on Windows systems.

Microsoft Defender XDR +2 credential-access windows ntds sam credential-theft
2r 1t