Skip to content
Threat Feed

Vendor

Microsoft

471 briefs RSS
high advisory

Argo Workflows Credentials Exposed in Pod Logs

Argo Workflows versions 4.0.0 to 4.0.4 log artifact repository credentials in plaintext, allowing users with read access to pod logs to extract sensitive information such as S3 access keys and GCS service account keys.

argo-workflows credential-access kubernetes
2r 1t 1c
high advisory

Multi-Stage 'Code of Conduct' Phishing Campaign Leads to AiTM Token Compromise

A widespread phishing campaign utilized 'code of conduct' lures, a multi-step attack chain, and legitimate email services to distribute authenticated messages from attacker-controlled domains, ultimately leading to adversary-in-the-middle (AiTM) token compromise, primarily targeting US-based organizations.

Microsoft Defender for Office 365 phishing credential-theft AiTM token-compromise
2r 2t 2i
low advisory

Potential PowerShell Obfuscated Script via High Entropy

This detection identifies potentially obfuscated PowerShell scripts based on high entropy and non-uniform character distributions, often used by attackers to evade signature-based detections and hinder analysis.

Microsoft Intune Management Extension +2 defense-evasion powershell obfuscation
2r 3t
medium advisory

Windows Port Forwarding Rule Addition via Registry Modification

An adversary may abuse port forwarding to bypass network segmentation restrictions by creating a new port forwarding rule through modification of the Windows registry.

Elastic Defend +3 port-forwarding registry-modification command-and-control defense-evasion windows
2r 3t
medium advisory

Suspicious Zoom Child Process Execution

A suspicious Zoom child process was detected, indicating a potential attempt to run unnoticed by masquerading as Zoom.exe or exploiting a vulnerability, resulting in the execution of cmd.exe, powershell.exe, pwsh.exe, or powershell_ise.exe.

Microsoft Defender XDR +1 defense-evasion execution windows
2r 6t
medium advisory

Suspicious Windows PowerShell Arguments Detected

This rule identifies the execution of PowerShell with suspicious argument values, often observed during malware installation, by detecting unusual PowerShell arguments indicative of abuse, focusing on patterns like encoded commands, suspicious downloads, and obfuscation techniques.

Elastic Defend +5 powershell malware execution
3r 4t
medium advisory

Suspicious Execution via Windows Command Debugging Utility

Adversaries can abuse the Windows command line debugging utility cdb.exe to execute commands or shellcode from non-standard paths, evading traditional security measures.

Microsoft Defender XDR +5 lolbas defense-evasion windows
2r 2t
medium advisory

SIP Provider Modification for Defense Evasion

This rule detects modifications to the registered Subject Interface Package (SIP) providers, which are used by the Windows cryptographic system to validate file signatures, potentially indicating an attempt to bypass signature validation or inject code for defense evasion.

Microsoft Defender XDR +2 defense-evasion windows registry-modification
2r 1t
medium advisory

Service DACL Modification via sc.exe

Detection of service DACL modifications via `sc.exe` using the `sdset` command, potentially leading to defense evasion by denying service access to legitimate users or system accounts.

Microsoft Defender XDR +2 defense-evasion persistence windows
2r 2t
medium advisory

Remote Desktop File Opened from Suspicious Path

Adversaries may abuse RDP files delivered via phishing from suspicious locations to gain unauthorized access to systems.

M365 Defender +4 initial-access rdp phishing windows
2r 2t
medium advisory

Potential WSUS Abuse for Lateral Movement via PsExec

Adversaries may exploit Windows Server Update Services (WSUS) to execute PsExec for lateral movement within a network by abusing the trusted update mechanism to run signed binaries.

Windows Server Update Services lateral-movement wsus psexec windows
2r 2t
low advisory

Potential Secure File Deletion via SDelete Utility

This rule detects file name patterns generated by the use of Sysinternals SDelete utility, potentially used by attackers to delete forensic indicators and hinder data recovery efforts.

Microsoft Defender XDR +3 defense evasion impact windows
2r 2t
low advisory

Potential Remote File Execution via MSIEXEC

The rule detects the execution of the built-in Windows Installer, msiexec.exe, to install a remote package potentially abused by adversaries for initial access and defense evasion.

Windows Installer msiexec remote-file-execution initial-access defense-evasion windows
2r 3t
medium advisory

Potential Pass-the-Hash (PtH) Attempt Detection

This rule detects potential Pass-the-Hash (PtH) attempts in Windows environments by monitoring successful authentications with specific user IDs (S-1-5-21-* or S-1-12-1-*) and the `seclogo` logon process, where attackers use stolen password hashes to authenticate and move laterally across systems without needing plaintext passwords.

Windows lateral-movement threat-detection
2r 1t
medium advisory

Potential NetNTLMv1 Downgrade Attack via Registry Modification

This brief details a registry modification attack that downgrades the system to NTLMv1 authentication, enabling NetNTLMv1 downgrade attacks, typically performed with local administrator privileges on Windows systems.

Microsoft Defender XDR +2 defense-evasion ntlm registry-modification windows
2r 2t
medium advisory

Potential Evasion via Windows Filtering Platform Blocking Security Software

Adversaries may add malicious Windows Filtering Platform (WFP) rules to prevent endpoint security solutions from sending telemetry data, impairing defenses, which this rule detects by identifying multiple WFP block events where the process name is associated with endpoint security software.

Windows Filtering Platform +2 defense-evasion windows-filtering-platform endpoint-security
2r 2t
medium advisory

Potential DLL Side-Loading via Trusted Microsoft Programs

This rule detects potential DLL side-loading attempts by identifying instances of Windows trusted programs (WinWord.exe, EXPLORER.EXE, w3wp.exe, DISM.EXE) being started after being renamed or from a non-standard path, which is a common technique to evade defenses by side-loading a malicious DLL into the memory space of a trusted process.

WinWord.exe +4 defense-evasion execution dll-side-loading windows
2r 2t
medium advisory

Potential Active Directory Replication Account Backdoor

Attackers can modify Active Directory object security descriptors to grant DCSync rights to unauthorized accounts, creating a backdoor to extract credential data.

Active Directory credential-access persistence active-directory dcsync
2r 2t
medium advisory

Local Account TokenFilter Policy Modification for Defense Evasion and Lateral Movement

Adversaries may modify the LocalAccountTokenFilterPolicy registry key to bypass User Account Control (UAC) and gain elevated privileges remotely by granting high-integrity tokens to remote connections from local administrators, facilitating lateral movement and defense evasion.

Elastic Defend +3 defense-evasion lateral-movement persistence registry-modification
2r 4t
low advisory

Enumerating Domain Trusts via DSQUERY.EXE

Adversaries may use the `dsquery.exe` command-line utility to enumerate trust relationships for lateral movement in Windows multi-domain environments.

Microsoft Defender XDR discovery domain-trust windows
2r 2t
medium advisory

Detection of VScode Remote Tunneling for Command and Control

The rule detects the execution of the VScode portable binary with the tunnel command line option, potentially indicating an attempt to establish a remote tunnel session to Github or a remote VScode instance for unauthorized access and command and control.

Microsoft Defender XDR +3 command-and-control vscode remote-access-tools windows
2r 1t
low advisory

Command Shell Activity Started via RunDLL32

This rule detects command shell activity, such as cmd.exe or powershell.exe, initiated by RunDLL32, a technique commonly abused by attackers to execute malicious code and bypass security controls.

M365 Defender +2 execution command-shell rundll32
2r 4t
medium advisory

Code Signing Policy Modification Through Built-in Tools

Attackers may attempt to disable or modify code signing policies on Windows systems by using built-in tools like bcdedit.exe in order to execute unsigned or self-signed malicious code.

M365 Defender +1 defense-evasion code-signing windows
2r 1t
high advisory

Norton Secure VPN Privilege Escalation Vulnerability (CVE-2025-58074)

A privilege escalation vulnerability exists in Norton Secure VPN during installation via the Microsoft Store (CVE-2025-58074), allowing a low-privilege user to replace files leading to arbitrary file deletion and potential elevation of privileges.

Norton Secure VPN privilege-escalation windows vulnerability
2r 1t 1c
medium advisory

Microsoft Product Vulnerability CVE-2026-37555

CVE-2026-37555 is a vulnerability affecting a Microsoft product, requiring further investigation upon patch release.

vulnerability microsoft cve-2026-37555
2r 1c
low advisory

Microsoft CVE-2026-30656 Information Published

Microsoft published information regarding CVE-2026-30656, but the details of the vulnerability are not available.

vulnerability microsoft
1c
high threat

Increased npm Supply Chain Attacks Targeting SAP Developers

Threat actors are compromising npm packages, including those targeting SAP developers, to steal credentials, embed themselves in CI/CD pipelines, and deploy multi-stage payloads using techniques like wormable propagation and covert C2 channels on GitHub.

@bitwarden/cli +6 TeamPCP npm supply-chain credential-theft github
2r 5t 3i
medium advisory

Microsoft Product Vulnerability CVE-2026-41526

CVE-2026-41526 is a vulnerability affecting an unspecified Microsoft product, requiring further investigation upon patch release for exploitation details.

vulnerability microsoft
1c
medium advisory

Libssh Denial-of-Service Vulnerability via Inefficient Regular Expression Processing (CVE-2026-0967)

CVE-2026-0967 is a denial-of-service vulnerability in libssh, stemming from inefficient regular expression processing that could lead to defense evasion and impact availability on affected systems.

libssh denial-of-service CVE-2026-0967 defense-evasion
2r 1t 1c
high advisory

Chromium Use-After-Free Vulnerability in ANGLE (CVE-2026-7359)

A use-after-free vulnerability in the ANGLE graphics engine within Chromium (CVE-2026-7359) allows for potential exploitation in Google Chrome and Microsoft Edge.

Chrome +1 use-after-free chromium edge cve-2026-7359
2r 1c
critical advisory

CVE-2026-7339: Heap Buffer Overflow in WebRTC

A heap buffer overflow vulnerability exists in the WebRTC component of Google Chrome and Microsoft Edge (Chromium-based), potentially leading to code execution.

Chrome +1 webrtc heap-overflow code-execution cve-2026-7339
2r 1c
high advisory

Chromium Use-After-Free Vulnerability in Media Component (CVE-2026-7355)

CVE-2026-7355 is a use-after-free vulnerability in the Media component of Chromium, affecting Google Chrome and Microsoft Edge, potentially allowing for arbitrary code execution.

Chrome +1 use-after-free chromium cve-2026-7355 browser
2r 1t 1c
critical advisory

Chromium Use-After-Free Vulnerability in GPU Component (CVE-2026-7357)

CVE-2026-7357 is a use-after-free vulnerability in the GPU component of Chromium that also affects Microsoft Edge, potentially leading to arbitrary code execution.

Chrome +1 use-after-free chromium edge
2r 1t 1c
critical threat

Chromium Use-After-Free Vulnerability in GPU Component (CVE-2026-7333)

CVE-2026-7333 is a use-after-free vulnerability in the GPU component of Chromium, affecting Google Chrome and Microsoft Edge, potentially leading to arbitrary code execution.

Chrome +1 use-after-free chromium gpu cve-2026-7333 remote code execution
2r 1c
critical advisory

Chromium Use-After-Free Vulnerability in Codecs (CVE-2026-7348)

CVE-2026-7348 is a use-after-free vulnerability in the Codecs component of Chromium, affecting Google Chrome and Microsoft Edge.

Chrome +1 use-after-free vulnerability browser
2r 1t 1c
high advisory

Chromium Use-After-Free Vulnerability in Cast (CVE-2026-7349)

CVE-2026-7349 is a use-after-free vulnerability in the Cast component of Chromium, affecting Google Chrome and Microsoft Edge.

Chrome +1 use-after-free browser chromium
2r 1t 1c
critical advisory

Chromium Use-After-Free Vulnerability in Cast (CVE-2026-7338)

CVE-2026-7338 is a use-after-free vulnerability in the Cast component of Chromium, affecting Google Chrome and Microsoft Edge, potentially leading to arbitrary code execution.

Chrome +1 use-after-free edge cve-2026-7338 remote code execution
2r 1c
critical advisory

Chromium Heap Buffer Overflow Vulnerability (CVE-2026-7353)

CVE-2026-7353 is a heap buffer overflow vulnerability in the Skia graphics library used by Chromium, affecting both Google Chrome and Microsoft Edge.

Chrome +1 heap overflow chromium cve-2026-7353
2r 2t 1c
high threat

Q1 2026 Email Threat Landscape: Rise in Phishing Techniques and Tycoon2FA Disruption

In Q1 2026, email threats increased, including credential phishing, QR code phishing, and CAPTCHA-gated campaigns, with Microsoft's disruption of the Tycoon2FA phishing platform leading to a 15% volume decrease and shifts in threat actor tactics; BEC activity remained prevalent at 10.7 million attacks.

Microsoft Defender Storm-1747 email phishing credential-theft Tycoon2FA BEC
2r 1t
high advisory

ClickFix 'BackgroundFix' Campaign Delivers CastleLoader, NetSupport RAT, and CastleStealer

The 'BackgroundFix' ClickFix campaign uses social engineering to trick victims into downloading malware disguised as a free image-editing tool, leading to the deployment of CastleLoader, NetSupport RAT for remote access, and CastleStealer for credential theft.

Microsoft Windows +2 clickfix malware social-engineering rat infostealer castleloader netsupport
2r 3t 1i
high advisory

ABB Ability OPTIMAX Authentication Bypass Vulnerability

CVE-2025-14510 allows an attacker to bypass Azure Active Directory Single-Sign On authentication in vulnerable ABB Ability OPTIMAX versions, potentially granting unauthorized access to critical infrastructure systems.

OPTIMAX 6.1 +4 authentication bypass ics vulnerability
2r 1t 1c
high threat

Unpatched Microsoft Windows RPC Vulnerability Allows Privilege Escalation

A local attacker can exploit an unpatched vulnerability in Microsoft Windows RPC to escalate privileges.

Windows RPC privilege-escalation windows unpatched-vulnerability
2r 1t
high advisory

OpenPrinting CUPS Path Traversal Vulnerability (CVE-2026-34978)

CVE-2026-34978 is a path traversal vulnerability in OpenPrinting CUPS that allows writing files outside the CacheDir/rss directory, potentially overwriting the job.cache file.

path traversal cups cve-2026-34978 file write
2r 2t 1c
high advisory

CVE-2026-5778 Integer Underflow in ChaCha Decryption Leads to Out-of-Bounds Access

CVE-2026-5778 is an integer underflow vulnerability in the ChaCha decrypt path of an unspecified Microsoft product, leading to an out-of-bounds access issue.

integer-underflow memory-corruption cve
2r 1c
medium advisory

CVE-2026-32283 Unauthenticated TLS 1.3 KeyUpdate DoS Vulnerability

CVE-2026-32283 is a vulnerability in crypto/tls that allows unauthenticated TLS 1.3 KeyUpdate records, leading to persistent connection retention and a denial-of-service condition.

denial-of-service tls crypto/tls
2r 1t 1c
medium advisory

CVE-2026-28388 NULL Pointer Dereference in Delta CRL Processing

CVE-2026-28388 is a NULL Pointer Dereference vulnerability in an unspecified Microsoft product when processing a Delta CRL, potentially leading to a denial-of-service condition.

cve-2026-28388 denial-of-service certificate revocation list
2r 1c
info advisory

Microsoft Published Information on CVE-2026-32777

Microsoft has published information regarding CVE-2026-32777, but no further details regarding the vulnerability or its exploitation are currently available.

cve-2026-32777 vulnerability
1c
medium advisory

Microsoft Published Information on CVE-2026-32776

Microsoft published information regarding CVE-2026-32776, however, further details require JavaScript to be enabled, limiting the actionable intelligence at this time.

cve vulnerability
1c
medium advisory

Microsoft CVE-2026-32778 Vulnerability Published

Microsoft published information regarding vulnerability CVE-2026-32778, but no details regarding the vulnerability are available at this time.

cve vulnerability
2r 1c
medium advisory

CVE-2026-34073: Incomplete DNS Name Constraint Enforcement Vulnerability

CVE-2026-34073 is a vulnerability in unspecified Microsoft products due to incomplete DNS name constraint enforcement on peer names, potentially leading to certificate validation bypass.

certificate validation man-in-the-middle dns name constraint tls cve-2026-34073
2r 1c
critical advisory

CVE-2026-1005 Integer Underflow in AES-GCM/CCM/ARIA-GCM Decryption

CVE-2026-1005 is an integer underflow vulnerability in a Microsoft product that leads to out-of-bounds memory access during AES-GCM/CCM/ARIA-GCM decryption processes, potentially allowing for code execution or information disclosure.

cve cryptography memory corruption aes-gcm
2r 1t 1c
high advisory

Komari Agent Abused as SYSTEM-Level Backdoor

Threat actors are abusing the Komari monitoring agent, a project hosted on GitHub, as a SYSTEM-level backdoor following initial access through compromised VPN credentials and lateral movement via Impacket.

Defender +2 komari backdoor nssm github rat reverse shell
2r 4t 2i
medium advisory

CVE-2025-68146 filelock TOCTOU Race Condition Enables Symlink Attacks

CVE-2025-68146 describes a Time-of-Check Time-of-Use (TOCTOU) race condition vulnerability in the filelock library that could allow for symlink attacks during lock file creation, potentially leading to unauthorized file access or modification.

TOCTOU symlink filelock CVE-2025-68146 race condition
2r 1c
medium advisory

rust-openssl Memory Leak via Unchecked Callback Length (CVE-2026-41898)

CVE-2026-41898 describes a vulnerability in rust-openssl where unchecked callback-returned length in PSK and cookie generation can cause OpenSSL to leak adjacent memory to a network peer.

rust-openssl memory-leak tls cve
2r 1c
high threat

UNC6692 Combines Social Engineering, Malware, and Cloud Abuse

UNC6692 is a newly discovered, financially motivated threat actor that combines social engineering via Microsoft Teams, custom malware named SNOWBELT, and abuse of legitimate AWS S3 cloud infrastructure in its attack campaigns to steal credentials and prepare for data exfiltration.

Microsoft Teams +1 UNC6692 social-engineering malware cloud-abuse credential-theft lateral-movement
2r 12t
medium advisory

CVE-2026-31622 NFC-A Cascade Depth Bounds Check Failure

CVE-2026-31622 describes a vulnerability related to an NFC bounds check issue, specifically a failure to properly validate NFC-A cascade depth in the SDD response handler within Microsoft products, potentially leading to unexpected behavior or security compromise.

nfc bounds-check-failure cve-2026-31622
2r 1t 1c
medium advisory

CVE-2026-23398 ICMP NULL Pointer Dereference

CVE-2026-23398 is a vulnerability related to a NULL pointer dereference in the ICMP protocol, potentially leading to a denial-of-service condition in affected Microsoft products.

icmp denial-of-service vulnerability cve
2r 1t 1c
medium advisory

Microsoft Product Vulnerability CVE-2026-41080

CVE-2026-41080 is a vulnerability affecting a Microsoft product; the specific product, impact, and exploitation details are currently undisclosed.

CVE-2026-41080 vulnerability microsoft
2r 1c
high advisory

Large-Scale OAuth Device Code Phishing Campaign Observed in April 2026

In early April 2026, Arctic Wolf tracked a large-scale device code phishing campaign across multiple regions and sectors where threat actors abused OAuth device code flow to trick victims into providing authentication codes.

Azure Active Directory oauth device-code phishing initial-access
2r 1t
high advisory

Multiple Vulnerabilities in Microsoft Cloud Products Allow Privilege Escalation and Code Execution

Multiple vulnerabilities in Microsoft Azure, Microsoft 365 Copilot, Microsoft Dynamics 365, and Microsoft Power Apps could allow an attacker to escalate privileges, execute arbitrary code, and conduct spoofing attacks.

Azure +3 cloud privilege-escalation code-execution spoofing
3r 3t 5c
critical advisory

PhantomRPC: Windows RPC Privilege Escalation Vulnerability

A vulnerability in Windows RPC architecture allows an attacker to create a fake RPC server and escalate their privileges to SYSTEM level, leveraging processes with impersonation privileges.

Windows privilege-escalation rpc
2r 1t
high threat

Trigona Ransomware Employing Custom Data Exfiltration Tool

Trigona ransomware is using a custom data exfiltration tool named 'uploader_client.exe' to steal data from compromised environments, enhancing speed and evasion.

Windows +3 Trigona ransomware data exfiltration custom tool
2r 4t 1i
medium advisory

Microsoft Product Vulnerability CVE-2026-22005

CVE-2026-22005 is a newly published vulnerability affecting a Microsoft product, requiring further investigation to determine the specific product, attack vector, and potential impact.

CVE-2026-22005 vulnerability microsoft
3r 1c
medium advisory

Microsoft Discloses Information Regarding CVE-2026-22004

Microsoft has released information regarding the vulnerability CVE-2026-22004, but details about the vulnerability and its exploitation are currently unavailable.

cve-2026-22004 vulnerability microsoft
1r 1t 1c
low advisory

Microsoft CVE-2026-35236 Information Published

Microsoft has published information regarding CVE-2026-35236, but no details about the vulnerability or its exploitation are currently available.

cve vulnerability microsoft
2r
high advisory

CVE-2026-31478 Vulnerability in Microsoft ksmbd

CVE-2026-31478 is a vulnerability in Microsoft's ksmbd implementation related to incorrect calculation of maximum output buffer length, potentially leading to a denial-of-service or remote code execution.

ksmbd cve smb memory-corruption
2r 3t 1c
medium advisory

CVE-2026-34303 Affecting Microsoft Products

CVE-2026-34303 is a vulnerability affecting an unspecified Microsoft product, requiring further investigation upon disclosure of details.

vulnerability cve microsoft
2r 1c
high advisory

CVE-2026-31507 Double-Free Vulnerability in net/smc

CVE-2026-31507 is a double-free vulnerability in the net/smc module that occurs when the tee() function duplicates a splice pipe buffer, potentially leading to memory corruption and denial of service.

cve-2026-31507 double-free memory corruption denial of service
2r 2t 1c
high advisory

Entra ID Excessive Account Lockouts Detected

A high volume of failed Microsoft Entra ID sign-in attempts resulting in account lockouts indicates potential brute-force attacks, such as password spraying or credential stuffing, targeting user accounts.

Entra ID azure entra_id credential_access brute_force
2r 3t
high advisory

AWS Credentials Used from GitHub Actions and Non-CI/CD Infrastructure

Attackers are stealing AWS credentials configured as GitHub Actions secrets and using them from non-CI/CD infrastructure, indicating potential credential theft and unauthorized access to AWS resources.

AWS IAM +1 cloud aws github credential-theft initial-access lateral-movement
2r 2t
medium threat

Potential Web Shell ASPX File Creation

The creation of ASPX files in web server directories, excluding legitimate processes, indicates potential web shell deployment for persistence on Windows systems.

exploited SharePoint web-shell persistence windows
2r 1t
medium advisory

Powercat PowerShell Implementation Detection

Adversaries may leverage Powercat, a PowerShell implementation of Netcat, to establish command and control channels or perform lateral movement within a compromised network.

Windows command-and-control execution lateral-movement powershell
2r 2t
medium advisory

Active Directory Group Modification by SYSTEM Account

Detection of a user being added to an Active Directory group by the SYSTEM account (S-1-5-18) can indicate an attacker with SYSTEM privileges attempting to pivot to a domain account.

Active Directory persistence privilege-escalation windows
2r 2t
high advisory

WDAC Policy File Creation by Unusual Process

Adversaries may use a specially crafted Windows Defender Application Control (WDAC) policy to restrict the execution of security products, detected by unusual process creation of WDAC policy files.

Microsoft Defender XDR +5 wdac defense-evasion windows
2r 1t
high advisory

Untrusted DLL Loaded by Azure AD Connect Authentication Agent

The loading of an untrusted DLL by the Azure AD Connect Authentication Agent, potentially indicating credential access attempts via the Pass-through Authentication service, is detected by this rule.

Azure AD Connect Authentication Agent credential-access dll-side-loading azure-ad-connect
2r 1t
medium advisory

MsiExec Child Process Spawning Network Connections for Defense Evasion

Detection of MsiExec spawning child processes that initiate network connections, potentially indicating abuse of Windows Installers for malware delivery and defense evasion.

Elastic Defend +3 defense-evasion windows msiexec
2r 1t
medium advisory

Persistence via Windows Installer (Msiexec)

Adversaries may establish persistence by abusing the Windows Installer (msiexec.exe) to create scheduled tasks or modify registry run keys, allowing for malicious code execution upon system startup or user logon.

Windows +21 persistence defense-evasion
3r 3t
medium advisory

Alternate Data Stream Creation/Execution at Volume Root Directory

Detection of Alternate Data Stream (ADS) creation at a volume root directory, a technique used to hide malware and tools by exploiting how ADSs in root directories are not readily visible to standard system utilities, indicating a defense evasion attempt.

Microsoft Defender XDR +2 defense-evasion hide-artifacts alternate-data-stream
2r 1t
medium advisory

Potential Veeam Credential Access via SQL Commands

Attackers can leverage sqlcmd.exe or PowerShell commands like Invoke-Sqlcmd to access Veeam credentials stored in MSSQL databases, potentially targeting backups for destructive operations such as ransomware attacks.

Microsoft Defender XDR +1 veeam credential-access mssql windows ransomware
2r 5t
high advisory

Detecting Potential PowerShell Pass-the-Hash/Relay Scripts

This rule detects PowerShell scripts associated with NTLM relay or pass-the-hash tooling and SMB/NTLM negotiation artifacts, indicating potential credential access and lateral movement attempts by attackers.

Windows credential-access pass-the-hash ntlm-relay powershell
2r 2t
medium advisory

Potential Windows Session Hijacking via CcmExec

Adversaries may exploit Microsoft's System Center Configuration Manager by loading malicious DLLs into SCNotification.exe, a process associated with user notifications, potentially leading to Windows session hijacking.

System Center Configuration Manager defense-evasion dll-hijacking sccm
2r 1t
medium advisory

NTDS Dump via Wbadmin

Attackers with Backup Operator privileges may abuse wbadmin.exe to access the NTDS.dit file, enabling credential dumping and domain compromise.

Microsoft Defender XDR +4 credential-access windows wbadmin ntds.dit
2r 2t
medium advisory

Microsoft Management Console File Execution from Unusual Path

Adversaries may use Microsoft Management Console (MMC) files from untrusted paths to bypass security controls for initial access and execution on Windows systems.

Microsoft Management Console File +2 execution defense-evasion windows
2r 4t
medium advisory

DNS Global Query Block List Modified or Disabled

Attackers with DNSAdmin privileges can modify or disable the DNS Global Query Block List (GQBL) in Windows, allowing exploitation of hosts running WPAD with default settings for privilege escalation and lateral movement.

Elastic Defend +4 defense-evasion registry-modification windows
2r 3t
high advisory

Suspicious Registry Hive Access via RegBack

This rule detects attempts to access registry backup hives (SAM, SECURITY, SYSTEM) via RegBack on Windows systems, which can contain or enable access to credential material.

Endpoint Defense +6 credential-access regback windows
2r 1t
medium advisory

Unauthorized Modification of Azure Conditional Access Policy

An unauthorized actor modifies an Azure Conditional Access policy, potentially leading to privilege escalation, credential access, persistence, or defense impairment.

Azure Active Directory azure conditional-access policy-modification attack.privilege-escalation attack.credential-access attack.persistence attack.defense-impairment attack.t1548 +1
2r 2t
medium advisory

Azure AD Root Certificate Authority Added for Passwordless Authentication

An attacker may add a new root certificate authority to an Azure AD tenant to support certificate-based authentication for persistence, privilege escalation, or defense evasion.

Azure Active Directory attack.credential-access attack.persistence attack.privilege-escalation attack.defense-impairment attack.t1556
2r 4t
high advisory

Potential ADIDNS Poisoning via Wildcard Record Creation

Attackers can create wildcard records in Active Directory Integrated DNS (ADIDNS) to redirect traffic, enabling adversary-in-the-middle attacks for credential interception or relay.

Active Directory Integrated DNS credential-access adidns windows active-directory
2r 1t
medium advisory

GenAI Process Connection to Unusual Domain on macOS

This rule detects GenAI tools on macOS connecting to unusual domains, potentially indicating command and control activity, data exfiltration, or malicious payload retrieval following compromise via prompt injection, malicious MCP servers, or poisoned plugins.

Copilot +22 genai command and control macos network connection
2r 1t
medium advisory

Azure AD Certificate-Based Authentication Enabled

Enabling certificate-based authentication (CBA) in Azure Active Directory can be abused by attackers to establish persistence, escalate privileges, and impair defenses.

Azure Active Directory azure certificate-based-authentication persistence privilege-escalation
2r 1t
medium advisory

Suspicious Child Processes from Communication Applications

The detection rule identifies suspicious child processes spawned from communication applications on Windows systems, potentially indicating masquerading or exploitation of vulnerabilities within these applications.

Elastic Defend +12 defense-evasion persistence windows
3r 3t
medium advisory

Network-Level Authentication (NLA) Disabled via Registry Modification

Adversaries may disable Network-Level Authentication (NLA) by modifying specific registry keys to bypass authentication requirements for Remote Desktop Protocol (RDP) and enable persistence mechanisms.

Microsoft Defender XDR +4 defense-evasion lateral-movement registry-modification windows
2r 2t
high advisory

Azure Identity Protection Suspicious Browser Activity

A suspicious browser activity alert indicates anomalous behavior based on suspicious sign-in activity across multiple tenants from different countries in the same browser, potentially indicating compromised credentials or other malicious activity.

Azure identity-protection suspicious-browser
2r 6t
medium advisory

Azure Firewall Rule Collection Modification or Deletion

An attacker may modify or delete Azure Firewall rule collections (Application, NAT, and Network) to impair defenses and potentially enable malicious traffic.

Azure Firewall azure firewall defense-impairment
2r 2t
medium advisory

Potential Enumeration via Active Directory Web Service

Adversaries may abuse the Active Directory Web Service (ADWS) to enumerate network resources and user accounts, by loading AD-related modules followed by a network connection to the ADWS dedicated TCP port.

Active Directory Web Service active-directory enumeration adws discovery windows
2r 3t
high advisory

Wireless Credential Dumping via Netsh

Adversaries use the Windows built-in utility Netsh to dump Wireless saved access keys in clear text, potentially leading to credential compromise.

Defender XDR +2 credential-access netsh windows
2r 2t
medium advisory

Windows Console History Clearing

Adversaries may clear the command history of a compromised account to conceal the actions undertaken during an intrusion on a Windows system.

M365 Defender +1 defense-evasion powershell windows
2r 2t
medium advisory

System File Ownership Change for Defense Evasion

Adversaries may modify file or directory ownership to evade access control lists (ACLs) and access protected files, often using icacls.exe or takeown.exe to reset permissions on system files.

Microsoft Defender XDR +2 defense-evasion persistence windows
3r 1t
medium advisory

Service Reconnaissance via WMIC.exe

Adversaries use WMIC.exe to enumerate running services on remote devices, potentially identifying valuable targets or misconfigured systems.

Windows attack.execution attack.t1047
2r 1t
low advisory

Netsh Helper DLL Persistence

Attackers may abuse the Netsh Helper DLL functionality by adding malicious DLLs to execute payloads every time the netsh utility is executed via administrators or scheduled tasks, achieving persistence.

Microsoft Defender XDR +3 persistence windows netsh registry
2r 2t
medium advisory

Expired or Revoked Driver Loaded

An expired or revoked driver being loaded on a Windows system may indicate an attempt to gain code execution in kernel mode or abuse revoked certificates for malicious purposes, potentially leading to privilege escalation or defense evasion.

Elastic Defend privilege-escalation defense-evasion windows
2r 3t
critical advisory

CVE-2022-2068 c_rehash Command Injection Vulnerability

CVE-2022-2068 is a command injection vulnerability in the c_rehash script, requiring immediate attention to prevent potential arbitrary code execution.

cve-2022-2068 command-injection c_rehash certificate-management
2r 1t 1c
high advisory

Azure AD Sign-In with Unfamiliar Properties

This alert detects Azure AD sign-ins with properties unfamiliar to the user, indicating potential account compromise or unauthorized access.

Azure Active Directory azure identity_protection sign-in account_compromise risk_detection
2r 4t
high advisory

Azure AD Sign-in from New Country/Region

Detection of Azure AD sign-ins originating from countries or regions not previously associated with a user, indicating potential account compromise or anomalous activity.

Entra ID attack.stealth attack.t1078 attack.persistence attack.privilege-escalation attack.initial-access
2r 1t
medium advisory

Azure AD Authentication from Unexpected Geo-locations

Detection of successful authentications originating from geographic locations outside of an organization's expected operational footprint, potentially indicating compromised credentials or unauthorized access.

Azure Active Directory azuread authentication geo-location unauthorized-access credential-compromise privilege-escalation
2r 1t
medium advisory

VaultCmd Usage for Listing Windows Credentials

Adversaries may use vaultcmd.exe to list credentials stored in the Windows Credential Manager to gain unauthorized access to saved usernames and passwords, potentially in preparation for lateral movement.

Microsoft Defender XDR +1 credential-access windows vaultcmd
2r 2t
medium advisory

Suspicious Registry Modifications by Scripting Engines

The use of scripting engines like WScript and CScript to modify the Windows registry can indicate an attempt to bypass standard tools and evade defenses, potentially for persistence or other malicious activities.

Windows defense-evasion persistence execution registry-modification
2r 3t
high advisory

Suspicious Managed Code Hosting Process

This rule detects suspicious managed code hosting processes on Windows systems, potentially indicating code injection or defense evasion tactics by monitoring file events associated with processes commonly used to host managed code, such as wscript.exe, cscript.exe, and mshta.exe.

M365 Defender +3 defense-evasion windows managed code lolbin
2r 1t
medium advisory

Program Files Directory Masquerading

Adversaries may masquerade malicious executables within directories mimicking the legitimate Windows Program Files directory to evade defenses and execute untrusted code.

Elastic Defend +2 defense-evasion masquerading windows
2r 1t
medium advisory

Multiple Logon Failure from the Same Source Address

Detection of multiple consecutive logon failures from the same source address within a short time interval on Windows systems, indicating potential brute force or password spraying attacks targeting multiple user accounts.

Windows credential-access brute-force password-spraying
2r 2t
high advisory

AWS Identity API Access from Rare ASN Organizations

This rule detects AWS identities with API traffic dominated by cloud-provider source AS organization labels, but also exhibit traffic from other AS organizations, potentially indicating credential reuse or pivoting.

aws cloudtrail initial-access credential-access
2r 1t
high advisory

Potential Remote Install via MsiExec

This rule detects attempts to install a file from a remote server using MsiExec, which adversaries may abuse to deliver malware, by identifying msiexec.exe processes running with arguments indicative of remote installations and executed from suspicious parent processes.

Microsoft Defender XDR +3 defense-evasion windows msiexec remote-install
2r 1t
low advisory

Potential Exploitation of an Unquoted Service Path Vulnerability

This rule detects potential exploitation of unquoted service path vulnerabilities, where adversaries may escalate privileges by placing a malicious executable in a higher-level directory within the path of an unquoted service executable.

Microsoft Defender XDR +4 privilege-escalation unquoted-service-path windows
2r 1t
medium advisory

Potential Abuse of Certreq for File Transfer via HTTP POST

Adversaries may abuse the Windows Certreq utility to download files or upload data to a remote URL by making an HTTP POST request, potentially for command and control or exfiltration, which can be detected by monitoring process execution events.

Microsoft Defender XDR +2 lolbin command-and-control exfiltration certreq
2r 4t
medium advisory

Windows Registry Classes Autorun Keys Modification for Persistence

Adversaries modify Windows Registry Classes keys to establish persistence by executing malicious code when specific file types are opened or actions are performed, potentially leading to privilege escalation and persistent access.

Windows attack.privilege-escalation attack.persistence attack.t1547.001
3r 1t
medium advisory

Remote File Download via Script Interpreter

Attackers are using Windows script interpreters (cscript.exe or wscript.exe) to download executable files from remote locations to deliver second-stage payloads or download tools.

Windows Script Host command-and-control execution windows script_interpreter
2r 3t
medium advisory

Kerberos Pre-authentication Disabled for User Account

Detection of Kerberos pre-authentication being disabled for a user account, potentially leading to AS-REP roasting and offline password cracking by attackers with GenericWrite or GenericAll rights over the account.

Active Directory kerberos credential-access as-rep-roasting active-directory windows
3r 4t
medium advisory

Detection of Obfuscated IP Address Usage in Download Commands

This brief details the use of obfuscated IP addresses within download commands, often employed to evade detection by hiding the true destination of malicious downloads.

Windows discovery evasion obfuscation
2r 2t
high advisory

AMSI Enable Registry Key Modification for Defense Evasion

Adversaries modify the AmsiEnable registry key to 0 to disable Windows Script AMSI scanning, bypassing AMSI protections for Windows Script Host or JScript execution.

Microsoft Defender XDR +4 defense-evasion amsi registry windows
2r 1t
low advisory

Microsoft Office 'Office Test' Registry Persistence Abuse

Attackers modify the Microsoft Office 'Office Test' Registry key to achieve persistence by specifying a malicious DLL that executes upon application startup.

Microsoft Office +4 persistence registry windows
2r 2t
medium advisory

Active Directory msPKIAccountCredentials Modification

Attackers can modify the msPKIAccountCredentials attribute in Active Directory user objects to abuse credential roaming, potentially overwriting files for privilege escalation, by injecting malicious credential objects.

Active Directory privilege-escalation credential-roaming active-directory windows
2r 2t
medium advisory

XSL Script Execution via COM Interface in Microsoft Office

Adversaries may exploit Microsoft Office applications to execute malicious JScript or VBScript by leveraging the Microsoft.XMLDOM COM interface to process and transform XML documents using XSL scripts, potentially leading to initial access or defense evasion.

Microsoft Office +3 xsl-script com-interface office-macro
2r 5t
high advisory

Suspicious Alternate Data Stream (ADS) File Creation

Detects suspicious creation of Alternate Data Streams (ADS) on targeted files using script or command interpreters, indicative of malware hiding in ADS for defense evasion.

M365 Defender +3 defense-evasion ads file-creation windows
2r 1t
medium advisory

System Shells Launched via Windows Services

Attackers may configure existing services or create new ones to execute system shells to elevate their privileges from administrator to SYSTEM, using services.exe as the parent process of the shell.

Windows +2 persistence execution privilege_escalation
2r 4t
high advisory

PowerShell Kerberos Ticket Dumping via LSA Authentication Package Access

Detection of PowerShell scripts attempting to dump Kerberos tickets from memory by accessing LSA authentication packages, potentially leading to credential access and lateral movement.

PowerShell credential-access kerberos windows
2r 1t
high advisory

Potential Kerberos Coercion via DNS-Based SPN Spoofing

Adversaries may abuse MicrosoftDNS records containing a base64-encoded blob to coerce victim systems into authenticating to attacker-controlled hosts while requesting Kerberos tickets for legitimate services, detected via directory-service access events.

Active Directory kerberos coercion dns spn spoofing credential-access
2r 1t
medium advisory

LSASS Credential Dumping via Windows Error Reporting (WER) Abuse

Attackers can enable full user-mode dumps system-wide via registry modification to facilitate LSASS credential dumping, allowing extraction of credentials from process memory without deploying malware.

Elastic Defend +2 credential-access windows lsass wepw
2r 2t
low advisory

Group Policy Discovery via Microsoft GPResult Utility

Detects the execution of `gpresult.exe` with arguments `/z`, `/v`, `/r`, or `/x` on Windows systems, which attackers may use during reconnaissance to enumerate Group Policy Objects and identify opportunities for privilege escalation or lateral movement.

M365 Defender +1 discovery windows group_policy
2r 1t
low advisory

Detection of Malicious Browser Extension Installation

This rule identifies the installation of potentially malicious browser extensions, which adversaries can leverage for persistence and unauthorized activity by monitoring file creation events in common browser extension directories on Windows systems.

Elastic Defend +2 persistence browser-extension windows
2r
high advisory

Azure AD Device Registration Policy Changes Detected

Monitoring changes to the device registration policy can detect potential privilege escalation or defense impairment attempts by malicious actors aiming to weaken security controls related to device management in Azure Active Directory.

Azure Active Directory azure device-registration policy-change
2r 1t
medium advisory

Persistence via BITS Job Notify Cmdline

Adversaries can achieve persistence by abusing the Background Intelligent Transfer Service (BITS) SetNotifyCmdLine method to execute a program after a job finishes, leading to arbitrary code execution and system compromise.

Defender XDR +2 persistence bits windows
2r 1t
high advisory

CVE-2026-3229 Integer Overflow in Certificate Chain Allocation

CVE-2026-3229 is an integer overflow vulnerability in certificate chain allocation affecting a Microsoft product, potentially leading to denial of service or arbitrary code execution.

integer_overflow certificate_chain denial_of_service code_execution cve
2r 1c
high threat

Suspicious Microsoft Diagnostics Wizard Execution

This rule detects potential abuse of the Microsoft Diagnostics Troubleshooting Wizard (MSDT) to proxy malicious command or binary execution via malicious process arguments on Windows systems.

Elastic Defend +2 defense-evasion msdt windows
3r 1t
high advisory

Unusual Executable File Creation by a System Critical Process

The rule identifies unexpected executable file creation or modification by critical Windows processes, potentially indicating remote code execution or exploitation attempts.

Microsoft Defender XDR +3 defense-evasion execution windows
2r 1t
high advisory

First Time Seen Account Performing DCSync

Detection of a user account initiating the Active Directory replication process for the first time, potentially indicating a DCSync attack for credential theft and domain compromise.

Active Directory credential-access privilege-escalation windows active-directory
2r 1t
medium advisory

Detecting Rare SMB Connections for Potential NTLM Credential Theft

This brief details a detection strategy for rare SMB connections originating from internal networks to the internet, potentially indicating NTLM credential theft via rogue UNC path injection.

Elastic Defend +2 exfiltration credential-access windows smb ntlm
2r 2t
high advisory

CVE-2026-41445 KissFFT Integer Overflow leads to Heap Buffer Overflow

CVE-2026-41445 is a reported integer overflow vulnerability in the KissFFT library that could lead to a heap buffer overflow.

integer-overflow heap-overflow kissfft
1r 1t 1c
medium advisory

Windows Script Execution from Archive File

This rule identifies attempts to execute Jscript/Vbscript files from an archive file, a common delivery method for malicious scripts on Windows systems.

M365 Defender +2 execution windows scripting archive
2r 3t
medium advisory

Executable File Creation with Multiple Extensions

Detection of executable files created with multiple extensions, a masquerading technique to evade defenses.

Elastic Defend +3 defense-evasion execution masquerading windows
2r 2t
high advisory

CVE-2026-31611: ksmbd Sub-Authority Validation Vulnerability

CVE-2026-31611 is a vulnerability in ksmbd, requiring at least three sub-authorities before reading sub_auth[2], potentially leading to unauthorized access or code execution.

cve-2026-31611 ksmbd smb vulnerability
2r 1t 1c
critical advisory

CVE-2026-31609 SMB Client Double-Free Vulnerability

CVE-2026-31609 is a critical double-free vulnerability in the SMB client, specifically within the smbd_free_send_io() function after smbd_send_batch_flush(), potentially leading to arbitrary code execution.

smb double-free cve-2026-31609 rce
2r 1c
high advisory

Credential Acquisition via Registry Hive Dumping

Detects attempts to export sensitive Windows registry hives (SAM/SECURITY) using reg.exe, potentially leading to credential compromise.

Elastic Endgame +6 credential-access registry-dump windows
2r 1t
high advisory

Azure AD Threat Intelligence Detection

This brief focuses on detecting unusual user activity and sign-in patterns flagged by Azure AD Threat Intelligence, which may indicate stealthy attacks, persistence attempts, privilege escalation, or initial access.

Azure Active Directory azuread threat-intelligence risk-detection
2r 1t
medium advisory

UAC Bypass via Windows Firewall MMC Snap-In Hijack

Attackers bypass User Account Control (UAC) by hijacking the Microsoft Management Console (MMC) Windows Firewall snap-in to execute code with elevated permissions, potentially leading to system compromise.

Windows uac-bypass privilege-escalation windows-firewall mmc
2r 2t
high advisory

Potential Process Injection via PowerShell

This detection identifies PowerShell scripts leveraging Win32 APIs for memory allocation, process access, and thread creation, indicative of potential process injection or in-memory payload execution on Windows systems.

Windows Defender Advanced Threat Protection process injection powershell defense evasion
2r 2t
low advisory

Windows Defender Disabled via Registry Modification

Attackers modify the Windows Defender registry settings to disable the service or set the service to be started manually, evading defenses.

Windows Defender +1 defense-evasion windows registry modification
2r 3t
high advisory

Uncommon Svchost Command Line Parameters Indicate Potential Masquerading or Injection

Detection of svchost.exe executing with uncommon command-line parameters, excluding known legitimate patterns, which may indicate file masquerading, process injection, or process hollowing.

Windows defense-evasion privilege-escalation process-injection
2r 2t
medium advisory

Spoofing AD FS Signing Logs via Azure AD Hybrid Health Service

A threat actor can create a new, rogue AD Health ADFS service within Azure and then create a fake server instance, which can be leveraged to spoof AD FS signing logs without compromising on-prem AD FS servers.

Azure Active Directory +1 cloud azure adfs defense-impairment
2r 1t
critical advisory

ksmbd Out-of-Bounds Write Vulnerability in QUERY_INFO (CVE-2026-31432)

CVE-2026-31432 is a critical out-of-bounds write vulnerability in ksmbd, specifically within the QUERY_INFO functionality when handling compound requests, potentially leading to code execution or denial of service.

ksmbd smb out-of-bounds write cve-2026-31432
2r 1c
medium advisory

Azure Authentication Method Change Detection

An attacker may add an authentication method to a compromised Azure account for persistent access, which can be detected by monitoring changes to authentication methods in Azure audit logs.

Azure persistence privilege-escalation
2r 3t
medium advisory

CVE-2026-34293: Unspecified Vulnerability in Microsoft Product

CVE-2026-34293 is an unspecified vulnerability affecting a Microsoft product, for which details are currently unavailable, posing a potential risk to affected systems.

cve vulnerability microsoft
2r 1c
medium advisory

CVE-2026-31613 SMB Client Out-of-Bounds Read Vulnerability

CVE-2026-31613 is an out-of-bounds read vulnerability in the SMB client when parsing symlink error responses, requiring patching to prevent potential information disclosure or denial-of-service.

cve-2026-31613 smb out-of-bounds read vulnerability
2r 1t 1c
high advisory

Azure Privileged Identity Management (PIM) Invalid License Detection

Detection of unauthorized access or privilege escalation attempts within Azure environments due to invalid or missing Microsoft Entra Premium P2 or Microsoft Entra ID Governance licenses for Privileged Identity Management (PIM).

Azure pim privileged-identity-management invalid-license
2r 1t
medium advisory

Detection of Sensitive LDAP Attribute Access

This rule detects unauthorized access to sensitive Active Directory object attributes such as unixUserPassword, ms-PKI-AccountCredentials, and msPKI-CredentialRoamingTokens, potentially leading to credential theft and privilege escalation.

Active Directory +1 credential-access privilege-escalation collection windows
2r 5t
low advisory

NLTEST.EXE Used for Domain Trust Discovery

Adversaries may use the `nltest.exe` command-line utility to enumerate domain trusts and gain insight into trust relationships to facilitate lateral movement within a Microsoft Windows NT Domain.

Windows NT Domain discovery domain trust lateral movement windows
2r 2t
medium advisory

Windows Sandbox Abuse with Sensitive Configuration

This rule detects the abuse of Windows Sandbox with sensitive configurations to evade detection, where malware may abuse the sandbox feature to gain write access to the host file system, enable network connections, and automatically execute commands via logon, identifying the start of a new container with these sensitive configurations.

Microsoft Defender XDR +4 defense-evasion windows-sandbox windows
3r 1t
medium advisory

Azure Kubernetes Events Deleted

Adversaries may delete events in Azure Kubernetes to evade detection, which this rule detects via the MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/EVENTS.K8S.IO/EVENTS/DELETE operation.

Azure Kubernetes Service azure kubernetes defense-evasion
2r 1t
high advisory

Microsoft Build Engine Started by an Office Application

The Microsoft Build Engine (MSBuild) being started by an Office application is unusual behavior and could indicate a malicious document executing a script payload for defense evasion.

Microsoft Build Engine +2 defense-evasion execution msbuild windows
2r 1t
medium advisory

Unauthorized Removal of Azure Conditional Access Policy

An unauthorized actor removes a Conditional Access policy in Azure, potentially weakening the organization's security posture and enabling privilege escalation or credential access.

Azure Active Directory azure conditional-access privilege-escalation credential-access persistence defense-impairment
2r 3t
high advisory

PowerShell Share Enumeration via ShareFinder or Native APIs

Detection of PowerShell scripts employing ShareFinder functions or Windows share enumeration APIs to discover accessible network shares for reconnaissance, lateral movement, or ransomware deployment.

PowerShell discovery share-enumeration lateral-movement ransomware
2r 1t
high advisory

Azure AD Activity From Anonymous IP Address

Detection of user activity originating from an IP address identified as an anonymous proxy, potentially indicating unauthorized access, privilege escalation, or persistence within an Azure Active Directory environment.

Azure Active Directory azuread anonymous-proxy identity-protection
2r 4t
high advisory

PowerShell Invoke-NinjaCopy Script Detection

The Invoke-NinjaCopy PowerShell script is used by attackers to directly access volume files, such as NTDS.dit or registry hives, for credential dumping.

Windows credential-access powershell ninjacopy
2r 1t
high advisory

Windows EventLog Autologger Session Disabled via Registry Modification

Adversaries may attempt to disable Windows EventLog autologger sessions via registry modification to evade detection and prevent security monitoring of early boot activities and system events.

Windows attack.defense-evasion attack.t1562.002
2r 1t
high advisory

Potential Local NTLM Relay via HTTP

Adversaries may coerce local NTLM authentication over HTTP via WebDAV named-pipe paths (Print Spooler, SRVSVC), then relay credentials to elevate privileges.

Microsoft Defender XDR +1 ntlm-relay credential-access windows webdav
2r 1t
medium advisory

Multiple Logon Failure Followed by Logon Success

This rule identifies potential password guessing/brute force activity from a single address, followed by a successful logon, indicating that an attacker may have compromised an account by brute-forcing login attempts across multiple users.

Windows Security Event Logs credential-access brute-force windows
2r 1t
low advisory

Account Discovery Command via SYSTEM Account

The rule identifies when the SYSTEM account uses an account discovery utility, potentially indicating discovery activity after privilege escalation, focusing on utilities like whoami.exe and net1.exe executed under the SYSTEM account.

Elastic Defend +5 discovery privilege-escalation windows
3r 3t
medium advisory

Suspicious WMI Image Load from MS Office

Adversaries may exploit Windows Management Instrumentation (WMI) to execute code stealthily, bypassing traditional security measures by loading `wmiutils.dll` from Microsoft Office applications, potentially indicating malicious execution.

WINWORD.EXE +4 wmi image load office execution
2r 1t
high advisory

Suspicious LSASS Access via Malicious Secondary Logon Service

An attacker abuses the Secondary Logon service (seclogon.dll) to gain unauthorized access to the LSASS process, potentially leaking credentials.

Windows credential-access lsass seclogon
3r 1t
medium advisory

Persistence via Scheduled Job Creation

This detection rule identifies attempts to establish persistence on Windows systems by creating scheduled jobs in the Windows Tasks directory, excluding known legitimate jobs.

Microsoft Defender XDR +5 persistence windows
2r 1t
medium advisory

MSBuild Making Network Connections Indicating Potential Defense Evasion

MsBuild.exe making outbound network connections may indicate adversarial activity as attackers leverage MsBuild to execute code and evade detection.

MSBuild defense-evasion command-and-control
2r 2t
medium advisory

LSASS Process Access via Windows API

Detection of access attempts to the LSASS handle, indicating potential credential dumping by monitoring API calls (OpenProcess, OpenThread, ReadProcessMemory) targeting lsass.exe.

Microsoft Defender XDR +1 credential-access lsass windows
2r 2t
medium advisory

Suspicious WerFault Child Process Abuse

This rule detects suspicious child processes of WerFault.exe, a Windows error reporting tool, indicating potential abuse of the SilentProcessExit registry key to execute malicious processes stealthily for defense evasion, persistence, and privilege escalation.

Microsoft Defender XDR +2 defense-evasion persistence privilege-escalation masquerading
2r 3t
medium advisory

PowerShell Script Block Logging Disabled via Registry Modification

Attackers may disable PowerShell Script Block Logging by modifying the registry to conceal their activities on the host and evade detection by setting the `EnableScriptBlockLogging` registry value to 0, impacting security monitoring and incident response capabilities.

Defender XDR +2 defense-evasion powershell registry
2r 2t
medium advisory

Potential Timestomping of Executable Files on Windows

This rule identifies potential timestomping behavior on Windows systems where the creation time of executable files in sensitive system directories is modified, potentially to blend malicious executables with legitimate system files and evade detection.

Windows defense-evasion timestomp
2r 1t
medium advisory

MSBuild Making Network Connections

Detection of MsBuild.exe making outbound network connections which may indicate adversarial activity used to execute code and evade detection.

MSBuild defense-evasion windows
2r 2t
medium advisory

IIS AppCmd Tool Used to Dump Service Account Credentials

Attackers with access to IIS web servers may use the AppCmd command-line tool to dump sensitive configuration data, including application pool credentials, potentially leading to lateral movement and privilege escalation.

IIS credential-access appcmd windows
2r 2t
medium advisory

Disabling Windows Defender Security Settings via PowerShell

Attackers use PowerShell commands, including base64-encoded variants, to disable or weaken Windows Defender settings, impairing defenses on compromised systems.

Windows Defender defense-evasion powershell windows
2r 2t
medium advisory

Detection of Custom Shim Database Installation for Persistence

Attackers abuse the Application Compatibility Shim functionality in Windows to establish persistence and achieve arbitrary code execution by installing malicious shim databases, which this detection identifies through monitoring registry changes.

Windows +7 persistence app-compat shim
2r 1t
high advisory

rust-openssl Deriver::derive and PkeyCtxRef::derive Buffer Overflow Vulnerability (CVE-2026-41676)

CVE-2026-41676 is a buffer overflow vulnerability in rust-openssl's Deriver::derive and PkeyCtxRef::derive functions when used with OpenSSL 1.1.1, potentially leading to denial of service or arbitrary code execution.

rust-openssl openssl buffer overflow cve-2026-41676
2r 1c
medium advisory

Unusual Service Host Child Process - Childless Service

This detection identifies unusual child processes of Service Host (svchost.exe) that traditionally do not spawn child processes, potentially indicating code injection or exploitation.

m365_defender +3 process_injection privilege_escalation defense_evasion windows
2r 2t
medium advisory

UAC Bypass via DiskCleanup Scheduled Task Hijack

Attackers bypass User Account Control (UAC) by hijacking the DiskCleanup Scheduled Task to stealthily execute code with elevated permissions on Windows systems.

Defender XDR +1 uac-bypass privilege-escalation windows diskcleanup scheduled-task
2r 3t
medium advisory

Process Execution from Suspicious Windows Directories

Adversaries may execute processes from unusual default Windows directories to masquerade malware and evade defenses by blending in with trusted paths, making malicious activity harder to detect.

Windows +2 defense-evasion masquerading
2r 1t
medium advisory

Persistence via Malicious Microsoft Outlook VBA Template

Attackers establish persistence by installing a malicious VBA template in Microsoft Outlook, triggering scripts upon application startup by modifying the VBAProject.OTM file, detected by monitoring for unauthorized file modifications.

Outlook persistence vba windows
2r 1t
medium advisory

Detection of Command and Control Activity via Commonly Abused Web Services

This rule detects command and control activity using common web services by identifying Windows hosts making DNS requests to a list of commonly abused web services from processes outside of known program locations, potentially indicating adversaries attempting to blend malicious traffic with legitimate network activity.

OneDrive +7 command-and-control windows threat-detection
2r 2t
medium advisory

DCOM Lateral Movement via ShellWindows/ShellBrowserWindow

This analytic identifies the use of Distributed Component Object Model (DCOM) to execute commands on a remote host, specifically when launched via ShellBrowserWindow or ShellWindows Application COM objects, indicating potential lateral movement by an attacker.

Windows lateral-movement dcom
2r 2t
medium advisory

Abuse of Windows Update Client for DLL Loading

The Windows Update Auto Update Client (wuauclt.exe) is being abused to load arbitrary DLLs, a defense evasion technique where malicious activity blends with legitimate Windows software by using specific process arguments and placing DLLs in writable paths.

Windows Auto Update Client defense-evasion execution lolbas windows
2r 3t
medium advisory

Disable Windows Event and Security Logs Using Built-in Tools

Attackers attempt to disable Windows Event and Security Logs using logman, PowerShell, or auditpol to evade detection and cover their tracks.

Microsoft Defender XDR +2 defense-evasion windows eventlog
3r 3t
medium advisory

Incoming Execution via PowerShell Remoting

This rule identifies remote execution via Windows PowerShell remoting, which allows a user to run any Windows PowerShell command on one or more remote computers, potentially indicating lateral movement.

Elastic Defend +2 lateral-movement powershell remoting
2r 2t
high advisory

Azure PIM Account Stale Sign-in Alert

Detection of stale accounts in Azure Privileged Identity Management (PIM) through the 'staleSignInAlertIncident' event, indicating potential compromised or unused privileged accounts.

Azure Privileged Identity Management azure pim stale_account
2r 1t
medium advisory

Process Activity via Compiled HTML File Execution

Adversaries may conceal malicious code in compiled HTML files (.chm) and deliver them to a victim for execution, using the HTML Help executable (hh.exe) to proxy the execution of scripting interpreters and bypass security controls.

Microsoft HTML Help system +5 execution defense-evasion compiled-html windows proxy-execution
2r 5t
medium advisory

Azure Firewall Modification or Deletion Detected

An Azure firewall was created, modified, or deleted, potentially indicating malicious activity aimed at impairing network defenses.

Azure firewall defense-evasion
2r 1t
medium advisory

Azure AD Bitlocker Key Retrieval

An adversary with sufficient privileges in Azure Active Directory may attempt to retrieve BitLocker keys to decrypt drives for lateral movement or data exfiltration.

Azure Active Directory azure bitlocker key-retrieval persistence privilege-escalation
2r 3t
high advisory

Azure PIM Elevation Approved or Denied

Detection of Azure Privileged Identity Management (PIM) elevation approvals or denials, which, if unexpected, may indicate unauthorized privilege escalation or malicious activity within an Azure environment.

Azure pim privilege-escalation persistence
2r 3t
high advisory

Azure AD User Added to Global or Device Admin Role

An attacker may attempt to add a user to a high-privilege Azure AD role, such as Global Administrator or Device Administrator, to establish persistence, gain initial access, escalate privileges, or operate stealthily within the compromised environment.

Azure Active Directory azuread role-assignment privilege-escalation persistence
2r 3t
high advisory

PowerShell P/Invoke Process Injection API Chain Detection

This analytic detects PowerShell code that uses P/Invoke to call Windows API functions associated with process injection, such as VirtualAlloc, WriteProcessMemory, and CreateRemoteThread, indicating potential malicious activity.

PowerShell +3 process-injection pinvoke defense-evasion
2r 8t
high advisory

Azure PIM Role Activation Without MFA

Detection of Azure Privileged Identity Management (PIM) roles being activated without requiring multi-factor authentication, potentially leading to unauthorized privilege escalation and persistence.

Azure pim mfa privilege-escalation
2r 1t
medium advisory

User Added to Group with Conditional Access Policy Modification Access

An attacker adds a user to a privileged Azure Active Directory group with permissions to modify Conditional Access policies, potentially leading to privilege escalation, credential access, persistence, and defense impairment.

Azure Active Directory attack.privilege-escalation attack.credential-access attack.persistence attack.defense-impairment attack.t1548 attack.t1556
3r 4t
medium advisory

Symbolic Link Creation to Shadow Copies for Credential Access

Adversaries may create symbolic links to shadow copies to access sensitive files such as ntds.dit and browser credentials, enabling credential dumping using cmd.exe or powershell.exe.

Microsoft Defender XDR +3 credential-access defense-evasion windows
2r 3t
medium advisory

Outlook Security Settings Registry Modification

Attackers modify Outlook security settings via registry changes to enable malicious mail rules and bypass security controls, potentially leading to persistence and data compromise.

Microsoft Outlook persistence registry_modification outlook email
2r 1t
high advisory

Browser Process Spawned from an Unusual Parent

Attackers may attempt credential theft by launching browsers (Chrome, Edge) with remote debugging, headless automation, or minimal arguments from an unusual parent process on Windows systems.

Edge +4 credential-access windows browser-exploitation
2r 1t
medium advisory

Third-party Backup Files Deleted via Unexpected Process

This detection identifies the deletion of backup files by processes outside of the backup suite, specifically targeting Veritas and Veeam backups, which may indicate an attempt to prevent recovery from ransomware.

Elastic Defend +5 impact backup deletion ransomware
2r 2t
medium threat

Potential Command and Control via Internet Explorer COM Abuse

This rule detects potential command and control activity where Internet Explorer (iexplore.exe) is started via the Component Object Model (COM) and makes unusual network connections, indicating adversaries might exploit Internet Explorer via COM to evade detection and bypass host-based firewall restrictions.

Internet Explorer command-and-control com iexplore windows
2r 4t
medium advisory

Azure Network Firewall Policy Modification or Deletion

An adversary may modify or delete Azure Network Firewall Policies to impair defenses and potentially impact network security.

Azure Network Firewall attack.impact attack.defense-impairment attack.t1686.001
3r
medium advisory

Suspicious Execution via Scheduled Task

This rule identifies execution of suspicious programs via scheduled tasks by looking at process lineage and command line usage, detecting processes such as cscript.exe, powershell.exe, and cmd.exe when executed from suspicious paths like C:\Users\ and C:\ProgramData\.

Windows persistence execution
2r 2t
high advisory

PowerShell Suspicious Payload Encoded and Compressed

Detects PowerShell scripts employing Base64 decoding combined with .NET decompression (Deflate/GZip) to deobfuscate and reconstruct malicious payloads in memory, evading traditional defenses.

Windows Defender Advanced Threat Protection defense-evasion powershell windows
2r 1t
medium advisory

Potential Credential Access via LSASS Handle Duplication

Detection of suspicious LSASS handle access via DuplicateHandle from an unknown call trace module, indicating a potential attempt to bypass the NtOpenProcess API to evade detection and dump LSASS memory for credential access.

Windows credential-access lsass duplicatehandle mirrordump
2r 1t
high advisory

Detect Application AppID URI Configuration Changes in Azure

Detection of configuration changes to an application's AppID URI in Azure, potentially indicating malicious activity related to initial access, persistence, credential access, privilege escalation, or stealth.

Azure Active Directory azure appid uri application serviceprincipal credential-access privilege-escalation
2r 2t
high advisory

SeEnableDelegationPrivilege Assignment Detection

Detection of the assignment of the SeEnableDelegationPrivilege user right to a principal can indicate potential Active Directory compromise and privilege elevation by attackers.

Active Directory credential-access persistence windows active-directory
3r 2t
low advisory

Windows Account Discovery of Administrator Accounts

Adversaries may execute the `net.exe` or `wmic.exe` commands to enumerate administrator accounts or groups, both locally and within the domain, to gather information for follow-on actions.

M365 Defender +2 discovery account-discovery windows
2r 4t
medium advisory

Network Connection via Compiled HTML File

This rule detects network connections initiated by hh.exe, the HTML Help executable, which may indicate the execution of malicious code embedded in compiled HTML files (.chm) to deliver malicious payloads, bypass security controls, and gain initial access via social engineering.

HTML Help execution defense-evasion command-and-control malicious-file html-help
2r 3t
high advisory

Mimikatz MemSSP Log File Detection

This rule detects the creation of the default Mimikatz MemSSP credential log file, mimilsa.log, which is created after the misc::memssp module injects a malicious Security Support Provider into LSASS, potentially capturing credentials from subsequent logons.

Elastic Defend +3 credential-access mimikatz memssp windows
2r 1t 1i
medium advisory

Windows Subsystem for Linux Distribution Installed via Registry Modification

This rule detects registry modifications indicative of a new Windows Subsystem for Linux (WSL) distribution installation, a technique adversaries may leverage to evade detection by utilizing Linux environments within Windows.

Windows Subsystem for Linux +4 wsl defense-evasion windows
2r 3t
medium advisory

MSBuild запускает необычные процессы

Adversaries may exploit MSBuild to execute malicious scripts or compile code, bypassing security controls; this rule detects unusual processes initiated by MSBuild, such as PowerShell or C# compiler, signaling potential misuse for executing unauthorized or harmful actions.

MSBuild +3 defense-evasion execution
2r 3t
high advisory

Detection of Invoke-Obfuscation via Standard Input

This brief outlines detection strategies for adversaries leveraging Invoke-Obfuscation techniques within PowerShell scripts executed via standard input, a method commonly used to evade traditional detection mechanisms.

Windows defense-evasion obfuscation powershell
2r 2t
medium advisory

Detection of Bcdedit Boot Configuration Modification

This rule identifies the use of bcdedit.exe to modify boot configuration data, which may be indicative of a destructive attack or ransomware activity aimed at inhibiting system recovery by disabling error recovery or ignoring boot failures.

Microsoft Defender XDR +2 boot-configuration bcdedit impact windows
2r 1t
high advisory

Azure AD Temporary Access Pass Added to Account

Detection of a temporary access pass (TAP) being added to an Azure AD account, which could indicate potential privilege escalation, initial access, persistence, or stealth activity.

Azure Active Directory azuread temporary-access-pass privilege-escalation initial-access persistence
2r 4t
medium advisory

Azure AD Authentication to Important Apps Using Single-Factor Authentication

Detection of successful Azure AD authentications to critical applications that only required single-factor authentication, potentially indicating a security lapse or policy violation leading to unauthorized access.

Azure Active Directory attack.privilege-escalation attack.persistence attack.initial-access attack.stealth attack.t1078
2r 3t
high advisory

Adversaries Disabling Important Scheduled Tasks

Adversaries disable crucial scheduled tasks, such as those related to BitLocker, Windows Defender, System Restore and Windows Update, using schtasks.exe to disrupt services and potentially facilitate data destruction or ransomware deployment.

Windows attack.impact attack.t1489
2r 1t
medium advisory

Detection of Azure Application Deletion

This alert identifies when an application is deleted within an Azure environment, which could indicate malicious activity or unintended misconfiguration leading to service disruption.

Azure application deletion impact t1489
2r 1t
medium advisory

Remote File Download via PowerShell

Detects PowerShell being used to download executable files from untrusted remote destinations, a common technique for attackers to introduce tooling or malware into a compromised environment.

PowerShell command-and-control file-download windows
2r 2t
medium advisory

Windows Time-Based Evasion via Choice Exec

Detection of choice.exe used in batch files for time-based evasion, a technique observed in SnakeKeylogger malware, indicating potential stealthy code execution and persistence.

Windows +3 time-based-evasion malware persistence defense-evasion
2r 1t
medium advisory

Windows Backup Deletion via Wbadmin

Adversaries may delete Windows backup catalogs and system state backups using wbadmin.exe to inhibit system recovery, often as part of ransomware or other destructive attacks.

Microsoft Defender XDR +3 impact backup-deletion windows
2r 2t
high threat

Windows AutoLogger Session Tampering Detection

Attackers may disable AutoLogger sessions by modifying specific registry values to evade detection and prevent security monitoring of early boot activities and system events, a technique observed in intrusions involving IcedID and XingLocker ransomware.

exploited Windows attack.defense-evasion attack.t1562.002
3r 1t
medium advisory

Unusual Network Activity from Windows System Binaries

Detection of network connections initiated by unusual Windows system binaries, often leveraged by adversaries to proxy execution of malicious code and evade detection, indicating potential defense evasion and command and control activity.

Windows defense-evasion proxy-execution
3r 5t
high advisory

Suspicious Process Access via Direct System Call

Detects suspicious process access events where the call trace does not originate from known Windows system DLLs, indicating potential defense evasion by bypassing hooked APIs via direct syscalls.

EdgeWebView +4 defense-evasion execution windows
2r 3t
high advisory

Suspicious MSIExec Remote Download

The analytic detects the execution of msiexec.exe with an HTTP or HTTPS URL, which indicates an attempt to download and execute potentially malicious software from a remote server, leading to potential unauthorized code execution, system compromise, or malware deployment.

Splunk Enterprise +3 endpoint msiexec remote-download windows
2r 2t
medium advisory

Suspicious Enumeration Commands Spawned via WMIPrvSE

This rule detects suspicious execution of system enumeration commands by the Windows Management Instrumentation Provider Service (WMIPrvSE), indicating potential reconnaissance or malicious activity on Windows systems.

Elastic Defend +3 enumeration wmi discovery execution windows
2r 12t
high advisory

Suspicious Child Processes Spawned by WScript or CScript

Detects suspicious processes spawned by WScript or CScript, a common technique used by adversaries to execute LOLBINs, PowerShell, or inject code into suspended processes for defense evasion.

Splunk Enterprise +2 wscript cscript lolbin malware defense-evasion
2r 3t
high advisory

Suspicious Antimalware Scan Interface DLL Creation

An adversary may attempt to bypass AMSI by creating a rogue AMSI DLL in an unusual location to evade detection.

Microsoft Defender XDR +4 defense-evasion amsi-bypass dll-hijacking windows
2r 1t
high advisory

Script Execution via Microsoft HTML Application

Detects the execution of scripts via HTML applications using Windows utilities rundll32.exe or mshta.exe to bypass defenses by proxying execution of malicious content with signed binaries.

Windows +8 defense-evasion script-execution
3r 1t
high advisory

Potential NTLM Relay Attack against a Computer Account

This rule detects potential NTLM relay attacks against computer accounts by identifying coercion attempts followed by authentication events originating from a different host, indicating that an attacker has captured and relayed the server's computer account hash to execute code on behalf of the compromised system.

Windows Security Event Logs credential-access ntlm-relay windows
2r
low advisory

Detection of Command and Control Activity via Common Web Services

This rule detects command and control (C2) communications that use common web services to hide malicious activity on Windows hosts by identifying network connections to commonly abused web services from processes outside of known legitimate program locations, indicating potential exfiltration or C2 activity blended with legitimate traffic.

Elastic Defend +10 command-and-control webservice windows
2r 1t
high advisory

Detection of Azure Subscription Permission Elevation

Detection of a user being assigned the 'User Access Administrator' role, which grants the ability to manage all Azure Subscriptions, potentially leading to privilege escalation and unauthorized access.

Azure attack.privilege-escalation attack.persistence attack.initial-access attack.stealth attack.t1078
2r 1t
high advisory

Conhost Proxy Execution for Defense Evasion

Adversaries abuse the Console Window Host (conhost.exe) with the `--headless` argument to proxy execution of malicious commands, evading detection by blending in with legitimate Windows software.

Elastic Defend +2 defense-evasion proxy-execution windows
3r 1t
medium advisory

Azure AD User Password Reset Detection

Detects when a user successfully resets their own password in Azure Active Directory, which may indicate malicious activity or account compromise.

Azure Active Directory azure password-reset privilege-escalation initial-access persistence credential-access stealth
2r 1t
medium advisory

Azure AD Guest to Member User Type Conversion

An adversary may convert a guest user account to a member account in Azure Active Directory to elevate privileges and gain persistent access to resources.

Azure Active Directory privilege-escalation azure entra guest-account
2r 1t
high advisory

Potential Shadow Credentials added to AD Object

This rule detects the modification of the msDS-KeyCredentialLink attribute in an Active Directory Computer or User Object, which could indicate an attacker is creating shadow credentials to gain persistent and stealthy access.

Active Directory +2 credential-access shadow-credentials windows
2r 2t
medium advisory

Windows Firewall Disabled via Netsh

Detection of adversaries disabling Windows Firewall rules using the `netsh.exe` command-line tool to weaken defenses and facilitate unauthorized network activity.

Microsoft Defender XDR +1 defense-evasion windows firewall
2r 1t
medium advisory

Suspicious Scripts in the Startup Directory

This rule identifies script engines creating files or the creation of script files in the Windows Startup folder, a persistence technique used by adversaries to automatically execute scripts upon user login.

Elastic Defend +1 persistence startup windows attack.persistence
2r 2t
high advisory

Suspicious Script Interpreter Execution from Environment Variable Folders

Malware may execute scripts from suspicious directories accessible via environment variables using script interpreters like cscript, wscript, mshta, and powershell to evade detection.

Windows execution script-execution malware
2r 1t
medium advisory

Suspicious PowerShell Execution via Windows Script Host

Detection of PowerShell processes launched by cscript.exe or wscript.exe, indicative of potential malicious initial access or execution attempts.

Microsoft Defender XDR +2 initial-access execution windows powershell script
2r 4t
high advisory

Multi-Cloud CLI Token and Credential Access via Command-Line Harvesting

This rule detects command-line activity indicative of credential access across multiple cloud platforms (GCP, Azure, AWS, GitHub, DigitalOcean, Oracle, Kubernetes), looking for specific commands used to print or access tokens and credentials, flagging hosts where multiple cloud targets are accessed within a five-minute window, suggesting potential credential harvesting activity.

gcloud +6 credential-access cloud cli token-harvesting
3r 2t
high advisory

Invoke-Obfuscation via Clip.exe

The use of `clip.exe` in conjunction with PowerShell and command-line obfuscation is used to evade detection.

Windows defense-evasion execution obfuscation
2r 2t
high advisory

Excessive Global Administrator Accounts in Azure PIM

Detection of an excessive number of Global Administrator accounts assigned within an Azure tenant, indicating potential privilege escalation or compromised accounts.

Azure pim global_admin privilege_escalation
2r 3t
high advisory

Detection of Privileged Identity Management (PIM) Settings Modifications

Detects unauthorized or malicious modifications to Privileged Identity Management (PIM) settings within Azure environments, potentially leading to privilege escalation, persistence, and stealthy access by attackers.

Azure Active Directory azure pim privilege-escalation persistence
2r 4t
medium advisory

Detection of Azure Service Principal Creation

Detects the creation of a service principal in Azure, which could indicate potential attacker activity for lateral movement or persistence.

Azure cloud service principal persistence lateral movement
3r 1t
medium advisory

Azure AD Successful Authentication Increase

This detection identifies a statistically significant (10% or greater) increase in successful sign-ins to Azure Active Directory, potentially indicating credential compromise or account takeover attempts.

Azure Active Directory attack.privilege-escalation attack.persistence attack.initial-access attack.stealth attack.t1078
2r 1t
medium advisory

Azure AD Hybrid Health AD FS Service Deletion for Defense Evasion

Threat actors may delete Azure AD Hybrid Health AD FS service instances after using them to spoof AD FS signing logs for defense evasion.

Azure Active Directory attack.defense-impairment attack.t1578.003 azure
2r 1t
medium advisory

Azure Service Principal Removal Detection

Detection of a service principal removal in Azure, potentially indicating malicious activity or an attempt to remove evidence of a compromise.

Azure service principal stealth cloud
2r 1t
high advisory

Proxy Execution via Windows OpenSSH Client

Detection of command execution via proxy using the Windows OpenSSH client (ssh.exe or sftp.exe) to bypass application control using trusted Windows binaries.

M365 Defender +2 defense-evasion proxy-execution openssh application-control-bypass
2r
high advisory

Azure Application URI Configuration Modification

Detection of Azure application URI modifications that can be indicative of malicious activity, such as using dangling URIs, non-HTTPS URIs, wildcard domains, or URIs pointing to uncontrolled domains, potentially leading to initial access, stealth, persistence, credential access, and privilege escalation.

Azure Active Directory cloud azure application uri modification persistence credential-access privilege-escalation
3r 4t
low advisory

Windows User Account Creation via Net.exe

This rule identifies attempts to create new users on Windows systems using net.exe, a common tactic used by attackers to increase access or establish persistence.

Microsoft Defender XDR +2 persistence user-account-creation windows
2r 2t
medium advisory

Unusual Network Connection via DllHost

The rule identifies unusual instances of dllhost.exe making outbound network connections to non-local IPs, which may indicate adversarial Command and Control activity and defense evasion.

Elastic Defend +2 defense-evasion command-and-control windows
2r 2t
medium advisory

Suspicious Process Writing to Startup Folder for Persistence

Adversaries may establish persistence by writing malicious files to the Windows Startup folder, allowing them to automatically execute upon user logon; this detection identifies suspicious processes creating files in these locations.

Microsoft Defender XDR +2 persistence startup windows
2r 1t
medium advisory

Suspicious PowerShell Engine ImageLoad

This rule identifies instances where the PowerShell engine is loaded by processes other than powershell.exe, potentially indicating attackers attempting to use PowerShell functionality stealthily by using the underlying System.Management.Automation namespace and bypassing PowerShell security features.

Elastic Defend powershell execution windows
2r 1t
medium advisory

Suspicious MSBuild Execution from Scripting Processes

Adversaries may use MSBuild, a legitimate Microsoft tool, to execute malicious code through script interpreters for defense evasion and execution on Windows systems.

MSBuild defense-evasion execution proxy-execution
2r 6t
medium advisory

Suspicious Execution via Microsoft Office Add-Ins

This rule detects suspicious execution of Microsoft Office applications launching Office Add-Ins from unusual paths or with atypical parent processes, potentially indicating an attempt to gain initial access via a malicious phishing campaign.

Microsoft Office +5 office-addins phishing initial-access
3r 3t
medium advisory

Suspicious Execution from a Mounted Device

Attackers may use mounted devices as a non-standard working directory to execute signed binaries or script interpreters, evading traditional defense mechanisms, particularly when launched via explorer.exe.

Windows defense-evasion execution mounted-device
2r 9t
medium advisory

Suspicious CertUtil Commands Used for Defense Evasion

Attackers abuse certutil.exe, a native Windows utility, to download/deobfuscate malware for command and control or data exfiltration, evading defenses.

Windows defense-evasion command-and-control credential-access
2r 3t
medium advisory

Remote Execution via File Shares

This rule identifies the execution of a file that was created by the virtual system process, potentially indicating lateral movement via network file shares in Windows environments.

lateral-movement file-share windows
2r 2t
medium advisory

Remote Execution via File Shares

The rule identifies the execution of a file created by the virtual system process, potentially indicating lateral movement via network file shares, by detecting a sequence of file creation/modification followed by process execution, excluding trusted vendors.

Elastic Defend lateral-movement file-shares windows
2r 2t
medium advisory

Potential RemoteMonologue Attack via Registry Modification

This rule detects potential RemoteMonologue attacks by identifying attempts to perform session hijacking via COM object registry modification, specifically when the RunAs value is set to Interactive User.

MsMpEng.exe +4 remotemonologue defense-evasion persistence windows
2r 4t
medium advisory

Potential Defense Evasion via Filter Manager (fltMC.exe)

Adversaries may abuse the Filter Manager Control Program (fltMC.exe) to unload filter drivers, thereby evading security software defenses such as malware detection and file system monitoring.

Defender XDR +3 defense-evasion filter-driver fltMC.exe windows
2r 1t
low advisory

MSBuild Process Injection Detection

The Microsoft Build Engine (MSBuild) is being abused to perform process injection by creating threads in other processes, a technique used to evade detection and potentially escalate privileges.

MSBuild defense-evasion privilege-escalation process-injection
2r 3t
medium threat

Kerberos Traffic from Unusual Process

Detects network connections to the standard Kerberos port from an unusual process other than lsass.exe, potentially indicating Kerberoasting or Pass-the-Ticket activity on Windows systems.

Elastic Defend +22 kerberoasting credential-access lateral-movement windows
2r 2t
medium advisory

Execution from Unusual Directory - Command Line

This rule identifies process execution from suspicious default Windows directories, which adversaries may abuse to hide malware in trusted paths to evade defenses.

Microsoft Defender XDR +1 execution defense-evasion windows process-execution
2r 2t
medium advisory

Detecting Remote Windows Service Installation for Lateral Movement

This rule detects a network logon followed by Windows service creation with the same LogonId on a Windows host, which could indicate lateral movement or persistence by adversaries.

Windows +4 lateral-movement persistence
2r 3t
medium advisory

WMI Incoming Lateral Movement

Detection of processes executed via Windows Management Instrumentation (WMI) on a remote host indicating potential adversary lateral movement.

HPWBEM +3 lateral-movement wmi windows
3r 2t
low advisory

Windows USN Journal Deletion via Fsutil

Adversaries may delete the volume USN Journal on Windows systems using `fsutil.exe` to eliminate evidence of post-exploitation file activity.

Windows defense-evasion fsutil usn journal
2r 1t
medium advisory

Windows System Restore Disabled via Registry Modification

Attackers disable Windows System Restore by modifying specific registry keys to hinder recovery efforts after malicious activity.

Windows impact t1490 persistence
2r 1t
medium advisory

Windows Subsystem for Linux Enabled via Dism Utility

Adversaries may enable and use Windows Subsystem for Linux (WSL) using the Microsoft Dism utility to evade detection on Windows systems by running Linux applications and tools.

Microsoft Defender XDR +2 defense-evasion wsl windows
2r 1t
medium advisory

Windows Script Interpreter Executing Process via WMI

The rule identifies the use of Windows script interpreters (cscript.exe or wscript.exe) executing a process via Windows Management Instrumentation (WMI), which may indicate malicious activity, especially when initiated by non-system accounts.

Sysmon windows wmi script_execution initial_access execution
2r 4t
medium advisory

Windows Scheduled Tasks AT Command Enabled via Registry Modification

Attackers may enable the deprecated Windows AT command via registry modification to achieve local persistence or lateral movement.

Windows +5 defense-evasion persistence lateral-movement
2r 2t
medium advisory

Windows Root Certificate Modification Detection

The modification of root certificates on Windows systems by unauthorized processes can allow attackers to masquerade malicious files as valid signed components and intercept/decrypt SSL traffic, leading to defense evasion and data collection.

Elastic Defend +2 defense-evasion persistence root certificate mitm
2r 2t
medium advisory

Windows Netsh Tool Used for Firewall Discovery

The analytic detects the execution of the Windows built-in tool netsh.exe to display the state, configuration, and profile of the host firewall, potentially leading to unauthorized network access or data exfiltration.

Splunk Enterprise +2 discovery windows netsh firewall
2r 1t
medium advisory

Windows Host Network Discovery Enabled via Netsh

Attackers can enable host network discovery via netsh.exe to weaken host firewall settings, facilitating lateral movement by identifying other systems on the network.

Microsoft Defender XDR +3 defense-evasion windows firewall
2r 1t
medium advisory

Windows Firewall Disabled via PowerShell

Attackers may disable the Windows firewall or its rules using the `Set-NetFirewallProfile` PowerShell cmdlet to enable lateral movement and command and control activity.

Microsoft Defender XDR +3 defense-evasion powershell firewall windows
2r 2t
medium advisory

Windows Defender Exclusions Added via PowerShell

Adversaries may attempt to bypass Windows Defender's capabilities by using PowerShell to add exclusions for folders or processes, and this activity can be detected by monitoring PowerShell command lines that use `Add-MpPreference` or `Set-MpPreference` with exclusion parameters.

Microsoft Defender XDR +3 defense-evasion powershell windows
2r 3t
low advisory

Werfault ReflectDebugger Persistence via Registry Modification

Attackers may establish persistence by modifying the ReflectDebugger registry key associated with Windows Error Reporting to execute arbitrary code when Werfault is invoked with the '-pr' parameter.

Elastic Defend +1 persistence registry_modification werfault
2r 2t
medium advisory

User Removed from Group with Conditional Access Policy Modification Access

An attacker removes a user from a privileged Azure Active Directory group with permissions to modify Conditional Access policies, potentially leading to privilege escalation, persistence, or defense evasion.

Azure Active Directory azure conditional-access privilege-escalation
2r 3t
medium advisory

User Added to Privileged Group in Active Directory

Adversaries may add a user to a privileged group in Active Directory, such as Domain Admins, to maintain persistent access and elevate privileges within the domain.

Active Directory persistence privilege_escalation active_directory
2r 1t
low advisory

Unusual Windows Processes Connecting to Domains Using Free SSL Certificates

This rule identifies unusual Windows processes connecting to domains using known free SSL certificates such as Let's Encrypt, which adversaries may use to conceal command and control traffic.

MicrosoftEdge command-and-control encrypted-channel freessl
2r 1t 4i
low advisory

Unusual Scheduled Task Update

This rule detects modifications to scheduled tasks by user accounts, excluding system activity and machine accounts, which adversaries can exploit for persistence by modifying them to execute malicious code.

Windows persistence scheduled-task
2r 1t
low advisory

Unusual Persistence via Services Registry Modification

Detection of processes modifying the Windows services registry key directly, potentially indicating stealthy persistence attempts via abnormal service creation or modification.

Microsoft Defender XDR +2 persistence windows registry modification
2r 3t
medium advisory

Unusual Parent Process for cmd.exe

The detection rule identifies cmd.exe instances spawned by uncommon parent processes, such as lsass.exe, csrss.exe, or regsvr32.exe, which may indicate unauthorized or suspicious activity, thus aiding in early threat detection.

Elastic Defend +2 execution windows cmd.exe
2r 1t
medium advisory

Unused Privileged Identity Management (PIM) Roles in Azure

Detection of assigned but unused privileged roles in Azure's Privileged Identity Management (PIM) service, indicating potential misconfiguration, license overuse, or dormant privileged access that could be exploited.

Azure pim privileged-identity-management role-based-access-control initial-access privilege-escalation
2r 1t
high advisory

Unsecured Outlook Credentials Access in Windows Registry

An attacker attempts to access unsecured Outlook credentials stored in the Windows registry, potentially leading to unauthorized access to email accounts and sensitive information.

Outlook credential-access windows
2r 1t
medium advisory

Uncommon Registry Persistence Change Detection

This rule detects changes to uncommon registry persistence keys on Windows systems that are not commonly used or modified by legitimate programs, which could indicate an adversary's attempt to persist in a stealthy manner by modifying registry keys for persistence, ensuring malicious code executes on startup or during specific events.

Windows persistence registry
2r 2t
medium advisory

Unauthorized Guest User Invitation Attempt in Azure

Detection of a failed attempt to invite an external guest user by an Azure user lacking the necessary permissions, potentially indicating privilege escalation or malicious insider activity.

Azure privilege-escalation initial-access persistence stealth
2r 1t
medium advisory

Unauthorized Conditional Access Policy Creation in Azure AD

An unauthorized actor created a new Conditional Access policy in Azure AD, potentially leading to privilege escalation and unauthorized access.

Azure Active Directory azure conditional-access privilege-escalation attack.privilege-escalation attack.t1548
2r 1t
medium advisory

UAC Bypass Attempt via Elevated COM Internet Explorer Add-On Installer

This threat brief details a UAC bypass technique leveraging the Internet Explorer Add-On Installer (ieinstal.exe) and Component Object Model (COM) to execute arbitrary code with elevated privileges.

Microsoft Defender XDR +2 uac-bypass privilege-escalation com ieinstal
2r 3t
low advisory

Suspicious Whoami Process Activity

This rule detects suspicious use of whoami.exe to display user, group, and privileges information for the user who is currently logged on to the local system, potentially indicating post-compromise discovery activity.

Microsoft Monitoring Agent +1 discovery windows threat-detection
2r 2t
medium advisory

Suspicious SMB Connections via LOLBin or Untrusted Process

This rule identifies potentially suspicious processes, excluding those signed by Microsoft, making Server Message Block (SMB) network connections over port 445, which could indicate lateral movement attempts.

Elastic Defend lateral-movement smb windows
3r 1t
medium advisory

Suspicious Script Object Execution via scrobj.dll

Detection of scrobj.dll loaded into unusual Microsoft processes indicates potential malicious scriptlet execution for defense evasion and execution by abusing legitimate system binaries.

Elastic Defend +3 defense-evasion execution windows
2r 2t
high advisory

Suspicious Script Interpreter Execution from Environment Variable Folders

Adversaries may execute script interpreters such as cscript, wscript, mshta, or powershell from suspicious directories accessible via environment variables to evade detection and execute malicious scripts.

Windows attack.execution attack.t1059
2r 1t
high advisory

Suspicious Process Execution from Unusual File Paths

Attackers may execute malicious code from unusual file paths such as Windows fonts or debug directories to evade defenses and gain unauthorized access, as detected by endpoint detection and response (EDR) agents.

Splunk Enterprise +2 defense-evasion persistence windows
2r 2t
high advisory

Suspicious Process Accessing Sensitive Identity Files via Auditd

This rule detects suspicious processes, such as copy utilities or scripting tools, accessing sensitive identity files on Linux systems, including Kubernetes tokens, cloud CLI configurations, and root SSH keys, indicating potential credential theft.

Elastic Agent Auditd Manager +4 credential-access linux auditd
3r 2t
medium advisory

Suspicious Network Connection via Registration Utility

The native Windows tools regsvr32.exe, regsvr64.exe, RegSvcs.exe, or RegAsm.exe making a network connection may indicate an attacker bypassing allowlists or running arbitrary scripts via a signed Microsoft binary.

Windows execution defense evasion regsvr32
2r 4t
medium advisory

Suspicious MS Office Child Process

Detects suspicious child processes of Microsoft Office applications, indicating potential exploitation or malicious macros for initial access, defense evasion, and execution.

Microsoft Office +4 initial-access defense-evasion execution discovery windows
2r 18t
medium advisory

Suspicious Mofcomp Activity

This rule detects suspicious mofcomp.exe activity, which attackers may leverage MOF files to manipulate the Windows Management Instrumentation (WMI) repository for execution and persistence by filtering out legitimate processes and focusing on unusual executions, excluding known safe parent processes and system accounts.

Elastic Defend +4 execution persistence windows
2r 2t
medium advisory

Suspicious Modifications to Windows Security Support Provider (SSP) Registry

Adversaries may modify the Windows Security Support Provider (SSP) configuration in the registry to establish persistence or evade defenses.

Microsoft Defender XDR +4 persistence defense-evasion registry-modification ssp
2r 2t
high advisory

Suspicious Microsoft Antimalware Service Executable Execution

Detects suspicious execution of the Microsoft Antimalware Service Executable (MsMpEng.exe) from non-standard paths or renamed instances, which may indicate an attempt to evade defenses through DLL side-loading or masquerading.

Microsoft Antimalware Service Executable +6 defense-evasion execution windows
3r 1t
medium advisory

Suspicious LSASS Process Access

This rule identifies suspicious access attempts to the LSASS process, potentially indicating credential dumping attempts by filtering out legitimate processes and access patterns to focus on anomalies.

Windows Defender +3 credential-access lsass windows
3r 1t
low advisory

Suspicious Image Load (taskschd.dll) from MS Office

Detection of taskschd.dll image loads from Microsoft Office applications indicates potential COM-based scheduled task creation for persistence, bypassing traditional schtasks.exe usage.

Word +4 persistence execution windows image_load scheduled_task
2r 2t
low advisory

Suspicious Execution via Windows Subsystem for Linux

Adversaries may leverage the Windows Subsystem for Linux (WSL) to execute malicious Linux commands, bypassing traditional Windows security measures, detected by monitoring process execution and command-line arguments.

Elastic Defend +2 defense-evasion execution credential-access windows
2r 3t
medium advisory

Suspicious Execution from VS Code Extension

Malicious VS Code extensions can execute arbitrary commands, leading to initial access and subsequent payload deployment on Windows systems.

VS Code initial-access execution supply-chain-compromise vscode
2r 9t
medium advisory

Suspicious Endpoint Security Parent Process Detected

This rule detects suspicious parent processes of endpoint security solutions such as Elastic Defend, Microsoft Defender, and SentinelOne, indicating potential process hollowing or code injection attempts to evade detection.

Elastic Defend +2 defense-evasion process-injection windows
2r 2t
medium advisory

Suspicious Dynamic .NET Compilation via Csc.exe

Attackers may use csc.exe to compile .NET code on the fly to evade detection, often placing the compiler and source code in suspicious locations, which can be detected by monitoring process creation events.

.NET Framework defense-evasion dynamic-compilation csc.exe
2r 1t
medium advisory

Suspicious Copy from or to System Directory

This threat involves the suspicious copying of files from or to Windows system directories (System32, SysWOW64, WinSxS) using command-line tools, often employed by attackers to relocate LOLBINs for defense evasion.

Windows defense-evasion lolbin
3r 1t
medium advisory

Suspicious AWS EC2 Key Pair Creation from Non-Cloud AS

An AWS EC2 CreateKeyPair event triggered by a new principal originating from a network autonomous system (AS) organization not associated with major cloud providers, indicating potential unauthorized access or persistence activity.

Amazon EC2 aws ec2 keypair persistence credential_access lateral_movement
2r 3t
low advisory

Startup or Run Key Registry Modification

Attackers modify registry run keys or startup keys to achieve persistence by referencing a program that executes when a user logs in or the system boots.

Elastic Defend +6 persistence registry runkey
3r 2t
medium advisory

SolarWinds Process Disabling Services via Registry Modification

A SolarWinds binary is modifying the start type of a service to be disabled via registry modification, potentially to disable or impair security services.

Microsoft Defender XDR +1 solarwinds defense-evasion registry-modification supply-chain
2r 3t
medium advisory

Signed Proxy Execution via MS Work Folders

Attackers can abuse Windows Work Folders to execute a masqueraded control.exe file from untrusted locations, potentially bypassing application controls for defense evasion and privilege escalation.

Windows Work Folders +3 defense-evasion masquerading windows
2r 3t
medium advisory

Service Startup Type Modification via WMIC

Adversaries use the Windows Management Instrumentation Command-line (WMIC) utility to modify the startup type of services, setting them to 'Manual' or 'Disabled' to impair defenses or disrupt system operations.

Windows attack.execution attack.t1047 attack.defense-evasion attack.t1562.001
2r 2t
medium advisory

SeDebugPrivilege Enabled by a Suspicious Process

The rule identifies a process running with a non-SYSTEM account that enables the SeDebugPrivilege privilege, which can be used by adversaries to debug and modify other processes to escalate privileges and bypass access controls.

Windows privilege-escalation token-manipulation
2r 1t
medium advisory

Scheduled Task Creation via Scripting

Detection of scheduled task creation by Windows scripting engines like cscript.exe, wscript.exe, or powershell.exe, used by adversaries to establish persistence on compromised systems.

Elastic Defend +1 persistence scheduled-task windows
3r 3t
medium advisory

RMM Domain DNS Queries from Non-Browser Processes

Detects DNS queries to commonly abused remote monitoring and management (RMM) or remote access software domains from non-browser processes, potentially indicating unauthorized remote access or command and control activity.

Elastic Defend +9 command-and-control rmm dns
2r 75i
medium advisory

Renamed Utility Executed with Short Program Name

This rule detects the execution of renamed utilities with a single-character process name, differing from the original filename, a common technique used by adversaries for staging, executing temporary utilities, or bypassing security detections.

Elastic Defend +1 defense-evasion masquerading windows
2r 1t
medium advisory

Remote Scheduled Task Creation via RPC

The creation of scheduled tasks from a remote source via RPC, where the RpcCallClientLocality and ClientProcessId are 0, indicates potential adversary lateral movement within a Windows environment.

Windows lateral-movement execution
2r 2t
medium advisory

Remote Management Access Launch After MSI Install

Detects an MSI installer execution followed by the execution of commonly abused Remote Management Software like ScreenConnect, potentially indicating abuse where an attacker triggers an MSI install then connects via a guest link with a known session key.

Microsoft Defender XDR command and control rmm msi windows remote access
2r
medium advisory

Remote File Download via Desktopimgdownldr Utility

The desktopimgdownldr utility can be abused to download remote files, potentially bypassing standard download restrictions and acting as an alternative to certutil for malware or tool deployment.

Microsoft Defender XDR +1 command-and-control file-download windows desktopimgdownldr
3r 1t
medium advisory

Remote File Copy to a Hidden Share

This rule detects remote file copy attempts to hidden network shares, which may indicate lateral movement or data staging activity, by identifying suspicious file copy operations using command-line tools like cmd.exe and powershell.exe focused on hidden share patterns.

Elastic Defend +2 lateral-movement data-staging windows hidden-share
2r 3t
high threat

Regsvr32 Silent and Install Parameter DLL Loading

Detection of regsvr32.exe being used with the silent and DLL install parameter to load a DLL, a technique used by RATs like Remcos and njRAT to execute arbitrary code.

Splunk Enterprise +2 Remcos +1 lolbin dll-loading regsvr32
2r 2t
medium advisory

Registry Persistence via AppInit DLL Modification

Modification of the AppInit DLLs registry keys on Windows systems allows attackers to execute code in every process that loads user32.dll, establishing persistence and potentially escalating privileges.

Microsoft Windows +6 persistence defense-evasion appinit-dlls registry windows
2r 2t
medium advisory

Registry Persistence via AppCert DLL Modification

Detection of registry modifications related to AppCert DLLs, a persistence mechanism where malicious DLLs are loaded by every process using common API functions.

Elastic Defend +3 persistence privilege-escalation appcert-dll
2r 2t
medium advisory

RDP Enabled via Registry Modification

An adversary may enable Remote Desktop Protocol (RDP) access by modifying the `fDenyTSConnections` registry key, potentially indicating lateral movement preparation or defense evasion.

Microsoft Defender XDR +1 lateral-movement defense-evasion rdp registry-modification
2r 2t
medium advisory

Rare Connection to WebDAV Target via Rundll32

This rule identifies rare connection attempts to a Web Distributed Authoring and Versioning (WebDAV) resource, where attackers may inject WebDAV paths in files opened by a victim to leak NTLM credentials via forced authentication using rundll32.exe.

Microsoft Defender XDR +2 credential-access webdav windows
2r 2t
low advisory

PsExec Lateral Movement via Network Connection

The rule identifies the use of PsExec.exe making a network connection, indicative of potential lateral movement by adversaries executing commands with SYSTEM privileges on Windows systems to disable defenses.

Elastic Defend +1 psexec lateral-movement windows
2r 3t
medium advisory

Process Created with a Duplicated Token

This rule identifies the creation of a process impersonating the token of another user logon session on Windows, potentially indicating privilege escalation.

Windows privilege-escalation token-impersonation
2r 2t
high advisory

Privileged Identity Management (PIM) Alerting Disabled

An adversary disables Privileged Identity Management (PIM) alerts in Azure to evade detection and maintain persistent access with escalated privileges.

Azure pim alerts privilege-escalation persistence
2r 1t
high advisory

Print.exe Used to Dump Sensitive Files for Credential Access

Attackers are abusing the legitimate Windows Print.exe utility to copy sensitive files like NTDS.DIT and SAM in order to extract credentials, enabling local or remote credential access.

Windows credential-dumping credential-access print.exe
2r 2t
high advisory

PowerShell Token Obfuscation via Process Creation

Adversaries employ token obfuscation techniques within PowerShell commands to evade detection by security tools, leveraging methods such as character insertion, string concatenation, and environment variable manipulation to mask their malicious intent.

Windows defense-evasion token-obfuscation powershell
3r 1t
high advisory

PowerShell P/Invoke API Chain for Process Injection

This brief details detection of PowerShell scripts leveraging P/Invoke API calls to perform process injection, covering techniques like self-injection, remote thread injection, APC injection, thread-context hijacking, process hollowing, section-map injection, reflective DLL loading, and DLL injection.

PowerShell process-injection pinvoke
3r 7t
high advisory

PowerShell Obfuscation via String Concatenation

This rule detects PowerShell scripts employing string concatenation to evade static analysis and AMSI by fragmenting keywords or URLs at runtime.

PowerShell defense-evasion obfuscation windows
2r 1t
high advisory

PowerShell MiniDump Script Detection

This brief detects PowerShell scripts that reference MiniDumpWriteDump or full-memory minidump types, potentially used to capture process memory from credential-bearing processes like LSASS.

PowerShell credential-access minidump windows
2r 1t
medium advisory

Potential Windows Error Manager Masquerading

Adversaries may masquerade malicious processes as legitimate Windows Error Reporting processes (WerFault.exe or Wermgr.exe) to evade detection by establishing network connections without arguments, thus blending into normal system activity.

Windows Error Reporting defense-evasion masquerading windows
2r 1t
high threat

Potential Vcruntime140 DLL Sideloading

Detects potential DLL sideloading of vcruntime140.dll, a common C++ runtime library, often used by threat actors like APT29 (via WinELOADER) to load malicious payloads under the guise of legitimate applications, leading to defense evasion, persistence, and privilege escalation.

Visual C++ Redistributable APT29 +5 dll-sideloading vcruntime140.dll wineloader defense-evasion persistence privilege-escalation
2r 3t
medium advisory

Potential Masquerading as Communication Apps

Attackers may attempt to evade defenses by masquerading malicious processes as legitimate communication applications such as Slack, WebEx, Teams, Discord, RocketChat, Mattermost, WhatsApp, Zoom, Outlook and Thunderbird.

Slack +9 defense-evasion masquerading windows
2r 3t
medium advisory

Potential LSA Authentication Package Abuse

Adversaries can abuse the Local Security Authority (LSA) authentication packages by modifying the Windows registry to achieve privilege escalation or persistence by executing binaries with SYSTEM privileges.

Microsoft Defender XDR +1 privilege-escalation persistence windows
2r 2t
medium advisory

Potential DNS Tunneling via NsLookup

Detection of multiple nslookup.exe executions with explicit query types from a single host, potentially indicating command and control activity via DNS tunneling, where attackers abuse DNS for data infiltration or exfiltration.

M365 Defender +2 dns-tunneling command-and-control windows
2r 2t
high advisory

Potential Credential Access via Windows Utilities

This rule detects the execution of known Windows utilities often abused to dump LSASS memory or the Active Directory database (NTDS.dit) in preparation for credential access by identifying specific command-line arguments and process names associated with credential dumping activities.

Elastic Defend +2 credential-access defense-evasion windows
3r 3t
medium advisory

Persistence via WMI Event Subscription

Adversaries can leverage Windows Management Instrumentation (WMI) to establish persistence by creating event subscriptions that trigger malicious code execution when specific events occur, using tools like wmic.exe to create event consumers.

Microsoft Defender XDR +7 persistence execution windows wmi
2r 2t
medium advisory

Persistence via Visual Studio Tools for Office (VSTO) Add-ins

The Visual Studio Tools for Office (VSTO) add-ins can be abused by attackers to establish persistence in Microsoft Office applications by modifying registry keys.

Microsoft Office +1 persistence office vsto
2r 1t
medium advisory

Office Application Autorun Registry Key Modification

Adversaries modify Office application autostart extensibility point (ASEP) registry keys to achieve persistence and execute malicious code when Office applications are launched.

Microsoft Office attack.privilege-escalation attack.persistence attack.t1547.001
2r 1t
medium advisory

NullSessionPipe Registry Modification for Lateral Movement

Attackers modify the NullSessionPipe registry setting in Windows to enable anonymous access to named pipes, potentially facilitating lateral movement and unauthorized access to network resources.

M365 Defender +3 lateral-movement defense-evasion registry-modification
3r 2t
medium advisory

New ActiveSync Allowed Device Added via PowerShell

The rule detects the use of the Exchange PowerShell cmdlet, Set-CASMailbox, to add a new ActiveSync allowed device, potentially allowing attackers to gain persistent access to sensitive email data by adding unauthorized devices.

Microsoft Defender XDR +4 exchange activesync powershell persistence
2r 3t
medium advisory

Network Logon Provider Registry Modification

Adversaries may modify the network logon provider registry to register a rogue network logon provider module for persistence and credential access by intercepting authentication credentials in clear text during user logon.

Defender XDR +3 credential-access persistence registry-modification
2r 2t
medium threat

MSSQL xp_cmdshell Stored Procedure Abuse for Persistence

Attackers may leverage the xp_cmdshell stored procedure in Microsoft SQL Server to execute arbitrary commands for privilege escalation and persistence, often bypassing default security configurations.

SQL Server persistence sql-server xp_cmdshell windows
2r 2t
medium advisory

Mshta Making Network Connections Indicative of Defense Evasion

Mshta.exe making outbound network connections may indicate adversarial activity, as it is often used to execute malicious scripts and evade detection by proxying execution of untrusted code.

Amazon Assistant +3 defense-evasion system-binary-proxy-execution windows
2r 1t
medium advisory

MSBuild Started by System Process for Defense Evasion and Execution

Adversaries are leveraging MSBuild, a Microsoft Build Engine, to execute malicious code by initiating it from system processes such as Explorer or WMI to evade defenses and execute unauthorized actions.

Elastic Defend +3 defense-evasion execution msbuild proxy-execution windows
2r 2t
high advisory

Microsoft IIS Connection String Decryption via aspnet_regiis

An attacker with Microsoft IIS web server access can decrypt and dump hardcoded connection strings, such as MSSQL service account passwords, using the aspnet_regiis utility, potentially leading to credential compromise.

IIS credential-access aspnet_regiis windows
3r 1t
medium advisory

Microsoft Defender Tampering via Registry Modification

Adversaries may disable or tamper with Microsoft Defender features via registry modifications to evade detection and conceal malicious behavior on Windows systems.

Microsoft Defender XDR +4 defense-evasion registry-modification windows
2r 2t
medium advisory

Microsoft CVE-2017-3736 Vulnerability

CVE-2017-3736 is a vulnerability tracked by Microsoft, potentially leading to exploitation of affected systems.

vulnerability microsoft
2r
medium advisory

Microsoft Build Engine Executed After Renaming

Attackers may rename the Microsoft Build Engine (MSBuild) executable to evade detection and proxy execution of malicious code.

MSBuild defense-evasion execution masquerading
2r 2t
medium advisory

Microsoft 365 Suspicious Email Delivery

This brief outlines a threat where Microsoft Defender for Office 365 identifies an email as malicious or suspicious but still delivers it to a user's inbox or junk folder, potentially bypassing initial security measures.

Microsoft 365 suspicious-email phishing microsoft365
2r 2t
high advisory

Invoke-Obfuscation Obfuscated IEX Invocation via PowerShell

Attackers use Invoke-Obfuscation, a PowerShell obfuscation framework, to generate obfuscated IEX (Invoke-Expression) commands, evading detection and executing malicious code.

Windows defense-evasion execution powershell obfuscation
2r 2t
low advisory

Ingress Transfer via Windows BITS

Adversaries may leverage Windows Background Intelligent Transfer Service (BITS) to download executable and archive files to evade defenses and establish command and control.

Background Intelligent Transfer Service +2 bits ingress-transfer command-and-control defense-evasion windows
2r 2t
medium advisory

Incoming Execution via WinRM Remote Shell

This rule detects incoming execution via Windows Remote Management (WinRM) remote shell on a target host, which could be an indication of lateral movement by monitoring network traffic on ports 5985 or 5986 and processes initiated by WinRM.

Elastic Defend +1 lateral-movement windows winrm remote-execution
2r 1t
medium advisory

Host File System Changes via Windows Subsystem for Linux

This rule detects file creation and modification on the host system from the Windows Subsystem for Linux (WSL), potentially indicating defense evasion by adversaries.

Elastic Defend +2 defense-evasion windows wsl
2r 2t
medium advisory

GPO Scheduled Task or Service Creation/Modification

Detection of the creation or modification of new Group Policy based scheduled tasks or services, which can be abused by attackers with domain admin permissions to execute malicious payloads remotely on domain-joined machines, leading to privilege escalation and persistence.

Elastic Defend +2 group-policy privilege-escalation persistence windows
2r 3t
high advisory

Frequent Azure PIM Role Activation Detected

Detection of frequent role activation in Azure Privileged Identity Management (PIM) by the same user may indicate potential privilege escalation or account compromise.

Azure pim role-activation privilege-escalation
2r 3t
medium advisory

First Time Seen Driver Loaded

The rule identifies the load of previously unseen drivers, which may indicate attackers exploiting vulnerable drivers for privilege escalation and persistence.

Elastic Defend privilege-escalation persistence windows
2r 3t
medium advisory

Execution via Windows Subsystem for Linux

This detection identifies attempts to execute programs from the Windows Subsystem for Linux (WSL) to evade detection by flagging suspicious executions initiated by WSL processes and excluding known safe executables.

Microsoft Defender XDR +3 defense-evasion execution windows wsl
2r 2t
medium advisory

Execution via Local SxS Shared Module

This rule detects the creation, modification, or deletion of DLL files within Windows SxS local folders, which could indicate an attempt to execute malicious payloads by abusing shared module loading.

M365 Defender +4 execution defense-evasion dll-hijacking
2r 2t
high advisory

Executable or Script Creation in Temporary Paths

Adversaries may create executables or scripts in temporary directories to evade detection, maintain persistence, and execute unauthorized code on Windows systems.

defense-evasion persistence privilege-escalation execution temp-directory file-creation
2r 1t
medium advisory

Exchange Mailbox Export via PowerShell

Adversaries may use the New-MailboxExportRequest PowerShell cmdlet to export mailboxes in Exchange, potentially leading to sensitive information theft.

Microsoft Defender XDR +2 collection execution powershell exchange mailbox
2r 4t
medium advisory

Enumeration of Privileged Local Groups Membership

An unusual process is enumerating built-in Windows privileged local groups membership, such as Administrators or Remote Desktop users, potentially revealing targets for credential compromise and post-exploitation activities.

Windows discovery privileged-access
2r 1t
medium advisory

Encoded Executable Stored in the Registry

This rule detects registry write modifications hiding encoded portable executables, indicative of adversary defense evasion by avoiding storing malicious content directly on disk.

Elastic Defend +3 defense-evasion registry windows
2r 3t 1i
low advisory

DNS-over-HTTPS Enabled via Registry Modification

Detection of DNS-over-HTTPS (DoH) being enabled via registry modifications on Windows systems, potentially indicating defense evasion and obfuscation of network activity by masking DNS queries.

Edge +2 defense-evasion dns-over-https registry-modification
3r 2t
high advisory

Disabling LSA Protection via Registry Modification

Adversaries may modify the RunAsPPL registry key to disable LSA protection, which prevents nonprotected processes from reading memory and injecting code, potentially leading to credential access.

Elastic Defend +3 defense-evasion windows registry
2r 1t
medium advisory

Detection of Privileged Account Creation in Azure

Detects the creation of new privileged accounts in Azure environments, potentially indicating initial access, persistence, privilege escalation, or stealth activities by malicious actors.

Azure privileged-account initial-access persistence privilege-escalation
2r 3t
medium advisory

Detection of Obfuscated IP Addresses via Command Line Tools

The use of command-line tools like ping.exe or arp.exe with obfuscated IP addresses (hex, octal, etc.) in the command line can indicate reconnaissance activity or attempts to evade security controls by masking the true destination.

Windows reconnaissance evasion command-line
3r 1t
high advisory

Detection of Important Scheduled Task Deletion or Disablement

Adversaries delete or disable critical scheduled tasks, such as those related to system restore, Windows Defender, BitLocker, Windows Backup, or Windows Update, to disrupt operations and potentially conduct data destructive activities.

Windows attack.execution attack.privilege-escalation attack.persistence attack.t1053.005
2r 1t
medium advisory

Detection of Encrypted Archive Creation with WinRAR or 7-Zip

Adversaries use WinRAR or 7-Zip with encryption options to compress and protect stolen data before exfiltration, making detection more challenging.

Defender XDR +2 collection archive exfiltration windows
2r 2t
medium advisory

Detect Suspicious WMI Event Subscription Creation for Persistence

This threat brief details the detection of malicious Windows Management Instrumentation (WMI) event subscriptions, a technique used by attackers for persistence and privilege escalation on Windows systems.

Elastic Defend persistence wmi windows event-subscription
2r 1t
high advisory

Deletion of Critical Scheduled Tasks

Adversaries delete critical scheduled tasks, such as those related to BitLocker, ExploitGuard, System Restore, Windows Defender, and Windows Update, to disrupt security measures and enable data destruction.

Windows attack.impact attack.t1489
2r 1t
high advisory

CVE-2026-7337 Type Confusion Vulnerability in Chromium V8 Engine

CVE-2026-7337 is a type confusion vulnerability in the V8 JavaScript engine that affects Google Chrome and Microsoft Edge (Chromium-based).

Chrome +1 type confusion v8 engine chromium cve-2026-7337
2r 1t 1c
medium advisory

CVE-2026-28390 NULL Dereference in CMS KeyTransportRecipientInfo Processing

CVE-2026-28390 is a vulnerability related to a possible NULL pointer dereference when processing CMS KeyTransportRecipientInfo, potentially leading to a denial-of-service condition.

vulnerability denial-of-service
2r 1c
medium advisory

CVE-2019-1547 ECDSA Remote Timing Attack Vulnerability

CVE-2019-1547 is a security vulnerability that could allow a remote timing attack.

cve-2019-1547 timing-attack ecdsa
2r
low advisory

Component Object Model (COM) Hijacking via Registry Modification

Adversaries may establish persistence by executing malicious content triggered by hijacked references to COM objects through Component Object Model (COM) hijacking via registry modification on Windows systems.

Elastic Defend +9 persistence com-hijacking windows registry defense-evasion privilege-escalation
2r 4t
high advisory

Command Obfuscation via Unicode Modifier Letters

Adversaries use Unicode modifier letters to obfuscate command-line arguments, evading string-based detections on common Windows utilities like PowerShell and cmd.exe.

Microsoft Defender XDR +5 defense-evasion command-line unicode obfuscation
2r 1t
medium advisory

Command Execution via ForFiles Utility

Adversaries may use the Windows forfiles utility to proxy command execution via a trusted parent process, potentially evading detection.

Microsoft Defender XDR +2 defense-evasion indirect-execution windows
2r 1t
high advisory

Azure Subscription Permission Elevation via Activity Logs

An attacker elevates their Azure subscription permissions to manage all subscriptions, potentially leading to unauthorized access and control over the environment.

Azure privilege-escalation persistence initial-access stealth
2r 1t
medium advisory

Azure Owner Removed from Application or Service Principal

An adversary may remove an owner from an Azure application or service principal to weaken access controls, persist in the environment, or escalate privileges.

Azure attack.stealth
2r 1t
medium advisory

Azure AD User Added to Administrator Role

An adversary adds a user to an Azure Active Directory administrative role to gain initial access, persist in the environment, escalate privileges, and potentially operate stealthily.

Azure Active Directory attack.initial-access attack.persistence attack.privilege-escalation attack.stealth attack.t1098.003 attack.t1078
2r 4t
medium advisory

Azure AD MFA Disabled to Bypass Authentication

An adversary may disable multi-factor authentication (MFA) in Azure Active Directory to weaken an organization's security posture and bypass authentication mechanisms, potentially gaining unauthorized access to sensitive resources and maintaining persistence.

Azure Active Directory azure mfa credential-access persistence defense-impairment
2r 1t
low advisory

Active Directory Discovery via ADExplorer Execution

Detects the execution of ADExplorer, a tool used for Active Directory viewing and editing, which can be abused by adversaries for domain reconnaissance and creating offline snapshots of the AD database.

Microsoft Defender XDR +1 active-directory discovery reconnaissance windows
2r 5t
medium advisory

Account Configured with Never-Expiring Password

Detects the creation and modification of an account with the 'Don't Expire Password' option enabled, which attackers can abuse to persist in the domain and maintain long-term access.

Active Directory persistence windows account-manipulation
2r 1t
high advisory

Windows Proxy Execution of .NET Utilities via Scripts

Detects the execution of .NET utilities by script processes from unusual locations, indicative of signed binary proxy execution for defense evasion and code execution.

Windows proxy-execution net-utility defense-evasion execution signed-binary-proxy-execution
2r 2t
medium advisory

Unusual Parent-Child Relationship Detection

This rule identifies Windows programs run from unexpected parent processes, which could indicate masquerading or other strange activity on a system, potentially indicating process injection, masquerading, access token manipulation, or parent PID spoofing.

Microsoft Defender XDR +1 privilege-escalation defense-evasion windows process-injection masquerading access-token-manipulation parent-pid-spoofing
3r 4t
medium advisory

Suspicious Process Execution via Renamed PsExec Executable

Detects suspicious PsExec activity where the PsExec service component is executed using a custom name, indicating an attempt to evade detections that look for the default PsExec service component name.

Elastic Defend +2 psexec lateral-movement execution defense-evasion windows
2r 3t
medium advisory

Suspicious Process Creation Followed by Memory Access from Unknown Region

The rule identifies suspicious process creation where a process is created and immediately accessed from an unknown memory code region by the same parent process, indicating a potential code injection attempt, specifically process hollowing, commonly targeting processes spawned by Microsoft Office applications, scripting engines, and command-line tools for defense evasion.

Office +2 defense-evasion process-injection windows
2r 1t
medium advisory

Suspicious Outbound Scheduled Task Activity via PowerShell

This rule detects PowerShell loading the Task Scheduler COM DLL followed by an outbound RPC network connection, potentially indicating lateral movement or remote discovery via scheduled tasks.

Windows execution lateral-movement
2r 3t
high advisory

PowerShell Loading .NET Assemblies via Reflection

This analytic detects PowerShell scripts leveraging .NET reflection to load assemblies into memory, a technique commonly used by threat actors to bypass defenses and execute malicious code.

PowerShell reflection dotnet memory-injection attack.execution attack.t1059.001
2r 1t
high advisory

PowerShell Execution via Environment Variables

Adversaries use PowerShell to execute malicious code stored in environment variables, leveraging Invoke-Expression or its aliases to bypass static analysis and execute payloads dynamically, as seen in malware loaders and stagers like the VIP Keylogger.

Splunk Enterprise +2 powershell environment-variable invoke-expression execution
2r 1t
medium advisory

Potential Persistence via Time Provider Modification

Adversaries may establish persistence by registering and enabling a malicious DLL as a time provider by modifying registry keys associated with the W32Time service.

Windows +1 persistence privilege-escalation time-provider
2r 2t
medium advisory

Potential Application Shimming via Sdbinst

Attackers abuse the Application Shim functionality in Windows by using `sdbinst.exe` with malicious arguments to achieve persistence and execute arbitrary code within legitimate Windows processes.

Windows +1 persistence privilege-escalation application-shimming
2r 2t
medium advisory

MpCmdRun.exe Used for Remote File Download

Attackers are abusing the Windows Defender MpCmdRun.exe utility to download remote files, potentially delivering malware or offensive tools into compromised systems.

Windows Defender command-and-control ingress-tool-transfer windows mpcmdrun
2r 1t
medium advisory

LSASS Loading Suspicious DLL

Detection of LSASS loading an unsigned or untrusted DLL, which can indicate credential access attempts by malicious actors targeting sensitive information stored in the LSASS process.

Windows credential-access lsass dll-injection
2r 2t 9i
medium advisory

Image File Execution Options (IFEO) Injection for Persistence and Defense Evasion

Attackers can establish persistence and evade defenses by modifying the Debugger and SilentProcessExit registry keys to perform Image File Execution Options (IFEO) injection, allowing them to intercept file executions and run malicious code.

Elastic Defend +3 persistence defense-evasion registry ifeo windows
3r 2t
high advisory

IIS HTTP Logging Disabled via AppCmd

An attacker with IIS server access can disable HTTP Logging using `appcmd.exe` to evade defenses and prevent forensic analysis, as detected by the execution of `appcmd.exe` with arguments to disable logging.

Elastic Defend +3 defense-evasion iis httplogging appcmd windows
2r 1t
high advisory

Executable or Script Creation in Suspicious Paths

This analytic identifies the creation of executables or scripts in suspicious file paths on Windows systems, where adversaries often use these paths to evade detection and maintain persistence, potentially leading to unauthorized code execution, privilege escalation, or persistence within the environment.

Windows defense-evasion persistence privilege-escalation execution
2r 1t
high advisory

Detects Kirbi File Creation

Detects the creation of .kirbi files, a suspicious Kerberos ticket artifact often produced by ticket export or dumping tools such as Rubeus or Mimikatz, indicating preparation for Kerberos ticket theft or Pass-The-Ticket (PTT) attacks.

Microsoft Defender XDR +2 credential-access kerberos pass-the-ticket mimikatz rubeus
2r 1t
medium advisory

Detecting Remote Scheduled Task Creation for Lateral Movement

This rule identifies remote scheduled task creations on a target Windows host, potentially indicating lateral movement by adversaries, by monitoring network connections and registry modifications related to task scheduling.

Elastic Defend +2 lateral-movement execution windows scheduled-task
2r 2t
low advisory

Adding Hidden File Attribute via Attrib.exe

Adversaries can use attrib.exe to add the 'hidden' attribute to files to hide them from users and evade detection, which can be detected by monitoring process executions related to attrib.exe.

M365 Defender +4 defense-evasion persistence windows attrib.exe
2r 2t
high advisory

Azure Identity Protection Atypical Travel Anomaly

The Atypical Travel detection in Azure Identity Protection identifies potentially compromised user accounts by detecting geographically improbable sign-in activity, indicative of account compromise or misuse.

Azure Active Directory +1 azure identity-protection atypical-travel account-compromise credential-theft
2r 1t
medium advisory

Persistence via PowerShell Profile Modification

Attackers can modify PowerShell profiles to inject malicious code that executes each time PowerShell starts, establishing persistence on a Windows system.

Microsoft Defender XDR +2 persistence powershell windows
2r 2t
high advisory

Azure AD Privileged Role Assignment

Detection of a user being added to a privileged role in Azure AD, potentially indicating privilege escalation or persistence by an attacker.

Azure Active Directory azure privileged-access role-assignment
2r 2t
high advisory

Azure AD Account Created and Deleted Within a Close Time Frame

Detection of Azure Active Directory accounts that are created and deleted within a short timeframe, potentially indicating malicious activity such as privilege escalation or persistence attempts.

Azure Active Directory privilege-escalation persistence initial-access stealth account-manipulation
2r 3t
medium advisory

Account Password Reset Remotely

The rule detects attempts to reset potentially privileged account passwords remotely, a tactic used by adversaries to maintain access, evade password policies, and preserve compromised credentials.

Windows persistence impact
2r 2t
high advisory

Suspicious CSC.exe Parent Process

The Csc.exe (C# compiler) process is being launched by unusual parent processes or from suspicious locations, indicating potential malware execution or defense evasion.

Windows attack.execution attack.defense-evasion csc.exe payload-delivery
3r 3t
high advisory

Control Panel Process with Unusual Arguments

Adversaries may abuse control.exe to proxy execution of malicious code by using the Control Panel process to execute payloads from unusual locations, detected by identifying suspicious keywords or paths in the process command line.

Elastic Defend +3 defense-evasion proxy-execution windows
2r 1t
medium advisory

Azure AD Failed Authentication Increase

Detects a significant increase (10% or greater) in failed Azure AD sign-in attempts, potentially indicating brute-force attacks, credential stuffing, or other unauthorized access attempts.

Azure Active Directory azuread brute-force credential-stuffing authentication
2r 1t
high threat

Suspicious Script Execution from Temporary Directory

This brief covers a detection for suspicious script execution, such as PowerShell, WScript, or MSHTA, originating from common temporary directories, potentially indicating malware activity.

exploited Windows execution script temp
2r 1t
high advisory

Detection of Suspicious Inbox Manipulation Rules in Azure

This brief focuses on detecting malicious inbox manipulation rules set within a user's Azure environment, often indicative of account compromise or insider threats aiming to conceal illicit activities.

Azure attack.stealth attack.t1140
2r 2t
low advisory

Windows Delayed Execution via Ping Followed by Malicious Utilities

Adversaries may use ping to delay execution of malicious commands, scripts, or binaries to evade detection, often observed during malware installation.

Windows execution defense-evasion ping lolbas
2r 14t
low advisory

First Time Seen Removable Device Registry Modification

Detection of newly seen removable devices via Windows registry modification events can indicate data exfiltration attempts or initial access via malicious USB drives.

Elastic Defend +2 initial-access exfiltration windows registry usb
2r 2t
high advisory

WScript or CScript Dropper

The WScript or CScript Dropper technique involves using cscript.exe or wscript.exe to write malicious script files (js, jse, vba, vbe, vbs, wsf, wsh) to suspicious locations on a Windows system for later execution.

Windows script-dropper file-creation
2r 2t
medium advisory

Windows Temporarily Scheduled Task Creation and Deletion

Detection of rapid creation and deletion of scheduled tasks on Windows, indicating potential malicious activity abusing the task scheduler for execution and cleanup.

Windows persistence execution
2r 2t
low advisory

Windows Scheduled Task Creation for Persistence

Adversaries may create scheduled tasks on Windows systems to establish persistence, move laterally, or escalate privileges, and this detection identifies such activity by monitoring Windows event logs for scheduled task creation events, excluding known benign tasks and those created by system accounts.

OneDrive +5 persistence scheduled-task windows
3r 1t
low advisory

Windows Peripheral Device Discovery via fsutil

Adversaries may use the Windows file system utility, fsutil.exe, with the fsinfo drives command to enumerate attached peripheral devices and gain information about a compromised system.

Microsoft Defender XDR +1 discovery windows fsutil
2r 1t
medium advisory

Windows Audit Policy Sub-Category Disabled

This rule identifies attempts to disable auditing for security-sensitive audit policy sub-categories on Windows systems, often employed by attackers to evade detection and forensic analysis.

Windows Security Event Logs defense-evasion windows audit-policy
2r 3t
medium advisory

Windows Admin Account Brute Force Detection

This rule identifies potential password guessing/brute force activity from a single source IP targeting multiple Windows accounts with 'admin' in the username, indicating an attempt to compromise privileged accounts.

Windows Security Event Logs credential-access brute-force windows
2r 2t
medium advisory

User Account ServicePrincipalName Attribute Modified

Detection of modifications to the servicePrincipalName attribute on user accounts, potentially exposing them to Kerberoasting attacks by allowing attackers to request Kerberos tickets for the account.

Active Directory kerberoasting credential-access windows spn
2r 2t
high advisory

Unusual Child Process from a System Virtual Process

A suspicious child process of the Windows virtual system process is detected, potentially indicating code injection and defense evasion.

Elastic Defend +2 defense-evasion process-injection windows
2r 1t
medium advisory

Unauthorized Guest User Invitations in Azure AD

Detection of unauthorized guest user invitations within an Azure Active Directory tenant, indicating potential privilege escalation, persistence, or initial access attempts.

azure azuread guest-user privilege-escalation persistence initial-access
2r 3t
medium advisory

Suspicious Svchost.exe Child Process: cmd.exe

Detection of cmd.exe being spawned by svchost.exe, which is an unusual behavior indicative of potential masquerading or privilege escalation attempts on Windows systems.

execution windows process_injection privilege_escalation
2r 2t
medium advisory

Suspicious Remote Registry Access via SeBackupPrivilege

Detection of remote registry access by an account with SeBackupPrivilege, potentially indicating credential exfiltration attempts via SAM registry hive dumping.

Windows credential-access lateral-movement
2r 3t
high advisory

Suspicious Microsoft HTML Application Child Process

Mshta.exe spawning a suspicious child process, such as cmd.exe or powershell.exe, indicates potential adversarial activity leveraging Mshta to execute malicious scripts and evade detection on Windows systems.

Windows +2 defense-evasion mshta process-creation
2r 1t
medium advisory

Suspicious Inter-Process Communication via Outlook COM

Adversaries may target user email to collect sensitive information or send email on their behalf via API by abusing Outlook's Component Object Model (COM) interface from unusual processes.

Outlook email_collection com_abuse windows
2r 2t
medium advisory

Suspicious Explorer Child Process via DCOM

Adversaries abuse the trusted status of explorer.exe to launch malicious scripts or executables, often using DCOM to start processes like PowerShell or cmd.exe, achieving initial access, defense evasion, and execution.

Microsoft Defender XDR +2 initial-access defense-evasion execution explorer.exe dcom
2r 9t
low advisory

Suspicious Command Prompt Network Connection

This alert identifies suspicious network connections initiated by the command prompt (cmd.exe) when executed with arguments indicative of script execution, remote resource access, or originating from Microsoft Office applications, which is a common tactic for downloading payloads or establishing command and control.

Elastic Defend +7 command-prompt network-connection windows execution command-and-control
2r 4t
low advisory

Suspicious Access to LDAP Attributes

The rule detects suspicious access to LDAP attributes in Active Directory by identifying read access to a high number of Active Directory object attributes, which can help adversaries find vulnerabilities, elevate privileges, or collect sensitive information.

Active Directory active_directory ldap discovery windows
2r 3t
medium advisory

Suspicious .NET Code Compilation via Unusual Parent Processes

Adversaries may use unusual parent processes to execute .NET compilers for compiling malicious code after delivery, evading security mechanisms, and this activity is detected by monitoring compiler executions initiated by scripting engines or system utilities.

Microsoft Defender XDR +3 defense-evasion compile-after-delivery windows
2r 3t
low advisory

Service Control Executed from Script Interpreters

Detection of Service Control (sc.exe) being spawned from script interpreter processes, such as PowerShell or cmd.exe, to create, modify, or start services, which may indicate privilege escalation or persistence attempts by an attacker.

Elastic Defend +2 privilege-escalation defense-evasion execution windows service-creation
2r 8t
medium advisory

Potential Protocol Tunneling via Yuze

This alert detects potential protocol tunneling activity via the execution of Yuze, a lightweight open-source tunneling tool often used by threat actors for intranet penetration via forward and reverse SOCKS5 proxy tunneling.

Defender XDR +2 command-and-control tunneling yuze proxy
2r 3t
high advisory

Potential Masquerading as Svchost

Attackers may attempt to masquerade as the Service Host process `svchost.exe` by executing from non-standard paths to evade detection and blend in with normal system activity.

Windows defense-evasion masquerading
2r 1t
high advisory

Potential Credential Access via Renamed COM+ Services DLL

Detection of renamed COMSVCS.DLL being loaded by rundll32.exe, potentially used to dump LSASS memory for credential access while evading command-line detection.

Windows credential-access defense-evasion
2r 3t 1i
high advisory

Potential Credential Access via MSBuild Loading Credential Management DLLs

The detection rule identifies a potential credential access attempt via the trusted developer utility MSBuild by detecting instances where it loads DLLs associated with Windows credential management, specifically vaultcli.dll or SAMLib.DLL, which is often used for credential dumping.

MSBuild +2 credential-access defense-evasion windows
2r 1t
medium advisory

Potential Credential Access via DCSync

This rule identifies when a User Account starts the Active Directory Replication Process, potentially indicating a DCSync attack, which allows attackers to steal credential information compromising the entire domain.

Azure AD Connect credential-access privilege-escalation windows active-directory
2r 3t
medium advisory

Netsh Used to Enable Remote Desktop Protocol (RDP) in Windows Firewall

Adversaries may use the `netsh.exe` utility to enable inbound Remote Desktop Protocol (RDP) connections in the Windows Firewall, potentially allowing unauthorized remote access to compromised systems.

Windows Firewall +4 defense-evasion lateral-movement windows netsh rdp
2r 2t
medium advisory

Msiexec Arbitrary DLL Execution

Adversaries may abuse the msiexec.exe utility to proxy the execution of malicious DLL payloads, bypassing application control and other defenses.

Windows defense-evasion proxy-execution msiexec
2r 1t
medium advisory

MS Office Macro Security Registry Modifications

Attackers may modify Microsoft Office registry settings related to macro security (AccessVBOM, VbaWarnings) to disable security warnings, enabling malicious macros for persistence and further compromise.

Microsoft Office office macro registry defense-evasion windows
2r 2t
medium advisory

Mounting of Hidden or WebDav Remote Shares via Net Utility

Adversaries may leverage the `net.exe` utility to mount WebDav or hidden remote shares, potentially indicating lateral movement, data exfiltration preparation, or initial access via discovery of accessible shares.

Elastic Defend +2 lateral-movement data-exfiltration windows
2r 4t
high advisory

Modification of WDigest Security Provider

The rule detects attempts to modify the WDigest security provider in the registry to force the user's password to be stored in clear text in memory, which could lead to credential dumping.

Windows +2 credential-access registry-modification
2r 1t
medium advisory

Microsoft IIS Service Account Password Dump via AppCmd

An attacker with IIS web server access via a web shell can extract service account passwords by requesting full configuration output or targeting credential-related fields using the AppCmd tool.

IIS credential-access appcmd windows
2r 2t
medium advisory

Masquerading Business Application Installers

Attackers masquerade malicious executables as legitimate business application installers to trick users into downloading and executing malware, leveraging defense evasion and initial access techniques.

Elastic Defend +22 masquerading defense-evasion initial-access malware windows
2r 4t
medium advisory

LSASS Memory Dump Handle Access Detection

This rule detects handle requests for LSASS object access with specific access masks (0x1fffff, 0x1010, 0x120089, 0x1F3FFF) indicative of memory dumping, commonly employed by tools like SharpDump, Procdump, Mimikatz, and Comsvcs to extract credentials from the LSASS process on Windows systems.

Windows credential-access lsass memory-dump
2r 1t
medium advisory

LSASS Memory Dump Creation Detection

This rule identifies the creation of LSASS memory dump files, often indicative of credential access attempts using tools like Task Manager, SQLDumper, Dumpert, or AndrewSpecial, by monitoring for specific filenames and excluding legitimate dump locations.

Elastic Defend +4 credential_access lsass memory_dump windows
2r 1t
high advisory

Impossible Travel Detection in Azure AD

This brief describes the detection of 'impossible travel' events in Azure AD, where a user appears to log in from geographically distant locations within an implausibly short time frame, potentially indicating account compromise.

Azure Active Directory azuread identity-protection impossible-travel account-compromise lateral-movement
2r 1t
medium advisory

High Number of Process and/or Service Terminations Detected

A high number of process terminations (stop, delete, or suspend) from the same Windows host within a short time period may indicate malicious activity such as an attacker attempting to disable security measures or prepare for ransomware deployment.

Elastic Defend impact defense-evasion windows
2r 2t
medium advisory

File with Right-to-Left Override Character (RTLO) Created/Executed

This rule detects the creation or execution of files or processes with names containing the Right-to-Left Override (RTLO) character, which can be used to disguise the file extension and trick users into executing malicious files on Windows systems.

Elastic Defend +2 defense-evasion rtlo masquerading windows
2r 2t
medium advisory

Disabling Windows Defender Security Settings via PowerShell

Attackers use PowerShell commands like Set-MpPreference or Add-MpPreference, often with base64 encoding, to disable or weaken Windows Defender security settings in order to evade detection and execute malicious payloads.

Windows Defender defense-evasion powershell windows
3r 2t
medium advisory

Disabling User Account Control via Registry Modification

Attackers may disable User Account Control (UAC) by modifying specific registry values, allowing them to execute code with elevated privileges, bypass security restrictions, and potentially escalate privileges on Windows systems.

Microsoft Defender XDR +1 privilege-escalation defense-evasion windows
2r 3t
medium advisory

Detection of Office Macro File Creation

This brief outlines a threat involving the creation of new Office macro files, potentially indicating malicious activity such as phishing or malware distribution, targeting Windows systems.

Microsoft Office initial-access phishing macro
2r 1t
high advisory

Detection of Kali Linux Installation or Usage via Windows Subsystem for Linux (WSL)

Adversaries may attempt to install or use Kali Linux via Windows Subsystem for Linux (WSL) to avoid detection, potentially enabling them to perform malicious activities within a Windows environment while blending in with legitimate WSL usage.

Windows Subsystem for Linux +4 defense-evasion windows wsl kalilinux
2r 1t
medium advisory

Detecting Suspicious Scheduled Task Creation in Windows

This rule detects the creation of scheduled tasks in Windows using event logs, which adversaries may use for persistence, lateral movement, or privilege escalation by creating malicious tasks.

Windows Security Event Logs +8 persistence scheduled_task windows
2r 1t
medium advisory

Detecting Execution from Alternate Data Streams

Adversaries may execute malicious code from Alternate Data Streams (ADS) on Windows to evade defenses by hiding malware within legitimate files, which this detection identifies by monitoring process execution paths and arguments.

M365 Defender +1 defense-evasion windows alternate data stream
2r 1t
high advisory

CVE-2018-0735 ECDSA Signature Generation Timing Attack

CVE-2018-0735 is a timing attack vulnerability in ECDSA signature generation affecting Microsoft products, potentially allowing attackers to recover private keys.

ecdsa timing-attack cryptography
2r 1t 1c
medium advisory

CVE-2017-3735 Vulnerability Targeting Microsoft Products

CVE-2017-3735 is a vulnerability impacting Microsoft products, potentially allowing unauthorized access or code execution.

vulnerability microsoft cve-2017-3735
2r 1t 1c
high advisory

Creation or Modification of Domain Backup DPAPI Private Keys

Detection of creation or modification of Domain Backup private keys, which adversaries may extract from a Domain Controller (DC) to decrypt domain user master key files.

Elastic Defend +2 credential-access dpapi domain-controller
3r 1t
medium advisory

Code Signing Policy Modification Through Registry

Attackers may modify the Windows registry to disable code signing policy, allowing the execution of unsigned or self-signed malicious code, thereby bypassing security controls and enabling defense evasion.

Elastic Defend +2 defense-evasion registry-modification code-signing
2r 2t
high advisory

Azure PIM - Role Assignment Outside of Privileged Identity Management

Detection of privilege role assignments outside of Azure Privileged Identity Management (PIM) can indicate potential attacker activity related to initial access, stealth, persistence, or privilege escalation within the Azure environment.

Azure Active Directory azure pim role-assignment attack.initial-access attack.stealth attack.t1078 attack.persistence attack.privilege-escalation
2r 4t
medium advisory

Azure Domain Federation Settings Modified

An attacker may modify Azure domain federation settings to establish persistence, escalate privileges, or gain unauthorized access to resources.

Azure Active Directory azure federation privilege-escalation persistence initial-access
2r 2t
medium advisory

Xwizard COM Object Execution for Defense Evasion

Adversaries may abuse Xwizard, a Windows system binary, to execute Component Object Model (COM) objects created in the registry to evade defensive countermeasures by proxying execution through a legitimate system tool.

Microsoft Defender XDR +2 execution defense-evasion com-object xwizard windows
2r 2t
medium advisory

Windows Privilege Escalation via Secondary Logon Service

The rule identifies process creation with alternate credentials, which can be used for privilege escalation, by detecting successful logins via the Secondary Logon service (seclogon) from a local source IP address (::1), followed by process creation using the same TargetLogonId.

Windows privilege-escalation access-token-manipulation
2r 2t
medium advisory

Suspicious MS Outlook Child Process

Detection of suspicious child processes spawned by Microsoft Outlook, indicative of spear phishing and malicious file execution leading to potential initial access and further exploitation.

Microsoft Outlook +3 initial-access phishing malware windows
2r 3t
medium advisory

Remote Execution of Windows Services via RPC

Detection of remote execution of Windows services over RPC by correlating `services.exe` network connections and spawned child processes, potentially indicating lateral movement.

SCCM lateral-movement execution windows
2r 2t
high advisory

PowerShell Obfuscation via Backtick-Escaped Variable Expansion

PowerShell scripts use backtick-escaped characters inside `${}` variable expansion to reconstruct strings at runtime, enabling attackers to split keywords, hide commands, and evade static analysis and AMSI.

windows +1 powershell obfuscation defense-evasion variable-expansion
2r 1t
high advisory

NTDS or SAM Database File Copied

Detects copy operations of Active Directory Domain Database (ntds.dit) or Security Account Manager (SAM) files, potentially exposing sensitive hashed credentials on Windows systems.

Microsoft Defender XDR +2 credential-access windows ntds sam credential-theft
2r 1t
high advisory

Detection of IIS HTTP Logging Disabled via AppCmd.exe

This analytic detects the use of AppCmd.exe to disable HTTP logging on IIS servers, allowing adversaries to evade detection by removing evidence of their actions.

Splunk Enterprise +3 iis logging defense-evasion windows
2r 2t