1 |
Service Execution Detected |
Sysmon |
1 |
Execution |
T1569.002, T1569 |
Service Execution,System Services, System Services,Service Execution |
2 |
Screensaver Activities Detected |
Sysmon |
13,12,14 |
Persistence |
T1546.002, T1546 |
Screensaver,Event Triggered Execution |
3 |
Execution of Microsoft Build Engine Using an Alternate Name |
Sysmon |
1 |
Defense Evasion |
T1036, T1036.003 |
Rename System Utilities,Masquerading |
4 |
Suspicious VMToolsd Child Process |
Security |
4688 |
Execution |
T1059 |
Command and Scripting Interpreter |
5 |
Generic Password Dumper Activity on LSASS Detected |
Security |
4656 |
Credential Access |
T1003 |
OS Credential Dumping,Credential Dumping |
6 |
File System Permissions Weakness |
Sysmon |
7 |
Privilege Escalation,Defense Evasion,Persistence |
T1574,T1574.010 |
Hijack Execution Flow,Services File Permissions Weakness |
7 |
Sysmon Error Event Detected |
Sysmon |
255 |
Defense Evasion |
T1562.001,T1562 |
Disable or Modify Tools, Disable or Modify Tools,Impair Defenses |
8 |
Windows Kernel and 3rd Party Drivers Exploits Token Stealing Detected |
Sysmon |
1 |
Privilege Escalation |
T1068 |
Exploitation for Privilege Escalation |
9 |
Egregor Payload Command Line Detected |
Sysmon |
1 |
Impact |
T1486 |
Data Encrypted for Impact |
10 |
AD Object WriteDAC Access Detected |
Sysmon |
4662 |
Defense Evasion |
T1222 |
File and Directory Permissions Modification |
11 |
Regsvcs-Regasm Detected |
Sysmon |
3 |
Defense Evasion |
T1218 |
Signed Binary Proxy Execution,Regsvcs/ Regasm |
12 |
Taskmgr as Parent Detected |
Sysmon |
1 |
Defense Evasion |
T1036 |
Masquerading |
13 |
File and Directory Discovery Using PowerShell Detected |
Microsoft-Windows-PowerShell/ Operational |
4103 |
Discovery |
T1083 |
File and Directory Discovery |
14 |
Suspicious TSCON Start |
Sysmon |
1 |
Command and Control |
T1219 |
Remote Access Software |
15 |
WMI - Network Connection |
Sysmon |
3 |
Execution |
T1047 |
Windows Management Instrumentation |
16 |
Call to a Privileged Service Failed |
Security |
4673 |
Lateral Movement, Privilege Escalation, Defense Evasion, Initial Access, Persistence |
T1078 |
Valid Accounts |
17 |
DTRACK Process Creation Detected |
Sysmon |
1 |
Privilege Escalation,Defense Evasion |
T1055 |
Process Injection |
18 |
DHCP Server Error Failed Loading the CallOut DLL |
Application |
103, 210, 311, 034 |
Privilege Escalation,Defense Evasion,Persistence |
T1574,T1574.002 |
Hijack Execution Flow,Hijack Execution Flow,DLL Side-Loading, DLL Side-Loading |
19 |
Certutil Encode Detected |
Sysmon |
1 |
Defense Evasion |
T1140 |
Deobfuscate/Decode Files or Information |
20 |
Copy from Admin Share Detected |
Sysmon |
1 |
Lateral Movement, Command and Control |
T1021, T1021.002, T1105 |
Ingress Tool Transfer,Remote Services,SMB/Windows Admin Shares |
21 |
Successful Overpass the Hash Attempt |
Security |
4624 |
Lateral Movement, Defense Evasion |
T1550.002, T1550 |
Pass the Hash,Use Alternate Authentication Material, Use Alternate Authentication Material,Pass the Hash |
22 |
Mitre Collection Attack using Automated Collection Detected |
Microsoft-Windows-PowerShell/ Operational |
4104 |
|
|
|
23 |
Windows Removable Storage Disconnected |
Microsoft-Windows-DriverFrameworks-UserMode/ Operational |
2102 |
|
|
|
24 |
LSASS Access Detected via Attack Surface Reduction |
Microsoft-Windows-Windows Defender/ Operational |
1121 |
Credential Access |
T1003 |
OS Credential Dumping,Credential Dumping |
25 |
Command Obfuscation via Environment Variable Concatenation Reassembly |
Sysmon |
1 |
Defense Evasion,Execution |
T1059, T1059.003 |
Command and Scripting Interpreter,Windows Command Shell |
26 |
Data Staging Process Detected in Windows |
Sysmon |
1 |
Collection |
T1074 |
Data Staged |
27 |
WMI - Active Script Event Consumer - Process Detected |
Sysmon |
1 |
Execution |
T1047 |
Windows Management Instrumentation |
28 |
Suspicious Scripting in a WMI Consumer |
Sysmon |
20 |
Execution |
T1059, T1059.001 |
PowerShell,Command and Scripting Interpreter,PowerShell, Command and Scripting Interpreter |
29 |
Suspicious WMIC Child Process |
Sysmon |
1 |
Execution |
T1047 |
Windows Management Instrumentation |
30 |
Elevated Command Prompt Activity by Non-Admin User Detected |
Security |
4688 |
Execution |
T1059 |
Command and Scripting Interpreter,Command-Line Interface |
31 |
Encoded IEX Detected |
Sysmon |
1 |
Defense Evasion,Execution |
T1140, T1059, T1059.001 |
PowerShell,Deobfu scate/Decode Files or Information,Command and Scripting Interpreter,PowerShell, Command and Scripting Interpreter |
32 |
Lsass Memory Dump with MiniDumpWrite Dump API Detected |
Sysmon |
7 |
Credential Access |
T1003 |
OS Credential Dumping,Credential Dumping |
33 |
Mitre Persistence via Winlogon Helper DLL Detected |
Security |
4657 |
Privilege Escalation, Execution, Persistence |
T1547.004, T1547 |
Boot or Logon Autostart Execution,Boot or Logon Autostart Execution,Winlogon Helper DLL, Winlogon Helper DLL |
34 |
RDP Login from Localhost Detected |
Security |
4624 |
Lateral Movement |
T1021,T1021.001 |
Remote Services,Remote Services, Remote Desktop Protocol,Remote Desktop Protocol |
35 |
Suspicious Shells Spawn by SQL Server |
Security |
4688 |
Execution,Initial Access |
T1190,T1059.001 |
Exploit Public-Facing Application,Command and Scripting Interpreter,PowerShell |
36 |
Microsoft Defender AMSI Trigger |
Microsoft-Windows-Windows Defender/ Operational |
1116 |
|
|
|
37 |
Password Change on DSRM Account Detected |
Security |
4794 |
Privilege Escalation, Persistence |
T1098 |
Account Manipulation |
38 |
Windows Defender Stopped |
Microsoft-Windows-Windows Defender/ Operational |
5001 |
Defense Evasion |
T1562.001, T1562 |
Disable or Modify Tools,Impair Defenses |
39 |
Exploition of CVE-2019-1388 Detected |
Sysmon |
1 |
Privilege Escalation |
T1068 |
Exploitation for Privilege Escalation |
40 |
Possible Credential Dump-Tools Named Pipes Detected |
Sysmon |
17 |
Credential Access |
T1003 |
OS Credential Dumping,Credential Dumping |
41 |
PowerShell Version Downgrade Detected |
Windows PowerShell |
400 |
Execution |
T1059, T1059.001 |
PowerShell,Command and Scripting Interpreter,PowerShell, Command and Scripting Interpreter |
42 |
AppInit DLLs Detected |
Sysmon |
13,12,14 |
Privilege Escalation, Persistence |
T1546.010, T1546 |
AppInit DLLs,Event Triggered Execution,AppInit DLLs, Event Triggered Execution |
43 |
Possible Ransomware or Unauthorized MBR Modifications Detected |
Sysmon |
1 |
Defense Evasion, Persistence |
T1542, T1070, T1542.003 |
Indicator Removal on Host,Bootkit, Bootkit, Pre-OS Boot,Pre-OS Boot |
44 |
Ryuk Wake-On-LAN Activity |
Security |
4688 |
|
|
|
45 |
Eventlog Cleared Detected |
System |
104 |
Defense Evasion |
T1070 |
Indicator Removal on Host |
46 |
Mitre Execution Attack via Suspicious Powershell Command Detected |
Security |
4688 |
Execution |
T1059, T1059.001 |
PowerShell,Command and Scripting Interpreter,PowerShell, Command and Scripting Interpreter |
47 |
Registry Persistence Mechanisms Detected |
Sysmon |
13 |
Privilege Escalation, Persistence |
T1546,T1546.012 |
Image File Execution Options Injection,Event Triggered Execution,Image File Execution Options Injection, Event Triggered Execution |
48 |
Tap Driver Installation Detected |
System, Sysmon, Security |
7045, 4697, 6 |
Exfiltration |
T1048 |
Exfiltration Over Alternative Protocol |
49 |
Unsigned Image Loaded Into LSASS Process |
Sysmon |
7 |
Credential Access |
T1003,T1003.001 |
OS Credential Dumping,LSASS Memory |
50 |
PowerShell Script Run in AppData Detected |
Sysmon |
1 |
Execution |
T1059,T1059.001 |
PowerShell,Command and Scripting Interpreter,PowerShell, Command and Scripting Interpreter |
51 |
Suspicious HWP Sub Processes Detected |
Sysmon |
1 |
Defense Evasion, Execution, Initial Access |
T1566.001, T1202, T1566, T1059 |
Command and Scripting Interpreter, Spearphishing Attachment, Spearphishing Attachment, Phishing, Command-Line Interface, Indirect Command Execution |
52 |
Security Policy Extraction |
Security |
4688 |
|
|
|
53 |
Default File Association Changed |
Sysmon |
13,12,14 |
Privilege Escalation, Persistence |
T1546.001, T1546 |
Change Default File Association,Event Triggered Execution,Change Default File Association, Event Triggered Execution |
54 |
New Service Process Execution |
Sysmon |
1 |
Privilege Escalation,Persistence |
T1543 |
New Service,Create or Modify System Process |
55 |
Audio Capture via PowerShell Detected |
Sysmon |
1 |
Collection |
T1123 |
Audio Capture |
56 |
Mitre Execution Attack via Encoded Powershell Command Detected |
Security |
4688 |
Execution |
T1059,T1059.001 |
PowerShell,Command and Scripting Interpreter,PowerShell, Command and Scripting Interpreter |
57 |
Emissary Panda Malware SLLauncher Detected |
Sysmon |
1 |
Defense Evasion |
T1211 |
Exploitation for Defense Evasion |
58 |
Regsvr32 Anomaly Detected |
Sysmon |
1 |
Defense Evasion |
T1218.010,T1218 |
Signed Binary Proxy Execution,Regsvr32, Signed Binary Proxy Execution |
59 |
Regsvr32 - Network Detected |
Sysmon |
3 |
Defense Evasion,Execution |
T1218.010,T1218 |
Regsvr32,Signed Binary Proxy Execution,Regsvr32, Signed Binary Proxy Execution |
60 |
Windows Processes Suspicious Parent Directory Detected |
Sysmon |
1 |
Defense Evasion |
T1036 |
Masquerading |
61 |
RDP Tunneling Detected Using Plink |
Sysmon |
1 |
Command And Control,Command and Control |
T1219 |
Remote Access Software,Remote Access Tools |
62 |
Exploit for CVE-2017-0261 Detected |
Sysmon |
1 |
Privilege Escalation,Defense Evasion |
T1055 |
Process Injection |
63 |
ZxShell Malware Detected |
Sysmon |
1 |
Defense Evasion, Execution |
T1218.011, T1059, T1218 |
Command and Scripting Interpreter,Signed Binary Proxy Execution,Command-Line Interface, Signed Binary Proxy Execution,Rundll32, Rundll32 |
64 |
LSASS Access from Non System Account Detected |
Security |
46,564,663 |
Credential Access |
T1003 |
OS Credential Dumping,Credential Dumping |
65 |
Suspicious Outbound Kerberos Connection |
Sysmon, Security |
35,156 |
Lateral Movement, Credential Access |
T1558, T1558.003 |
Steal or Forge Kerberos Tickets,Kerberoasting, Kerberoasting, Steal or Forge Kerberos Tickets |
66 |
AppCert DLLs Detected |
Sysmon |
13,12,14 |
Privilege Escalation, Persistence |
T1546.009, T1546 |
AppCert DLLs, AppCert DLLs,Event Triggered Execution, Event Triggered Execution |
67 |
Svchost DLL Search Order Hijack Detected |
Sysmon |
7 |
Privilege Escalation,Defense Evasion,Persistence |
T1574.001, T1574, T1574.002 |
Hijack Execution Flow,DLL Search Order Hijacking,DLL Side-Loading |
68 |
Possible CLR DLL Loaded Via Office Applications |
Sysmon |
7 |
Initial Access |
T1566,T1566.001 |
Phishing, Phishing,Spearphishing Attachment, Spearphishing Attachment |
69 |
Credentials Access in Files Detected |
Sysmon |
1 |
Credential Access |
T1552.001,T1552 |
Unsecured Credentials,Credentials In Files |
70 |
Windows Domain GPO Modification |
Security |
5136 |
Privilege Escalation, Privilege Escalation,Defense Evasion |
T1484 |
Group Policy Modification,Domain Policy Modification |
71 |
OceanLotus Registry Activity Detected |
Sysmon |
13 |
Defense Evasion,Persistence |
T1112 |
Modify Registry |
72 |
Screenshot Capture Detected |
Microsoft-Windows-PowerShell/ Operational |
4104 |
Collection |
T1113 |
Screen Capture |
73 |
MsiExec Web Install Detected |
Sysmon |
1 |
Defense Evasion |
T1218.007,T1218 |
Msiexec,Signed Binary Proxy Execution |
74 |
Allowed NetLogon Connections via Group Policy - CVE-2020-1472 |
Security |
58,305,831 |
Privilege Escalation |
T1068 |
Exploitation for Privilege Escalation |
75 |
Windows Admin Shares - Process - Created |
Sysmon |
1 |
Lateral Movement |
T1021 |
Remote Services |
76 |
WMI command execution |
Sysmon |
20 |
Execution |
T1047 |
Windows Management Instrumentation |
77 |
Mimikatz Detection LSASS Access Detected |
Sysmon |
10 |
Credential Access |
T1003 |
OS Credential Dumping,Credential Dumping |
78 |
Control Panel Items - Process Detected |
Sysmon |
1 |
Defense Evasion |
T1218.002,T1218 |
Control Panel, Control Panel,Signed Binary Proxy Execution |
79 |
Rubeus Hack Tool Detected |
Sysmon |
1 |
Credential Access |
T1003 |
OS Credential Dumping |
80 |
Password Dumper Remote Thread in LSASS |
Sysmon |
8 |
Credential Access |
T1003 |
OS Credential Dumping,Credential Dumping |
81 |
Ngrok RDP Tunnel Detected |
Security |
4779 |
Command and Control |
T1572 |
Protocol Tunneling |
82 |
Windows Excessive Amount of Files Copied to Removable Device |
Security |
4663 |
Exfiltration |
T1052.001,T1052 |
Exfiltration Over Physical Medium, Exfiltration over USB,Exfiltration over USB |
83 |
Potential RDP Exploit CVE-2019-0708 Detected |
System |
56,50 |
Lateral Movement,Initial Access |
T1190,T1210 |
Exploit Public-Facing Application,Exploitation of Remote Services |
84 |
CobaltStrike Named Pipes Detected |
Sysmon |
17 |
Privilege Escalation,Defense Evasion |
T1055 |
Process Injection |
85 |
Suspicious Reconnaissance Activity Detected |
Sysmon |
1 |
Discovery |
T1087 |
Account Discovery |
86 |
Application Shimming - Process Detected |
Sysmon |
1 |
Privilege Escalation, Persistence |
T1546, T1546.011 |
Application Shimming, Application Shimming,Event Triggered Execution, Event Triggered Execution |
87 |
Possible Empire Monkey Detected |
Sysmon |
1 |
Execution |
T1059, T1059.001 |
PowerShell,Command and Scripting Interpreter,PowerShell, Command and Scripting Interpreter |
88 |
Suspicious WMPRVSE Child Process |
Sysmon |
1 |
Execution |
T1047 |
Windows Management Instrumentation |
89 |
Run Whoami as SYSTEM Detected |
Sysmon |
1 |
Privilege Escalation, Discovery |
T1033 |
System Owner/User Discovery |
90 |
Suspicious RASdial Activity Detected |
Sysmon |
1 |
Execution |
T1059 |
Command and Scripting Interpreter |
91 |
Curl Start Combination Detected |
Sysmon |
1 |
Defense Evasion |
T1218 |
Signed Binary Proxy Execution |
92 |
Suspicious SVCHOST Process Creation |
Sysmon |
1 |
Privilege Escalation, Defense Evasion |
T1055, T1036, T1036.005 |
Process Injection,Match Legitimate Name or Location,Masquerading |
93 |
Windows Command Line Execution with Suspicious URL and AppData Strings |
Sysmon |
1 |
Execution |
T1059 |
Command and Scripting Interpreter,Command-Line Interface |
94 |
Sofacy Trojan Loader Activity Detected |
Sysmon |
1 |
Defense Evasion,Execution |
T1218.011, T1059, T1218 |
Command and Scripting Interpreter,Signed Binary Proxy Execution,Command-Line Interface, Signed Binary Proxy Execution,Rundll32, Rundll32 |
95 |
Domain Administrator Login in Workstation |
Security |
4627 |
Privilege Escalation,Defense Evasion,Initial Access,Persistence |
T1078, T1078.002 |
Valid Accounts,Domain Accounts |
96 |
Dridex Process Pattern Detected |
Sysmon |
1 |
Privilege Escalation,Defense Evasion |
T1055 |
Process Injection |
97 |
Suspicious PowerShell Mailbox Export to Share |
Security |
4688 |
Collection |
T1114 |
Email Collection |
98 |
Suspicious Calculator Usage Detected |
Sysmon |
1 |
Defense Evasion |
T1036 |
Masquerading |
99 |
Remotely Query Login Sessions - Network |
Sysmon |
3 |
Discovery |
T1082 |
System Information Discovery,Remote Query |
100 |
Active Directory DLLs Loaded By Office Applications |
Sysmon |
7 |
Initial Access |
T1566,T1566.001 |
Phishing, Phishing,Spearphishing Attachment, Spearphishing Attachment |
101 |
Possible Command Prompt Process Hollowing |
Sysmon |
1 |
Privilege Escalation,Defense Evasion |
T1055,T1055.012 |
Process Injection,Process Hollowing |
102 |
Remote System Discovery - Network |
Sysmon |
3 |
Discovery |
T1018 |
Remote System Discovery |
103 |
Clear Command History |
Sysmon |
1 |
Defense Evasion |
T1070,T1070.003 |
Indicator Removal on Host, Indicator Removal on Host, Clear Command History,Clear Command History |
104 |
Ps.exe Renamed SysInternals Tool Detected |
Sysmon |
1 |
Defense Evasion |
T1036 |
Masquerading |
105 |
Windows Data Copied to Removable Device |
Security |
4663 |
Exfiltration |
T1052.001,T1052 |
Exfiltration Over Physical Medium,Exfiltration over USB |
106 |
Masquerading File Location Detected |
Sysmon |
11 |
Defense Evasion |
T1036 |
Masquerading |
107 |
UltraVNC Execution via Command Line |
Security |
4688 |
Command and Control |
T1219 |
Remote Access Software |
108 |
Log Files Creation of Dot-Net-to-JS Detected |
Sysmon |
11 |
Execution |
T1059 |
Command and Scripting Interpreter |
109 |
CVE-2019-0708 RDP RCE Vulnerability Detected |
Security |
4625 |
Lateral Movement |
T1210 |
Exploitation of Remote Services |
110 |
PsExec Service Start Detected |
Sysmon |
1 |
Execution |
T1569.002,T1569 |
Service Execution,System Services, System Services,Service Execution |
111 |
New DLL Added to AppCertDlls Registry Key |
Sysmon |
13,12,14 |
Privilege Escalation, Persistence |
T1546.009,T1546 |
AppCert DLLs, AppCert DLLs,Event Triggered Execution, Event Triggered Execution |
112 |
Suspicious Userinit Child Process |
Sysmon |
1 |
Defense Evasion |
T1036 |
Masquerading |
113 |
Execution of Renamed PaExec Detected |
Sysmon |
1 |
Defense Evasion |
T1036 |
Masquerading |
114 |
Suspicious Double Extension Detected |
Sysmon |
1 |
Initial Access |
T1566,T1566.001 |
Phishing, Phishing,Spearphishing Attachment, Spearphishing Attachment |
115 |
Webshell Detection With Command Line Keywords |
Sysmon |
1 |
Privilege Escalation, Persistence |
T1505,T1505.003 |
Server Software Component, Server Software Component,Web Shell, Web Shell |
116 |
Suspicious Execution from Outlook |
Sysmon |
1 |
Defense Evasion,Execution |
T1202,T1059 |
Indirect Command Execution,Command and Scripting Interpreter,Command-Line Interface |
117 |
Suspicious Microsoft Equation Editor Child Process |
Sysmon |
1 |
Execution |
T1203 |
Exploitation for Client Execution |
118 |
DLL Load via LSASS Detected |
Sysmon |
13,12 |
Privilege Escalation, Execution, Persistence |
T1547,T1547.008 |
Boot or Logon Autostart Execution,Boot or Logon Autostart Execution,LSASS Driver, LSASS Driver |
119 |
MSHTA - Process Detected |
Sysmon |
1 |
Defense Evasion,Execution |
T1218.005,T1218 |
Mshta, Mshta,Signed Binary Proxy Execution, Signed Binary Proxy Execution |
120 |
WScript or CScript Dropper Detected |
Sysmon |
1 |
Execution |
T1059.007, T1059.005, T1059 |
JavaScript/JScript, Visual Basic, JavaScript, Command and Scripting Interpreter |
121 |
dotNET DLL Loaded Via Office Applications |
Sysmon |
7 |
Initial Access |
T1566,T1566.001 |
Phishing, Phishing,Spearphishing Attachment, Spearphishing Attachment |
122 |
Rundll32 Internet Connection Detected |
Sysmon |
3 |
Defense Evasion,Execution |
T1218.011,T1218 |
Rundll32, Rundll32,Signed Binary Proxy Execution, Signed Binary Proxy Execution |
123 |
In-memory PowerShell Detected |
Sysmon |
7 |
Execution |
T1059,T1059.001 |
PowerShell,Command and Scripting Interpreter,PowerShell, Command and Scripting Interpreter |
124 |
Browser Bookmark Discovery |
Sysmon |
1 |
Discovery |
T1217 |
Browser Bookmark Discovery |
125 |
Process Discovery Detected |
Sysmon |
1 |
Lateral Movement, Defense Evasion |
T1550.002, T1550 |
Pass the Hash,Use Alternate Authentication Material, Use Alternate Authentication Material,Pass the Hash |
126 |
Microsoft Defender Disabling Attempt via PowerShell |
Microsoft-Windows-PowerShell/ Operational |
4104 |
Defense Evasion,Execution |
T1562.001, T1562, T1059, T1059.001 |
Disable or Modify Tools,Command and Scripting Interpreter,PowerShell,Impair Defenses |
127 |
Windows Remote Management Detected |
Sysmon |
1 |
Lateral Movement,Execution |
T1021,T1021.006 |
Remote Services,Remote Services, Windows Remote Management,Windows Remote Management |
128 |
Windows Registry Value Change |
Security |
4657 |
Privilege Escalation, Defense Evasion, Credential Access |
T1112 |
Modify Registry |
129 |
RDP Connection Inititated from Domain Controller |
Microsoft-Windows-Terminal Services-Remote Connection Manager/ Operational |
1149 |
Lateral Movement |
T1021,T1021.001 |
Remote Services,Remote Desktop Protocol |
130 |
Petya Affected Hosts |
System |
106 |
Defense Evasion,Discovery |
T1046, T1518, T1518.001, T1211 |
Network Service Scanning,Security Software Discovery, Software Discovery,Software Discovery,Exploitation for Defense Evasion, Security Software Discovery |
131 |
QuarksPwDump Dump File Detected |
Sysmon |
11 |
Credential Access |
T1003,T1003.002 |
OS Credential Dumping,Security Account Manager |
132 |
Stealthy Scheduled Task Creation via VBA Macro Detected |
Sysmon |
7 |
Privilege Escalation, Execution, Persistence |
T1053.005, T1053 |
Scheduled Task,Scheduled Task/Job, Scheduled Task |
133 |
SAM Registry Hive Dump via Reg Utility |
Security |
4656 |
Discovery |
T1012 |
Query Registry |
134 |
Password Spraying Attack Detected |
Security |
4625 |
|
|
|
135 |
Possible Malicious Payload Download via Office Binaries Detected |
Sysmon |
1 |
Command and Control |
T1105 |
Ingress Tool Transfer |
136 |
Hidden PowerShell Window Detected |
Security |
4688 |
Defense Evasion |
T1564,T1564.003 |
Hidden Window, Hidden Window, Hide Artifacts,Hide Artifacts |
137 |
Suspicious Control Panel DLL Load Detected |
Sysmon |
1 |
Privilege Escalation,Defense Evasion,Persistence |
T1574, T1218.011 ,T1574.002, T1218 |
DLL Side-Loading, DLL Side-Loading, Hijack Execution Flow,Hijack Execution Flow,Signed Binary Proxy Execution, Signed Binary Proxy Execution,Rundll32, Rundll32 |
138 |
VBA DLL Loaded Via Microsoft Word |
Sysmon |
7 |
Initial Access |
T1566,T1566.001 |
Phishing, Phishing,Spearphishing Attachment, Spearphishing Attachment |
139 |
Printer Driver Addition Detected |
Microsoft-Windows-PrintService/ Operational |
316 |
Privilege Escalation |
T1068 |
Exploitation for Privilege Escalation |
140 |
DHCP Callout DLL Installation Detected |
Sysmon |
13 |
Privilege Escalation,Defense Evasion,Persistence |
T1574 ,T1574.002, T1112 |
Hijack Execution Flow,Hijack Execution Flow,Modify Registry,DLL Side-Loading, DLL Side-Loading |
141 |
Microsoft Binary Github Communication Detected |
Sysmon |
3 |
Command and Control |
T1105 |
Ingress Tool Transfer |
142 |
Control Panel Items Detected |
Sysmon |
1 |
Defense Evasion |
T1218.002,T1218 |
Control Panel, Control Panel,Signed Binary Proxy Execution |
143 |
Compiled HTML File Detected |
Sysmon |
1 |
Defense Evasion |
T1218.001,T1218 |
Compiled HTML File,Signed Binary Proxy Execution, Compiled HTML File, Signed Binary Proxy Execution |
144 |
Encoded PowerShell Command Detected |
Sysmon |
1 |
Execution |
T1059,T1059.001 |
PowerShell,Command and Scripting Interpreter,PowerShell, Command and Scripting Interpreter |
145 |
Application Whitelisting Bypass via DLL Loaded by odbcconf Detected |
Sysmon |
1 |
Defense Evasion |
T1218.008,T1218 |
Odbcconf,Signed Binary Proxy Execution |
146 |
Suspicious Process Start Locations Detected |
Sysmon |
1 |
Defense Evasion |
T1036 |
Masquerading |
147 |
OpenWith Execution of Specified Binary Detected |
Sysmon |
1 |
Defense Evasion |
T1218 |
Signed Binary Proxy Execution |
148 |
Direct Autorun Keys Modification Detected |
Sysmon |
1 |
Privilege Escalation, Persistence |
T1547, T1547.001 |
Boot or Logon Autostart Execution,Boot or Logon Autostart Execution,Registry Run Keys / Startup Folder, Registry Run Keys / Startup Folder |
149 |
Fireball Archer Installation Detected |
Sysmon |
1 |
Defense Evasion,Execution |
T1218.011, T1059, T1218 |
Command and Scripting Interpreter,Signed Binary Proxy Execution,Command-Line Interface, Signed Binary Proxy Execution,Rundll32, Rundll32 |
150 |
NTFS Object Deleted |
Sysmon |
1 |
Defense Evasion |
T1564,T1564.004 |
NTFS File Attributes,NTFS File Attributes, Hide Artifacts,Hide Artifacts |
151 |
Possible Shim Database Persistence via sdbinst.exe |
Sysmon |
1 |
Privilege Escalation, Persistence |
T1546,T1546.011 |
Application Shimming, Application Shimming,Event Triggered Execution, Event Triggered Execution |
152 |
GALLIUM Artifacts Detected |
Sysmon, Microsoft-Windows-DNSServer/ Analytical |
1,257 |
Command and Control,Credential Access |
T1003 |
OS Credential Dumping,Credential Dumping |
153 |
Malware Shellcode in Verclsid Target Process |
Sysmon |
10 |
Privilege Escalation,Defense Evasion |
T1055, T1218.012, T1218 |
Verclsid,Signed Binary Proxy Execution,Process Injection |
154 |
Unsigned Driver Loading Detected |
Sysmon |
6 |
|
|
|
155 |
Executable Dropped in Suspicious Location |
Sysmon |
11 |
|
|
|
156 |
Microsoft Build Engine started by Office |
Sysmon |
1 |
Defense Evasion |
T1127.001,T1127 |
Trusted Developer Utilities Proxy Execution,MSBuild |
157 |
Highly Relevant Renamed Binary Detected |
Sysmon |
1 |
Defense Evasion |
T1036 |
Masquerading |
158 |
Disabling Security Tools - Service stopped |
Sysmon |
1 |
Defense Evasion |
T1562 |
Disabling Security Tools,Impair Defenses |
159 |
WMI Persistence - Command Line Event Consumer Detected |
Sysmon |
7 |
Privilege Escalation, Persistence |
T1546.003, T1546 |
Windows Management Instrumentation Event Subscription, Windows Management Instrumentation Event Subscription,Event Triggered Execution, Event Triggered Execution |
160 |
PowerShell ADRecon Execution |
Microsoft-Windows-PowerShell/ Operational |
4104 |
Execution |
T1059,T1059.001 |
PowerShell,Command and Scripting Interpreter,PowerShell, Command and Scripting Interpreter |
161 |
Windows Logon Rights Changes |
Security |
47,174,718 |
Privilege Escalation,Defense Evasion,Persistence |
T1098, T1484, T1484.001 |
Account Manipulation,Group Policy Modification,Domain Policy Modification |
162 |
Possible Metasploit Meterpreter Activity Detected |
Sysmon |
3 |
Command and Control |
T1571 |
Non-Standard Port |
163 |
Rundll32 Process Execution |
Sysmon |
1 |
Defense Evasion,Execution |
T1218.011,T1218 |
Rundll32, Rundll32,Signed Binary Proxy Execution, Signed Binary Proxy Execution |
164 |
AD Privileged Users or Groups Reconnaissance Detected |
Security |
4661 |
Discovery |
T1087.002, T1087.001, T1087 |
Domain Account,Local Account,Account Discovery,Domain Account |
165 |
Execution of System Shells via Services |
Sysmon |
1 |
Execution |
T1569.002,T1569 |
System Services,Service Execution |
166 |
MSHTA - Network Detected |
Sysmon |
3 |
Defense Evasion,Execution |
T1218.005,T1218 |
Mshta, Mshta,Signed Binary Proxy Execution, Signed Binary Proxy Execution |
167 |
Existing Service Modification Detected |
Sysmon |
1 |
Privilege Escalation, Persistence |
T1543,T1543.003 |
Windows Service,Create or Modify System Process |
168 |
Change Default File Association |
Sysmon |
13,12,14 |
Persistence |
T1042 |
Change Default File Association |
169 |
Image File Execution Options Injection |
Sysmon |
13,12,14 |
Privilege Escalation, Defense Evasion, Persistence |
T1546,T1546.012 |
Image File Execution Options Injection,Event Triggered Execution,Image File Execution Options Injection, Event Triggered Execution |
170 |
Register new Logon Process by Rubeus |
Security |
4611 |
Lateral Movement, Privilege Escalation, Credential Access |
T1558,T1558.003 |
Steal or Forge Kerberos Tickets,Kerberoasting, Kerberoasting, Steal or Forge Kerberos Tickets |
171 |
Renamed Binary Detected |
Sysmon |
1 |
Defense Evasion |
T1036 |
Masquerading |
172 |
Possible Exploitation for CVE-2015-1641 Detected |
Sysmon |
1 |
Defense Evasion |
T1036 |
Masquerading |
173 |
Deobfuscation of Files Detected |
Sysmon |
1 |
Defense Evasion |
T1140 |
Deobfuscate/Decode Files or Information |
174 |
UAC Bypass via Event Viewer Detected |
Sysmon |
13 |
Privilege Escalation,Defense Evasion |
T1548,T1548.002 |
Bypass User Account Control,Abuse Elevation Control Mechanism |
175 |
Local Port Monitor |
Sysmon |
13,12,14 |
Privilege Escalation, Persistence |
T1547,T1547.010 |
Port Monitors, Boot or Logon Autostart Execution,Boot or Logon Autostart Execution,Port Monitors |
176 |
Secure Deletion with SDelete |
Security |
465, 646, 584, 663 |
Defense Evasion |
T1070.004, T1070 |
Indicator Removal on Host,File Deletion |
177 |
Bypass User Access Control using Process |
Sysmon |
1 |
Privilege Escalation,Defense Evasion |
T1548,T1548.002 |
Bypass User Account Control,Abuse Elevation Control Mechanism |
178 |
Doman Trust Discovery via NetDom |
Sysmon |
1 |
Discovery |
T1482 |
Domain Trust Discovery |
179 |
Discovery via PowerSploit Recon Module Detected |
Microsoft-Windows-PowerShell/Operational |
4104 |
Execution |
T1059,T1059.001 |
PowerShell,Command and Scripting Interpreter,PowerShell, Command and Scripting Interpreter |
180 |
LSASS Memory Dump Detected |
Sysmon |
10 |
Credential Access |
T1003 |
OS Credential Dumping,Credential Dumping |
181 |
HermeticWiper Driver Load |
Sysmon |
6 |
|
|
|
182 |
Protected Storage Service Access Detected |
Security |
5145 |
Lateral Movement |
T1021 |
Remote Services |
183 |
New Driver File Creation Detected |
Sysmon |
11 |
Execution |
T1129 |
Shared Modules |
184 |
DPAPI Domain Master Key Backup Attempt |
Security |
4692 |
Credential Access |
T1003 |
OS Credential Dumping,Credential Dumping |
185 |
WMI Modules Loaded by Suspicious Process |
Sysmon |
7 |
Execution |
T1047 |
Windows Management Instrumentation |
186 |
Execution via HTA using IE JavaScript Engine Detected |
Sysmon |
7 |
Defense Evasion,Execution |
T1218.005,T1218 |
Mshta, Mshta,Signed Binary Proxy Execution, Signed Binary Proxy Execution |
187 |
Mitre - Execution - Scheduled Job Operation |
System |
106,141 |
Execution |
|
Local Job Scheduling |
188 |
Windows Registry Persistence COM Key Linking Detected |
Sysmon |
12 |
Privilege Escalation, Persistence |
T1546.015, T1546 |
Component Object Model Hijacking,Component Object Model Hijacking,Event Triggered Execution |
189 |
Remote Registry Management Using Reg Utility |
Security |
5145 |
Defense Evasion,Discovery |
T1012,T1112 |
Modify Registry,Query Registry |
190 |
RDP Sensitive Settings Changed |
Sysmon |
13 |
|
|
|
191 |
Mimikatz DC Sync Detected |
Security |
4662 |
Credential Access |
T1003 |
OS Credential Dumping,Credential Dumping |
192 |
BITS Jobs - Network Detected |
Sysmon |
3 |
Defense Evasion, Persistence |
T1197 |
BITS Jobs |
193 |
Registry Persistence via Explorer Run Key Detected |
Sysmon |
13 |
Privilege Escalation, Persistence |
T1547,T1547.001 |
Boot or Logon Autostart Execution,Boot or Logon Autostart Execution,Registry Run Keys / Startup Folder, Registry Run Keys / Startup Folder |
194 |
Firewall Disabled via Netsh Detected |
Sysmon |
1 |
Privilege Escalation, Defense Evasion |
T1055 |
Process Injection |
195 |
Execution in Outlook Temp Folder Detected |
Sysmon |
1 |
Initial Access |
T1566,T1566.001 |
Phishing, Phishing,Spearphishing Attachment, Spearphishing Attachment |
196 |
Credential Access via LaZagne |
Sysmon |
10 |
Credential Access |
T1003,T1003.001 |
OS Credential Dumping,LSASS Memory |
197 |
USB Device Plugged |
Microsoft-Windows-Windows Defender/ Operational,Microsoft-Windows-DriverFrame works-UserMode/ Operational |
200, 321, 002, 102 |
Initial Access |
T1200 |
Hardware Additions |
198 |
Firewall Configuration Modification Detected |
Security |
4946 |
Defense Evasion |
T1562.004 |
Disable or Modify System Firewall |
199 |
Credential Access via Input Prompt Detected |
Microsoft-Windows-PowerShell/ Operational |
4104 |
Credential Access,Collection |
T1056,T1056.002 |
GUI Input Capture,Input Capture |
200 |
Sysinternals Tool Usage |
Sysmon |
13 |
Lateral Movement, Execution |
T1570 |
Lateral Tool Transfer |
201 |
Credential Dumping - Registry |
Sysmon |
13,12,14 |
Credential Access |
T1003 |
OS Credential Dumping,Credential Dumping |
202 |
New Firewall Port Opening Detected |
Security |
4657 |
Command and Control |
T1571 |
Non-Standard Port |
203 |
Windows Admin Shares - Network |
Sysmon |
3 |
Lateral Movement |
T1021 |
Remote Services |
204 |
Detection of Possible Rotten Potato |
Sysmon |
1 |
Privilege Escalation, Defense Evasion |
T1134 |
Access Token Manipulation |
205 |
Possible Impacket Lateralization Detected |
Sysmon |
1 |
Lateral Movement, Execution |
T1047, T1021, T1559.001, T1559.001, T1559, T1559, T1021.003, T1021.003 |
Windows Management Instrumentation, Component Object Model and Distributed COM,Component Object Model,Distributed Component Object Model,Inter-Process Communication,Remote Services, Inter-Process Communication |
206 |
Windows Webshell Creation Detected |
Sysmon |
11 |
Persistence |
T1505,T1505.003 |
Server Software Component, Server Software Component,Web Shell, Web Shell |
207 |
Network Share Discovery |
Sysmon |
1 |
Discovery |
T1135 |
Network Share Discovery |
208 |
Office Security Settings Changed |
Sysmon |
13 |
Defense Evasion |
T1112 |
Modify Registry |
209 |
Windows Defender Exclusion Set Detected |
Microsoft-Windows-Windows Defender/ Operational |
5007 |
Defense Evasion |
T1562.001,T1562 |
Disable or Modify Tools,Impair Defenses |
210 |
Allowed NetLogon Connections - CVE-2020-1472 |
Security |
5829 |
Privilege Escalation |
T1068 |
Exploitation for Privilege Escalation |
211 |
Java Running with Remote Debugging |
Sysmon |
1 |
Discovery |
T1046 |
Network Service Scanning |
212 |
DPAPI Domain Backup Key Extraction Detected |
Security |
4662 |
Credential Access |
T1003 |
OS Credential Dumping,Credential Dumping |
213 |
File Creation by PowerShell Detected |
Sysmon |
11 |
Execution |
T1059,T1059.001 |
PowerShell,Command and Scripting Interpreter,PowerShell, Command and Scripting Interpreter |
214 |
Firewall Addition via Netsh Detected |
Sysmon |
1 |
Defense Evasion |
T1562.004,T1562 |
Impair Defenses,Disable or Modify System Firewall |
215 |
Hacktool Ruler Detected |
Security |
477, 646, 244, 625 |
|
|
|
216 |
Suspicious WMIC XSL Script Execution |
Sysmon |
1,7 |
Defense Evasion,Execution |
T1220, T1059.005, T1059 |
Visual Basic,Command and Scripting Interpreter,XSL Script Processing |
217 |
Indicator Blocking - Driver unloaded |
Sysmon |
1 |
Defense Evasion |
T1562.006,T1562 |
Impair Defenses,Indicator Blocking,Impair Defenses, Indicator Blocking |
218 |
Registry Run Key Pointing to a Suspicious Folder |
Sysmon |
13 |
Privilege Escalation, Persistence |
T1547,T1547.001 |
Boot or Logon Autostart Execution,Registry Run Keys / Startup Folder |
219 |
Equation Group DLL_U Load Detected |
Sysmon |
1 |
Defense Evasion, Execution |
T1218.011, T1059, T1218 |
Command and Scripting Interpreter,Signed Binary Proxy Execution,Command-Line Interface, Signed Binary Proxy Execution,Rundll32, Rundll32 |
220 |
SAM Registry Hive Handle Request Detected |
Security |
4656 |
Discovery |
T1012 |
Query Registry |
221 |
StoneDrill Service Install Detected |
System |
7045 |
Privilege Escalation, Persistence |
T1543 |
New Service,Create or Modify System Process |
222 |
QBot Process Creation Detected |
Sysmon |
1 |
Execution |
T1059.005,T1059 |
Visual Basic,Command and Scripting Interpreter |
223 |
Exploit for CVE-2017-8759 Detected |
Sysmon |
1 |
Execution |
T1203 |
Exploitation for Client Execution |
224 |
Sysinterals Tool Usage |
Sysmon |
13 |
Lateral Movement, Execution |
T1570 |
Lateral Tool Transfer |
225 |
Suspect Svchost Memory Access |
Sysmon |
10 |
Defense Evasion |
T1562.001,T1562 |
Disable or Modify Tools,Impair Defenses |
226 |
Invocation of Active Directory Diagnostic Tool Detected |
Sysmon |
1 |
Credential Access |
T1003 |
OS Credential Dumping,Credential Dumping |
227 |
Wmiprvse Spawning Process |
Sysmon, Security |
14,688 |
Execution |
T1047 |
Windows Management Instrumentation |
228 |
Execution in Webserver Root Folder Detected |
Sysmon |
1 |
Persistence |
T1505,T1505.003 |
Server Software Component, Server Software Component,Web Shell, Web Shell |
229 |
Koadic Execution Detected |
Sysmon |
1 |
Defense Evasion,Execution |
T1218.005,T1218 |
Mshta, Mshta,Signed Binary Proxy Execution, Signed Binary Proxy Execution |
230 |
Droppers Exploiting CVE-2017-11882 Detected |
Sysmon |
1 |
Defense Evasion |
T1211 |
Exploitation for Defense Evasion |
231 |
Powershell AMSI Bypass via dotNET Reflection |
Sysmon |
1 |
Defense Evasion,Execution |
T1059,T1059.001 |
PowerShell,Command and Scripting Interpreter,PowerShell, Command and Scripting Interpreter |
232 |
XOR Encoded PowerShell Command |
Sysmon |
1 |
Execution |
T1059,T1059.001 |
PowerShell,Command and Scripting Interpreter,PowerShell, Command and Scripting Interpreter |
233 |
Possible Privilege Escalation via Weak Service Permissions |
Sysmon |
1 |
Privilege Escalation,Defense Evasion |
T1134 |
Access Token Manipulation |
234 |
CrackMapExecWin Detected |
Sysmon |
1 |
Credential Access |
T1003 |
OS Credential Dumping,Credential Dumping |
235 |
Query Registry Detected |
Sysmon |
1 |
Discovery |
T1012,T1007 |
System Service Discovery,Query Registry |
236 |
Formbook Process Creation Detected |
Sysmon |
1 |
Privilege Escalation,Defense Evasion |
T1055 |
Process Injection |
237 |
PowerShell Network Connection Detected |
Sysmon |
3 |
Execution |
T1059,T1059.001 |
PowerShell,Command and Scripting Interpreter,PowerShell, Command and Scripting Interpreter |
238 |
Empire PowerShell Launch Parameters |
Sysmon |
1 |
Execution |
T1059,T1059.001 |
PowerShell,Command and Scripting Interpreter,PowerShell, Command and Scripting Interpreter |
239 |
Process Hollowing Detected |
Sysmon |
1 |
Privilege Escalation,Defense Evasion |
T1055,T1055.012 |
Process Hollowing,Process Injection, Process Injection,Process Hollowing |
240 |
Suspicious DLL or VBS Files being created in ProgramData |
Sysmon |
11 |
Execution |
T1204.002 |
Malicious File |
241 |
BlueMashroom DLL Load Detected |
Sysmon |
1 |
Defense Evasion |
T1218.010,T1218 |
Regsvr32,Signed Binary Proxy Execution,Regsvr32, Signed Binary Proxy Execution |
242 |
Persistence and Execution at Scale via GPO Scheduled Task |
Security |
5145 |
Lateral Movement, Privilege Escalation, Execution, Privilege Escalation, Persistence |
T1053.005,T1053 |
Scheduled Task,Scheduled Task/Job, Scheduled Task |
243 |
Netsh Helper DLL - Registry Detected |
Sysmon |
13,12,14 |
Privilege Escalation, Persistence |
T1546.007,T1546 |
Netsh Helper DLL,Event Triggered Execution, Netsh Helper DLL, Event Triggered Execution |
244 |
Trickbot Malware Recon Activity Detected |
Sysmon |
1 |
Discovery |
T1482 |
Domain Trust Discovery |
245 |
Event Instrumentation Manifest Uninstall |
Sysmon |
1 |
Defense Evasion |
T1562.006,T1562 |
Indicator Blocking,Impair Defenses |
246 |
Weak Encryption Enabled for User |
Security |
4738 |
Defense Evasion |
T1562.001,T1562 |
Disable or Modify Tools, Disable or Modify Tools,Impair Defenses |
247 |
Creation of Encrypted Winrar archive via CLI |
Sysmon |
1 |
Defense Evasion,Collection |
T1560.001, T1027.002, T1560, T1027 |
Software Packing,Obfuscated Files or Information,Archive via Utility,Archive Collected Data |
248 |
WMI Backdoor Exchange Transport Agent |
Sysmon |
1 |
Privilege Escalation, Persistence |
T1546.003,T1546 |
Windows Management Instrumentation Event Subscription, Windows Management Instrumentation Event Subscription,Event Triggered Execution, Event Triggered Execution |
249 |
PowerShell Rundll32 Remote Thread Creation Detected |
Sysmon |
8 |
Defense Evasion,Execution |
T1218.011, T1059, T1059.001, T1218 |
Command and Scripting Interpreter, Command and Scripting Interpreter,Signed Binary Proxy Execution, Signed Binary Proxy Execution,Rundll32, Rundll32, PowerShell,PowerShell |
250 |
System Time Discovery |
Sysmon |
1 |
Discovery |
T1124 |
System Time Discovery |
251 |
Shells Spawned by Web Servers |
Sysmon |
1 |
Privilege Escalation, Persistence |
T1505,T1505.003 |
Server Software Component, Server Software Component,Web Shell, Web Shell |
252 |
Successful Lateral Movement to Administrator via Pass the Hash using Mimikatz Detected |
Security |
46,244,672 |
Lateral Movement, Defense Evasion |
T1550.002,T1550 |
Pass the Hash,Use Alternate Authentication Material, Use Alternate Authentication Material,Pass the Hash |
253 |
Suspicious RUN Key from Download Detected |
Sysmon |
13 |
Privilege Escalation, Persistence |
T1547,T1547.001 |
Boot or Logon Autostart Execution,Boot or Logon Autostart Execution,Registry Run Keys / Startup Folder, Registry Run Keys / Startup Folder |
254 |
Data Compression Detected in Windows |
Sysmon |
1 |
Collection |
T1560 |
Archive Collected Data |
255 |
Process Injection Detected |
Sysmon |
1 |
Privilege Escalation, Defense Evasion |
T1055 |
Process Injection |
256 |
Command-Line Interface Execution |
Sysmon |
1 |
Execution |
T1059 |
Command and Scripting Interpreter |
257 |
System Information Discovery |
Sysmon |
1 |
Discovery |
T1082 |
System Information Discovery |
258 |
Discovery via File and Directory Discovery Using Command Prompt |
Security |
4688 |
Discovery |
T1083 |
File and Directory Discovery |
259 |
FromBase64String Command Line Detected |
Sysmon |
1 |
Defense Evasion,Execution |
T1059.001, T1059.003, T1140, T1027 |
Deobfuscate/Decode Files or Information, Obfuscated Files or Information, PowerShell, Windows Command Shell |
260 |
BITS Jobs - Process Detected |
Sysmon |
1 |
Defense Evasion,Persistence |
T1197 |
BITS Jobs |
261 |
Mustang Panda Dropper Detected |
Sysmon |
1 |
Defense Evasion |
T1211 |
Exploitation for Defense Evasion |
262 |
Possible Hijack of Legit RDP Session to Move Laterally |
Sysmon |
11 |
Lateral Movement,Privilege Escalation,Persistence |
T1547, T1563.002, T1563, T1547.001 |
Registry Run Keys / Startup Folder,Boot or Logon Autostart Execution,Remote Service Session Hijacking,RDP Hijacking |
263 |
PowerShell PSAttack Detected |
Microsoft-Windows-PowerShell/ Operational |
4103 |
Execution |
T1059,T1059.001 |
PowerShell,Command and Scripting Interpreter,PowerShell, Command and Scripting Interpreter |
264 |
System File Execution Location Anomaly Detected |
Sysmon |
1 |
Defense Evasion |
T1036 |
Masquerading |
265 |
System Network Connections Discovery |
Sysmon |
1 |
Discovery |
T1049 |
System Network Connections Discovery |
266 |
PsExec Tool Execution Detected |
System, Sysmon |
170, 457, 036 |
Execution |
T1569.002,T1569 |
Service Execution,System Services, System Services,Service Execution |
267 |
Possible Bitsadmin Download Detected |
Sysmon |
1 |
Defense Evasion, Persistence |
T1197 |
BITS Jobs |
268 |
CMSTP Execution Detected |
Sysmon |
1,10,13,12 |
Defense Evasion,Execution |
T1218.003,T1218 |
Signed Binary Proxy Execution, CMSTP,CMSTP, Signed Binary Proxy Execution |
269 |
File Creation by Command Prompt |
Sysmon |
11 |
Execution |
T1059,T1059.003 |
Command and Scripting Interpreter,Windows Command Shell |
270 |
Meterpreter or Cobalt Strike Getsystem Service Start Detected |
Sysmon |
1 |
Privilege Escalation, Defense Evasion |
T1134 |
Access Token Manipulation |
271 |
Suspicious Kerberos RC4 Ticket Encryption |
Security |
4769 |
Credential Access |
T1558,T1558.003 |
Steal or Forge Kerberos Tickets,Kerberoasting, Kerberoasting, Steal or Forge Kerberos Tickets |
272 |
Bypassing Application Whitelisting with Regsvr32 |
Sysmon |
1 |
Defense Evasion,Execution |
T1218.010,T1218 |
Regsvr32,Signed Binary Proxy Execution,Regsvr32, Signed Binary Proxy Execution |
273 |
Suspicious File or Directory Permission Modification |
Security |
4688 |
Defense Evasion |
T1222.001 |
Windows File and Directory Permissions Modification,File and Directory Permissions Modification |
274 |
Possible App Whitelisting Bypass via WinDbg CDB as a Shellcode Runner |
Sysmon |
1 |
Defense Evasion,Execution |
T1218 |
Signed Binary Proxy Execution |
275 |
DHCP Server Loaded the CallOut DLL |
Application |
1033 |
Privilege Escalation,Defense Evasion,Persistence |
T1574,T1574.002 |
Hijack Execution Flow,Hijack Execution Flow,DLL Side-Loading, DLL Side-Loading |
276 |
SoftPerfect Network Scanner Execution |
Sysmon |
1 |
Discovery |
T1046 |
Network Service Scanning |
277 |
EXE or DLL Dropped in Perflogs Folder |
Sysmon |
11 |
|
|
|
278 |
Windows Crash Dump Disabled |
Sysmon |
13 |
Defense Evasion |
T1112 |
Modify Registry |
279 |
Reconnaissance Activity with Net Command |
Sysmon |
1 |
Reconnaissance, Discovery |
T1082, T1592, T1087, T1589 |
Gather Victim Host Information,System Information Discovery,Account Discovery,Gather Victim Identity Information |
280 |
S3 Browser Execution |
Sysmon |
1 |
Exfiltration |
T1567,T1567.002 |
Exfiltration to Cloud Storage,Exfiltration Over Web Service |
281 |
CACTUSTORCH Remote Thread Creation Detected |
Sysmon |
8 |
Privilege Escalation,Defense Evasion,Execution |
T1055,T1059 |
Command and Scripting Interpreter,Process Injection |
282 |
Ping Hex IP Detected |
Sysmon |
1 |
|
|
|
283 |
HH Execution Detected |
Sysmon |
1 |
Defense Evasion,Execution |
T1218.001,T1218 |
Compiled HTML File,Signed Binary Proxy Execution, Compiled HTML File, Signed Binary Proxy Execution |
284 |
Suspicious Outbound RDP Connections Detected |
Sysmon |
3 |
Lateral Movement |
T1210 |
Exploitation of Remote Services |
285 |
PowerShell Base64 Encoded Shellcode Detected |
Sysmon |
1 |
Defense Evasion |
T1036 |
Masquerading |
286 |
Suspicious Debugger Registration Cmdline |
Sysmon |
1 |
Privilege Escalation, Persistence |
T1546.008,T1546 |
Accessibility Features,Accessibility Features,Event Triggered Execution, Event Triggered Execution |
287 |
Sysmon Manifest Tampering |
Sysmon |
1 |
Defense Evasion |
T1562.006,T1562 |
Indicator Blocking,Impair Defenses |
288 |
Grabbing Sensitive Hives via Reg Utility |
Sysmon |
1 |
Credential Access |
T1552.002,T1552 |
Unsecured Credentials,Credentials in Registry |
289 |
SCM Database Handle Failure Detected |
Security |
4656 |
Impact |
T1499 |
Endpoint Denial of Service |
290 |
Active Directory Replication from Non Machine Account |
Security |
4662 |
Credential Access |
T1003,T1003.006 |
DCSync,OS Credential Dumping |
291 |
User Group Enumeration by Non-Administrator Detected |
Security |
4798 |
Discovery |
T1087 |
Account Discovery |
292 |
Suspicious Driver Load from Temp |
Sysmon |
6 |
Privilege Escalation, Persistence |
T1543 |
New Service,Create or Modify System Process |
293 |
Signature Revoked Driver Loading Detected |
Sysmon |
6 |
Execution |
T1129 |
Execution through Module Load,Shared Modules |
294 |
TrickBot - Disabling of Windows Defender Real Time Monitoring Detected |
Microsoft-Windows-Windows Defender/ Operational |
5001 |
Defense Evasion |
T1027 |
Obfuscated Files or Information |
295 |
Stealthy VSTO Persistence |
Sysmon |
13 |
Persistence |
T1137.006 |
Add-ins |
296 |
Credentials Dumping Tools Accessing LSASS Memory |
Sysmon |
10 |
Credential Access |
T1003,T1003.001 |
OS Credential Dumping,LSASS Memory |
297 |
Command Obfuscation via Character Insertion |
Sysmon |
1 |
Defense Evasion,Execution |
T1059,T1059.003 |
Command and Scripting Interpreter,Windows Command Shell |
298 |
PowerView PowerShell Commandlets |
Microsoft-Windows-PowerShell/ Operational |
4104 |
Execution |
T1059,T1059.001 |
Command and Scripting Interpreter,PowerShell |
299 |
Suspicious Keyboard Layout Load Detected |
Sysmon |
13 |
|
|
|
300 |
WMI - Network |
Sysmon |
3 |
Execution |
T1047 |
Windows Management Instrumentation |
301 |
Possible Executable Used by PlugX in Uncommon Location |
Sysmon |
1 |
Privilege Escalation,Defense Evasion,Persistence |
T1574,T1574.002 |
Hijack Execution Flow,Hijack Execution Flow,DLL Side-Loading, DLL Side-Loading |
302 |
Bypass User Access Control using Registry |
Sysmon |
13,12,14 |
Privilege Escalation,Defense Evasion |
T1548 |
Bypass User Access Control,Abuse Elevation Control Mechanism |
303 |
Sysmon Driver Unload Detected |
Sysmon |
255 |
Defense Evasion |
T1562.001,T1562 |
Disable or Modify Tools,Impair Defenses |
304 |
WMI Modules Loaded |
Sysmon |
7 |
Execution |
T1047 |
Windows Management Instrumentation |
305 |
Windows Mangement Instrumentation DLL Loaded Via Microsoft Word |
Sysmon |
7 |
Execution |
T1047 |
Windows Management Instrumentation |
306 |
Component Object Model Hijacking Detected |
Sysmon |
13,12,14 |
Privilege Escalation, Persistence |
T1546.015,T1546 |
Component Object Model Hijacking,Event Triggered Execution |
307 |
Sysprep on AppData Folder Detected |
Sysmon |
1 |
Defense Evasion |
T1036 |
Masquerading |
308 |
Possible Process Hollowing Image Loading |
Sysmon |
7 |
Privilege Escalation, Defense Evasion, Privilege Escalation, Persistence |
T1055, T1574, T1055.012, T1574.002 |
Process Injection,Process Injection,DLL Side-Loading, DLL Side-Loading,Hijack Execution Flow,Process Hollowing |
309 |
Possible GootKit WScript Execution |
Security |
4688 |
|
|
|
310 |
PowerShell Network Connections Detected |
Sysmon |
3 |
Execution |
T1059,T1059.001 |
PowerShell,Command and Scripting Interpreter,PowerShell, Command and Scripting Interpreter |
311 |
Wsreset UAC Bypass Detected |
Sysmon |
1 |
Privilege Escalation,Defense Evasion |
T1548,T1548.002 |
Bypass User Access Control,Bypass User Account Control,Abuse Elevation Control Mechanism |
312 |
Adwind RAT JRAT Detected |
Sysmon |
1,11,13 |
Execution |
T1059.007, T1059.005, T1059, T1059.003, T1059.001 |
Visual Basic, JavaScript, Command and Scripting Interpreter, PowerShell, Windows Command Shell |
313 |
Rare Service Installs Detected |
System |
7045 |
Privilege Escalation, Persistence |
T1543 |
Create or Modify System Process |
314 |
MavInject Process Injection Detected |
Sysmon |
1 |
Privilege Escalation,Defense Evasion |
T1055,T1218 |
Signed Binary Proxy Execution,Process Injection |
315 |
Credential Dumping with ImageLoad Detected |
Sysmon |
7 |
Credential Access |
T1003 |
OS Credential Dumping,Credential Dumping |
316 |
MMC20 Lateral Movement Detected |
Sysmon |
1 |
Execution |
T1559.001,T1559 |
Inter-Process Communication, Component Object Model |
317 |
Clearing of PowerShell Logs Detected |
Microsoft-Windows-PowerShell/ Operational |
4103 |
Defense Evasion |
T1070 |
Indicator Removal on Host |
318 |
Mitre - Initial Access - Hardware Addition - Removable Storage Connected |
Microsoft-Windows-Windows Defender/ Operational |
2003 |
Initial Access |
T1200 |
Hardware Additions |
319 |
Reconnaissance Activity Detected |
Security |
4661 |
Discovery |
T1087,T1069 |
Permission Groups Discovery,Account Discovery |
320 |
Interactive AT Job Detected |
Sysmon |
1 |
Privilege Escalation, Execution, Persistence |
T1053.005,T1053 |
Scheduled Task,Scheduled Task/Job, Scheduled Task |
321 |
Named Pipe added to Null Session Detected |
Sysmon |
13 |
Lateral Movement |
T1021 |
Remote Services |
322 |
Suspicious Commandline Escape Detected |
Sysmon |
1 |
Defense Evasion |
T1140 |
Deobfuscate/Decode Files or Information |
323 |
RDP Over Reverse SSH Tunnel Detected |
Sysmon |
3 |
Lateral Movement |
T1021,T1021.001 |
Remote Services,Remote Services, Remote Desktop Protocol,Remote Desktop Protocol |
324 |
Sysinternals Tool Usage - PsExec |
Sysmon |
13 |
Lateral Movement |
T1570 |
Lateral Tool Transfer |
325 |
Possible DNS Rebinding Detected |
Sysmon |
22 |
|
|
|
326 |
Logon Scripts Detected |
Sysmon |
1, 11, 13, 12, 14 |
Lateral Movement, Privilege Escalation, Persistence |
T1037 |
Logon Scripts,Boot or Logon Initialization Scripts |
327 |
Network Share Connection Removed |
Sysmon |
1 |
Defense Evasion |
T1070.005,T1070 |
Network Share Connection Removal,Indicator Removal on Host, Indicator Removal on Host,Network Share Connection Removal |
328 |
Default Audit Policy Changed |
Security |
4715, 4817, 4905, 4902, 4912, 4719, 4907, 4906, 4904 |
|
|
|
329 |
UAC Bypass via SDCLT |
Sysmon |
1 |
Privilege Escalation |
T1548,T1548.002 |
Bypass User Account Control,Abuse Elevation Control Mechanism |
330 |
RDP over Reverse SSH Tunnel WFP |
Security |
5156 |
Command and Control,Lateral Movement |
T1021, T1021.001, T1090 |
Remote Desktop Protocol, Remote Services,Remote Services, Remote Desktop Protocol,Proxy |
331 |
Application Shimming - File Access Detected |
Sysmon |
11, 1, 13, 12, 14 |
Privilege Escalation, Persistence |
T1546,T1546.011 |
Application Shimming,Event Triggered Execution |
332 |
Microsoft Build Engine Loading Credential Libraries |
Sysmon |
7 |
Credential Access |
T1003,T1003.002 |
OS Credential Dumping,Security Account Manager |
333 |
DNS Exfiltration Tools Execution Detected |
Sysmon |
1 |
Exfiltration |
T1048 |
Exfiltration Over Alternative Protocol |
334 |
Execution in Non-Executable Folder Detected |
Sysmon |
1 |
Defense Evasion |
T1036 |
Masquerading |
335 |
DNS ServerLevelPlugin Dll Install |
Sysmon |
1,13 |
Privilege Escalation,Defense Evasion,Persistence |
T1574,T1574.002 |
Hijack Execution Flow,Hijack Execution Flow,DLL Side-Loading, DLL Side-Loading |
336 |
WMIExec VBS Script Detected |
Sysmon |
1 |
Execution |
T1059.005,T1059 |
Visual Basic,Command and Scripting Interpreter |
337 |
Possible APT29 Activity Detected |
Sysmon |
1 |
Execution |
T1059,T1059.001 |
PowerShell,Command and Scripting Interpreter,PowerShell, Command and Scripting Interpreter |
338 |
Suspicious MsiExec Directory Detected |
Sysmon |
1 |
Defense Evasion |
T1036 |
Masquerading |
339 |
Credential Access via Pypykatz |
Sysmon |
10 |
Credential Access |
T1003.001 |
LSASS Memory |
340 |
Narrators Feedback-Hub Persistence Detected |
Sysmon |
13,12 |
Privilege Escalation, Persistence |
T1547,T1547.001 |
Boot or Logon Autostart Execution,Boot or Logon Autostart Execution,Registry Run Keys / Startup Folder, Registry Run Keys / Startup Folder |
341 |
QuarksPwDump Clearing Access History Detected |
Sysmon |
16 |
Privilege Escalation,Credential Access,Initial Access,Defense Evasion,Persistence |
T1003, T1078, T1003.003, T1078.003 |
OS Credential Dumping,Valid Accounts,NTDS,Local Accounts |
342 |
Kerberoasting via PowerShell Detected |
Microsoft-Windows-PowerShell/Operational |
4103 |
Credential Access |
T1558,T1558.003 |
Steal or Forge Kerberos Tickets,Kerberoasting, Kerberoasting, Steal or Forge Kerberos Tickets |
343 |
Suspicious Call by Ordinal Detected |
Security |
4688 |
Defense Evasion,Execution |
T1218.011,T1218 |
Rundll32, Rundll32,Signed Binary Proxy Execution, Signed Binary Proxy Execution |
344 |
Bypass UAC via WSReset Detected |
Sysmon |
1 |
Privilege Escalation, Privilege Escalation,Defense Evasion |
T1548,T1548.002 |
Bypass User Access Control,Bypass User Account Control,Abuse Elevation Control Mechanism |
345 |
Netsh Helper DLL - Process Detected |
Sysmon |
1 |
Privilege Escalation, Persistence |
T1546.007, T1546 |
Netsh Helper DLL,Event Triggered Execution, Netsh Helper DLL, Event Triggered Execution |
346 |
Encoded FromBase64String Detected |
Sysmon |
1 |
Defense Evasion, Execution |
T1140, T1059, T1059.001 |
PowerShell,Deobfuscate/ Decode Files or Information,Command and Scripting Interpreter,PowerShell, Command and Scripting Interpreter |
347 |
Forced Authentication Detected |
Sysmon |
11 |
Credential Access |
T1187 |
Forced Authentication |
348 |
Local Accounts Discovery Detected |
Sysmon |
1 |
Discovery |
T1033,T1087 |
System Owner/User Discovery,Account Discovery |
349 |
Run PowerShell Script from ADS Detected |
Sysmon |
1 |
Defense Evasion |
T1564,T1564.004 |
NTFS File Attributes,NTFS File Attributes, Hide Artifacts,Hide Artifacts |
350 |
Enabled User Right in AD to Control User Objects |
Security |
4704 |
Privilege Escalation,Defense Evasion,Initial Access,Persistence |
T1078 |
Valid Accounts |
351 |
Powerview Add-DomainObjectAcl DCSync AD Extend Right |
Security |
5136 |
Privilege Escalation, Persistence |
T1098 |
Account Manipulation |
352 |
Non Interactive PowerShell Execution |
Sysmon |
1 |
Execution |
T1059 |
Command and Scripting Interpreter,Powershell |
353 |
Net exe Execution Detected |
Sysmon |
1 |
Lateral Movement, Defense Evasion, Discovery |
T1021, T1049, T1135, T1027 |
Obfuscated Files or Information,System Network Connections Discovery,Remote Services,Network Share Discovery |
354 |
Possible Pass the Hash Activity Detected |
Security |
4624 |
Lateral Movement, Defense Evasion |
T1550.002,T1550 |
Pass the Hash,Use Alternate Authentication Material, Use Alternate Authentication Material,Pass the Hash |
355 |
Audio Capture via SoundRecorder |
Sysmon |
1 |
Collection |
T1123 |
Audio Capture |
356 |
Windows Admin Shares - Process |
Sysmon |
1 |
Lateral Movement |
T1021,T1021.002 |
Remote Services,SMB/Windows Admin Shares |
357 |
Iranian APT Lateral Movement using Pass the Hash |
Microsoft-Windows-PowerShell/ Operational |
4104 |
Lateral Movement, Defense Evasion |
T1550.002,T1550 |
Pass the Hash,Use Alternate Authentication Material, Use Alternate Authentication Material,Pass the Hash |
358 |
Turla Group Named Pipes Detected |
Sysmon |
18,17 |
Privilege Escalation, Privilege Escalation,Defense Evasion |
T1055 |
Process Injection |
359 |
Suspicious Svchost Process Detected |
Sysmon |
1 |
Defense Evasion |
T1036,T1036.005 |
Match Legitimate Name or Location,Masquerading |
360 |
Password Dumper Activity on LSASS |
Security |
4656 |
Credential Access |
T1003 |
OS Credential Dumping,Credential Dumping |
361 |
Masquerading Extension Detected |
Sysmon |
1 |
Defense Evasion |
T1036 |
Masquerading |
362 |
Possible SPN Enumeration Detected |
Sysmon |
1 |
Credential Access |
T1558,T1558.003 |
Steal or Forge Kerberos Tickets,Kerberoasting, Kerberoasting, Steal or Forge Kerberos Tickets |
363 |
Suspicious Program Location Process Starts Detected |
Sysmon |
1 |
Defense Evasion |
T1036 |
Masquerading |
364 |
Credential Dumping - Process Access |
Sysmon |
10 |
Credential Access |
T1003 |
OS Credential Dumping |
365 |
Suspicious CSharp or FSharp Interactive Console Execution |
Sysmon |
1 |
Defense Evasion |
T1127 |
Trusted Developer Utilities Proxy Execution,Trusted Developer Utilities |
366 |
Network Sniffing Detected |
Sysmon |
1 |
Credential Access,Discovery |
T1040 |
Network Sniffing |
367 |
Suspicious Code Page Switch Detected |
Sysmon |
1 |
Defense Evasion |
T1140 |
Deobfuscate/Decode Files or Information |
368 |
Execution via Squiblydoo Technique Detected |
Sysmon |
7 |
Defense Evasion,Execution |
T1218.010,T1218 |
Regsvr32,Signed Binary Proxy Execution,Regsvr32, Signed Binary Proxy Execution |
369 |
Possible Impacket SecretDump Remote Activity |
Security |
5145 |
Credential Access |
T1003 |
OS Credential Dumping |
370 |
WannaCry Ransomware Detected |
Sysmon |
1 |
Credential Access, Execution, Defense Evasion |
T1003, T1218.011, T1070, T1218 |
Indicator Removal on Host,Credential Dumping,Signed Binary Proxy Execution, Signed Binary Proxy Execution,Rundll32, Rundll32,OS Credential Dumping |
371 |
Login with WMI Detected |
Security |
4624 |
Execution |
T1047 |
Windows Management Instrumentation |
372 |
Suspicious Bitsadmin Job via PowerShell |
Sysmon |
1 |
Defense Evasion,Persistence |
T1197 |
BITS Jobs |
373 |
Devtoolslauncher Executes Specified Binary |
Sysmon |
1 |
Defense Evasion |
T1218 |
Signed Binary Proxy Execution |
374 |
MMC Spawning Windows Shell Detected |
Sysmon |
1 |
Defense Evasion,Execution |
T1202,T1059 |
Indirect Command Execution,Command and Scripting Interpreter |
375 |
Execution via Control Panel Items |
Sysmon |
1 |
Defense Evasion |
T1218.002,T1218 |
Control Panel, Control Panel,Signed Binary Proxy Execution |
376 |
Application Whitelisting Bypass via Bginfo Detected |
Sysmon |
1 |
Defense Evasion |
T1218 |
Signed Binary Proxy Execution |
377 |
Hidden Files and Directories Detected |
Sysmon |
1 |
Defense Evasion,Persistence |
T1564,T1564.001 |
Hidden Files and Directories, Hidden Files and Directories, Hide Artifacts,Hide Artifacts |
378 |
NotPetya Ransomware Activity Detected |
Sysmon |
1 |
Defense Evasion |
T1218.011, T1070, T1218 |
Indicator Removal on Host,Rundll32,Signed Binary Proxy Execution |
379 |
SecurityXploded Tool Detected |
Sysmon |
1 |
Credential Access |
T1003 |
OS Credential Dumping |
380 |
Obfuscated Files Detected |
Sysmon |
1 |
Defense Evasion |
T1027 |
Obfuscated Files or Information |
381 |
BCDEdit Safe Mode Command Execution |
Sysmon |
1 |
Impact |
T1490 |
Inhibit System Recovery |
382 |
Emotet Process Creation Detected |
Sysmon |
1 |
Privilege Escalation, Defense Evasion |
T1055 |
Process Injection |
383 |
NoPowerShell Tool Activity Detected |
Sysmon |
11 |
Execution |
T1129 |
Shared Modules |
384 |
Suspicious Encoded PowerShell Command Line |
Sysmon |
1 |
Execution |
T1059,T1059.001 |
PowerShell,Command and Scripting Interpreter,PowerShell, Command and Scripting Interpreter |
385 |
Default PowerSploit and Empire Schtasks Persistence |
Sysmon |
1 |
Privilege Escalation, Execution, Persistence |
T1053.005, T1059, T1053, T1059.001 |
Command and Scripting Interpreter, Command and Scripting Interpreter, Scheduled Task, Scheduled Task, PowerShell, PowerShell, Scheduled Task/Job |
386 |
Active Directory Module Load in PowerShell |
Microsoft-Windows-PowerShell/ Operational |
4103 |
Execution |
T1059,T1059.001 |
Command and Scripting Interpreter,PowerShell |
387 |
XSL Script Processing Detected |
Sysmon |
1 |
Defense Evasion,Execution |
T1220 |
XSL Script Processing |
388 |
Netsh Port Forwarding Detected |
Sysmon |
1 |
Privilege Escalation, Persistence |
T1546.007,T1546 |
Netsh Helper DLL,Event Triggered Execution |
389 |
Impair Defenses - Disable or Modify Tools - Service stopped |
Sysmon |
1 |
Defense Evasion |
T1562.001,T1562 |
Disable or Modify Tools, Disable or Modify Tools,Impair Defenses |
390 |
Remote Connection Established via Msbuild |
Sysmon |
3 |
Defense Evasion |
T1127.001 |
MSBuild |
391 |
Application Whitelisting Bypass via Dxcap Detected |
Sysmon |
1 |
Defense Evasion |
T1218 |
Signed Binary Proxy Execution |
392 |
Ursnif Detected |
Sysmon |
13 |
Defense Evasion,Execution |
T1112 |
Modify Registry |
393 |
New DLL Added to AppInit_DLLs Registry Key Detected |
Sysmon |
13,12,14 |
Privilege Escalation, Persistence |
T1546.010,T1546 |
AppInit DLLs,Event Triggered Execution,AppInit DLLs, Event Triggered Execution |
394 |
WMI Persistence - Script Event Consumer Detected |
Sysmon |
1 |
Privilege Escalation, Persistence |
T1546.003,T1546 |
Windows Management Instrumentation Event Subscription, Windows Management Instrumentation Event Subscription,Event Triggered Execution |
395 |
Query Registry Network |
Sysmon |
3 |
Discovery |
T1012 |
Query Registry |
396 |
Disable of ETW Trace Detected |
Sysmon |
1 |
Defense Evasion |
T1562.006,T1562 |
Indicator Blocking,Impair Defenses |
397 |
Suspicious Windows ANONYMOUS LOGON Local Account Creation |
Security |
4720 |
Persistence |
T1136 |
Create Account |
398 |
Possible Applocker Bypass Detected |
Sysmon |
1 |
Defense Evasion |
T1218.009, T1127, T1218.005, T1218.004, T1218 |
Trusted Developer Utilities, Regsvcs/ Regasm,Trusted Developer Utilities Proxy Execution, Signed Binary Proxy Execution, InstallUtil, Mshta |
399 |
Bypass UAC via CMSTP Detected |
Sysmon |
1 |
Privilege Escalation,Defense Evasion,Execution |
T1218.003, T1548, T1548.002, T1218 |
Bypass User Access Control, Abuse Elevation Control Mechanism, Signed Binary Proxy Execution, CMSTP, CMSTP, Signed Binary Proxy Execution, Bypass User Account Control |
400 |
RClone Utility Execution |
Sysmon |
1 |
Exfiltration |
T1567,T1567.002 |
Exfiltration to Cloud Storage,Exfiltration Over Web Service |
401 |
Winnti Malware HK University Campaign |
Sysmon |
1 |
Privilege Escalation,Defense Evasion,Persistence |
T1574,T1574.002 |
Hijack Execution Flow,Hijack Execution Flow,DLL Side-Loading, DLL Side-Loading |
402 |
WMI Persistence - Script Event Consumer File Write |
Sysmon |
11 |
Privilege Escalation, Persistence |
T1546.003,T1546 |
Windows Management Instrumentation Event Subscription, Windows Management Instrumentation Event Subscription,Event Triggered Execution, Event Triggered Execution |
403 |
Bypass User Account Control using Registry |
Sysmon |
13,12 |
Privilege Escalation,Defense Evasion |
T1548,T1548.002 |
Bypass User Account Control,Abuse Elevation Control Mechanism |
404 |
Windows User Account Created via Command Line |
Sysmon |
1 |
Persistence |
T1136 |
Create Account |
405 |
Renamed jusched Detected |
Sysmon |
1 |
Defense Evasion,Execution |
T1036 |
Masquerading |
406 |
Alternate PowerShell Hosts Pipe Detected |
Sysmon |
17 |
Execution |
T1059,T1059.001 |
PowerShell,Command and Scripting Interpreter,PowerShell, Command and Scripting Interpreter |
407 |
Suspicious XOR Encoded PowerShell Command Line |
Sysmon |
1 |
Execution |
T1059,T1059.001 |
PowerShell,Command and Scripting Interpreter,PowerShell, Command and Scripting Interpreter |
408 |
Remote Task Creation via ATSVC Named Pipe |
Security |
5145 |
Lateral Movement, Privilege Escalation, Execution, Persistence |
T1053.005,T1053 |
Scheduled Task,Scheduled Task/Job, Scheduled Task |
409 |
Trusted Developer Utilities Detected |
Sysmon |
1 |
Defense Evasion,Execution |
T1127 |
Trusted Developer Utilities Proxy Execution,Trusted Developer Utilities |
410 |
MSTSC Shadowing Detected |
Sysmon |
1 |
Lateral Movement |
T1563.002,T1563 |
Remote Service Session Hijacking,RDP Hijacking |
411 |
Netsh RDP Port Forwarding Detected |
Sysmon |
1 |
Lateral Movement |
T1021 |
Remote Services |
412 |
Suspicious Access to Sensitive File Extensions |
Security |
5145 |
Collection |
T1074 |
Data Staged |
413 |
SolarWinds Supply Chain Compromise Suspicious File Drop |
Sysmon |
11 |
Initial Access |
T1195,T1195.002 |
Supply Chain Compromise, Compromise Software Supply Chain |
414 |
Suspicious PsExec Execution Detected |
Security |
5145 |
Lateral Movement |
T1570 |
Lateral Tool Transfer |
415 |
Empire PowerShell UAC Bypass Detected |
Sysmon |
1 |
Privilege Escalation,Defense Evasion |
T1548 |
Bypass User Access Control,Abuse Elevation Control Mechanism |
416 |
Possible Detection of SafetyKatz |
Sysmon |
11 |
Credential Access |
T1003,T1003.001 |
OS Credential Dumping,LSASS Memory |
417 |
Turla Service Install Detected |
System |
7045 |
Privilege Escalation, Persistence |
T1543, T1543.003 |
Windows Service,Create or Modify System Process |
418 |
Hiding Files with Attrib Detected |
Sysmon |
1 |
Defense Evasion,Persistence |
T1564,T1564.001 |
Hidden Files and Directories, Hidden Files and Directories, Hide Artifacts,Hide Artifacts |
419 |
Enabling of RDP Service |
Sysmon |
13 |
Defense Evasion |
T1112 |
Modify Registry |
420 |
HandleKatz Duplicating LSASS Handle |
Sysmon |
10 |
Credential Access |
T1003, T1003.001, T1003.006 |
LSASS Memory |
421 |
Unidentified Attacker November 2018 Detected |
Sysmon |
1,11 |
Defense Evasion,Execution |
T1218.011,T1218 |
Rundll32, Rundll32,Signed Binary Proxy Execution, Signed Binary Proxy Execution |
422 |
PowerShell Download from URL Detected |
Sysmon |
1 |
Execution |
T1059,T1059.001 |
PowerShell,Command and Scripting Interpreter,PowerShell, Command and Scripting Interpreter |
423 |
Scheduled Task Deletion |
Sysmon |
1 |
Privilege Escalation, Execution, Persistence |
T1053.005,T1053 |
Scheduled Task,Scheduled Task/Job |
424 |
Suspicious PowerShell Command Detected |
Sysmon |
1 |
Execution |
T1059,T1059.001 |
PowerShell,Command and Scripting Interpreter,PowerShell, Command and Scripting Interpreter |
425 |
Tasks Folder Evasion Detected |
Security |
4688 |
Privilege Escalation, Privilege Escalation,Defense Evasion, Defense Evasion,Persistence |
T1574,T1574.002 |
Hijack Execution Flow,DLL Side-Loading |
426 |
Disable Security Events Logging Adding Reg Key MiniNt |
Sysmon |
12 |
Defense Evasion |
T1562.001,T1562 |
Disable or Modify Tools, Disable or Modify Tools,Impair Defenses |
427 |
Mitre Execution Attack using Install Util |
Sysmon |
1 |
Defense Evasion,Execution |
T1218.004,T1218 |
Install Util,Signed Binary Proxy Execution,InstallUtil |
428 |
PowerShell Profile Modification |
Microsoft-Windows-PowerShell/ Operational |
4103 |
Privilege Escalation, Execution, Persistence |
T1059.001, T1059, T1546, T1546.013 |
Command and Scripting Interpreter,PowerShell Profile,Event Triggered Execution,PowerShell |
429 |
Application Whitelisting Bypass via Dnx Detected |
Sysmon |
1 |
Defense Evasion |
T1218 |
Signed Binary Proxy Execution |
430 |
Operation Wocao Activity Detected |
Sysmon, Security |
14,799 |
Privilege Escalation, Privilege Escalation, Persistence, Defense Evasion, Execution, Persistence, Discovery |
T1053.005, T1053, T1012, T1036, T1036.004, T1211 |
Query Registry, Masquerading, Scheduled Task, Masquerade Task or Service, Exploitation for Defense Evasion, Scheduled Task/Job |
431 |
Time Providers Access Detected |
Sysmon |
13,12,14 |
Privilege Escalation, Persistence |
T1547,T1547.003 |
Boot or Logon Autostart Execution,Boot or Logon Autostart Execution, Time Providers,Time Providers |
432 |
Windows Registry Trust Record Modification Detected |
Sysmon |
12 |
Initial Access |
T1566,T1566.001 |
Phishing, Phishing,Spearphishing Attachment, Spearphishing Attachment |
433 |
Exploiting SetupComplete CVE-2019-1378 Detected |
Sysmon |
1 |
Privilege Escalation,Defense Evasion |
T1055 |
Process Injection |
434 |
WMI Process Execution |
Sysmon |
1 |
Execution |
T1047 |
Windows Management Instrumentation |
435 |
Install Root Certificate |
Sysmon |
13,12,14 |
Defense Evasion |
T1553.004,T1553 |
Install Root Certificate,Install Root Certificate, Subvert Trust Controls,Subvert Trust Controls |
436 |
Windows Shell Spawning Suspicious Program |
Sysmon |
1 |
Execution |
|
|
437 |
Possible DC Sync Detected |
Security |
4742 |
Credential Access |
T1003 |
OS Credential Dumping,Credential Dumping |
438 |
Microsoft Binary Suspicious Communication Endpoint Detected |
Sysmon |
3 |
Lateral Movement, Command and Control |
T1105 |
Remote File Copy,Ingress Tool Transfer |
439 |
Batch Scripting Detected |
Sysmon |
11 |
Execution |
T1059 |
Command and Scripting Interpreter |
440 |
SCM Database Privileged Operation Detected |
Security |
4674 |
Privilege Escalation, Defense Evasion |
T1548,T1548.002 |
Bypass User Account Control,Bypass User Account Control,Abuse Elevation Control Mechanism |
441 |
CreateRemoteThread API and LoadLibrary |
Sysmon |
8 |
Privilege Escalation, Defense Evasion |
T1055 |
Process Injection |
442 |
Possible SquiblyTwo Detected |
Sysmon |
1 |
Defense Evasion,Execution |
T1047 |
Windows Management Instrumentation |
443 |
Suspicious Filename Detected |
Sysmon |
1 |
Defense Evasion |
T1027 |
Obfuscated Files or Information |
444 |
Powershell AMSI Bypass via .NET Reflection |
Sysmon |
1 |
Defense Evasion,Execution |
T1059,T1059.001 |
PowerShell,Command and Scripting Interpreter,PowerShell, Command and Scripting Interpreter |
445 |
TimeStomping via PowerShell Detected |
Microsoft-Windows-PowerShell/ Operational |
4103 |
Defense Evasion |
T1070.006,T1070 |
Timestomp,Indicator Removal on Host, Indicator Removal on Host,Timestomp |
446 |
Signed Binary Proxy Execution - Network Detected |
Sysmon |
3 |
Defense Evasion |
T1218 |
Signed Binary Proxy Execution |
447 |
Suspicious Remote Thread Created |
Sysmon |
8 |
Privilege Escalation,Defense Evasion |
T1055 |
Process Injection |
448 |
Possible Privilege Escalation via Service Permissions Weakness |
Sysmon |
13 |
Privilege Escalation,Defense Evasion,Persistence |
T1574,T1574.011 |
Services Registry Permissions Weakness,Hijack Execution Flow,Service Registry Permissions Weakness |
449 |
DLL Loader Component Write Detected |
Sysmon |
11 |
|
|
|
450 |
Domain Trust Discovery Detected |
Sysmon |
1 |
Discovery |
T1482 |
Domain Trust Discovery |
451 |
MSHTA Spwaned by SVCHOST Detected |
Sysmon |
1 |
Defense Evasion,Execution |
T1218.005,T1218 |
Mshta, Mshta,Signed Binary Proxy Execution, Signed Binary Proxy Execution |
452 |
Windows AD Account Information Collection |
Security |
4688 |
Collection |
|
|
453 |
Accessibility Features - Registry |
Sysmon |
13,12,14 |
Privilege Escalation,Persistence |
T1546.008,T1546 |
Accessibility Features,Accessibility Features,Event Triggered Execution, Event Triggered Execution |
454 |
REvil Kaseya Incident Process Execution |
Security |
4688 |
Execution |
|
Sodinokibi,threat_actor: REvil |
455 |
Psexec Renamed SysInternals Tool Detected |
Sysmon |
1 |
Defense Evasion |
T1036,T1036.003 |
Rename System Utilities,Masquerading |
456 |
Windows Credential Editor Detected |
Sysmon |
1,13 |
Credential Access |
T1003 |
OS Credential Dumping,Credential Dumping |
457 |
Windows Persistence Using Scheduled Task via Telemetry |
Security |
4657 |
Privilege Escalation, Execution, Persistence |
T1053.005, T1053 |
Scheduled Task,Scheduled Task/Job |
458 |
Possible Access to ADMIN Share |
Security |
5140 |
Lateral Movement |
T1021,T1021.002 |
Remote Services,SMB/Windows Admin Shares |
459 |
Suspicious RDP Redirect Using TSCON Detected |
Sysmon |
1 |
Lateral Movement, Privilege Escalation |
T1021,T1021.001 |
Remote Services,Remote Services, Remote Desktop Protocol,Remote Desktop Protocol |
460 |
Time-Stomping of Users Directory Files Detected |
Sysmon |
2 |
Defense Evasion |
T1070.006,T1070 |
Timestomp,Indicator Removal on Host, Indicator Removal on Host,Timestomp |
461 |
Suspicious In-Memory Module Execution Detected |
Sysmon |
10 |
Privilege Escalation, Defense Evasion |
T1055 |
Process Injection |
462 |
Mitre Lateral Movement Using Remote Services Detected |
System |
7045 |
Lateral Movement |
T1210 |
Exploitation of Remote Services |
463 |
Advanced IP Scanner Execution |
Sysmon |
1 |
Discovery |
T1046 |
Network Service Scanning |
464 |
Suspicious Compression Tool Parameters |
Sysmon |
1 |
Exfiltration, Collection |
T1020,T1560 |
Automated Exfiltration, Archive Collected Data,Archive Collected Data, Data Compressed |
465 |
DCSync detected |
Security |
47,424,662 |
Credential Access |
T1003,T1003.006 |
DCSync,OS Credential Dumping |
466 |
SolarWinds Supply Chain Compromise Suspicious Process Creations |
Sysmon |
1 |
Initial Access |
T1195,T1195.002 |
Supply Chain Compromise, Compromise Software Supply Chain |
467 |
First Time Seen Remote Named Pipe |
Security |
5145 |
Lateral Movement |
T1021 |
Remote Services |
468 |
Fsutil Suspicious Invocation Detected |
Sysmon |
1 |
Defense Evasion |
T1070 |
Indicator Removal on Host |
469 |
Windows 10 Scheduled Task SandboxEscaper 0 day Detected |
Sysmon |
1 |
Privilege Escalation, Execution, Persistence |
T1053.005,T1053 |
Scheduled Task,Scheduled Task/Job, Scheduled Task |
470 |
Hidden Files and Directories - VSS Detected |
Sysmon |
1 |
Defense Evasion,Persistence |
T1564,T1564.001 |
Hidden Files and Directories, Hidden Files and Directories, Hide Artifacts,Hide Artifacts |
471 |
Printer Plugin Load Failed |
Microsoft-Windows-PrintService/ Operational |
808 |
Privilege Escalation |
T1068 |
Exploitation for Privilege Escalation |
472 |
Possible Kerberoasting via Rubeus |
Sysmon |
7 |
Credential Access |
T1558,T1558.003 |
Steal or Forge Kerberos Tickets,Kerberoasting |
473 |
Terminal Service Process Spawn Detected |
Sysmon |
1 |
Lateral Movement |
T1210 |
Exploitation of Remote Services |
474 |
Net exe User Account Creation |
Sysmon |
1 |
Credential Access,Persistence |
T1136 |
Create Account |
475 |
MSHTA Spawning Windows Shell Detected |
Sysmon |
1 |
Defense Evasion,Execution |
T1218.005,T1218 |
Mshta, Mshta,Signed Binary Proxy Execution, Signed Binary Proxy Execution |
476 |
Remote File Execution via MSIEXEC |
Sysmon |
1 |
Defense Evasion |
T1218.007,T1218 |
Msiexec,Signed Binary Proxy Execution |
477 |
System Service Discovery |
Sysmon |
1 |
Discovery |
T1007 |
System Service Discovery |
478 |
WCE wceaux dll Access Detected |
Security |
4656, 4660, 4658, 4660 |
Credential Access |
T1003 |
OS Credential Dumping,Credential Dumping |
479 |
Macro file Creation Detected |
Sysmon |
11 |
Execution |
T1059 |
Command and Scripting Interpreter |
480 |
Regsvr32 Network Activity |
Sysmon |
3,22 |
Defense Evasion |
T1218.010,T1218 |
Signed Binary Proxy Execution,Regsvr32 |
481 |
RDP Connection Inititated from Suspicious Country |
Microsoft-Windows-Terminal Services-Remote Connection Manager/ Operational |
1149 |
Privilege Escalation,Defense Evasion,Initial Access,Persistence |
T1078,T1078.002 |
Valid Accounts,Domain Accounts |
482 |
MS Office Product Spawning Exe in User Dir |
Sysmon |
1 |
Defense Evasion,Execution |
T1202,T1059 |
Indirect Command Execution,Command and Scripting Interpreter,Command-Line Interface |
483 |
PowerShell Downloads Process Executed |
Sysmon |
1 |
Execution |
T1059,T1059.001 |
PowerShell,Command and Scripting Interpreter,PowerShell, Command and Scripting Interpreter |
484 |
CobaltStrike Process Injection Detected |
Sysmon |
8 |
Privilege Escalation,Defense Evasion |
T1055 |
Process Injection |
485 |
Malicious Named Pipe Detected |
Sysmon |
18,17 |
Privilege Escalation,Defense Evasion |
T1055 |
Process Injection |
486 |
Execution of File Written or Modified by Microsoft Office |
Sysmon |
11,1 |
Initial Access |
T1566,T1566.001 |
Phishing,Spearphishing Attachment |
487 |
Windows Network Enumeration Detected |
Sysmon |
1 |
Discovery |
T1018 |
Remote System Discovery |
488 |
Password Policy Discovery |
Sysmon |
1 |
Discovery |
T1201 |
Password Policy Discovery |
489 |
Sticky Key Like Backdoor Usage Detected |
Sysmon |
1,13 |
Privilege Escalation, Persistence |
T1546.008,T1546 |
Accessibility Features,Accessibility Features,Event Triggered Execution, Event Triggered Execution |
490 |
SysKey Registry Keys Access |
Security |
46,564,663 |
Discovery |
T1012 |
Query Registry |
491 |
Weak Encryption Enabled and Kerberoast |
Security |
4738 |
Defense Evasion |
T1562.001,T1562 |
Disable or Modify Tools, Disable or Modify Tools,Impair Defenses |
492 |
VBA DLL Loaded by Office |
Sysmon |
7 |
Initial Access |
T1566,T1566.001 |
Phishing, Phishing,Spearphishing Attachment, Spearphishing Attachment |
493 |
WMI DLL Loaded by Office |
Sysmon |
7 |
Execution |
T1204.002,T1204 |
Malicious File,User Execution |
494 |
Safe DLL Search Mode Disabled |
Sysmon |
13 |
Defense Evasion |
T1562.001,T1562 |
Disable or Modify Tools,Indicator Blocking,Impair Defenses |
495 |
Discovery using Bloodhound Detected |
Sysmon |
3 |
Discovery |
T1033 |
System Owner/User Discovery |
496 |
Impacket PsExec Execution |
Security |
5145 |
Lateral Movement |
T1570 |
Lateral Tool Transfer |
497 |
Possible Taskmgr run as LOCAL_SYSTEM Detected |
Sysmon |
1 |
Defense Evasion |
T1036 |
Masquerading |
498 |
Windows Sysmon User Account Created |
Sysmon |
1 |
Persistence |
T1136 |
Create Account |
499 |
Indicator Blocking - Sysmon Registry Edited |
Sysmon |
13,12,14 |
Defense Evasion |
T1562.006,T1562 |
Impair Defenses,Indicator Blocking,Impair Defenses, Indicator Blocking |
500 |
Printer Driver Additon Detected |
Microsoft-Windows-PrintService/ Operational |
316 |
Privilege Escalation |
T1068 |
Exploitation for Privilege Escalation |
501 |
Suspicious Service Path Modification Detected |
Sysmon |
1 |
Persistence |
|
Modify Existing Service |
502 |
Malicious PowerShell Commandlet Names Detected |
Sysmon |
11 |
Execution |
T1059,T1059.001 |
PowerShell,Command and Scripting Interpreter,PowerShell, Command and Scripting Interpreter |
503 |
Mitre Collection Attack Using Automated Collection Detected |
Microsoft-Windows-PowerShell/ Operational |
4104 |
|
T1119 |
Automated Collection |
504 |
Suspicious GUP Usage Detected |
Sysmon |
1 |
Privilege Escalation,Defense Evasion,Persistence |
T1574,T1574.002 |
Hijack Execution Flow,Hijack Execution Flow,DLL Side-Loading, DLL Side-Loading |
505 |
Discovery of a System Time Detected |
Sysmon |
1 |
Discovery |
T1124 |
System Time Discovery |
506 |
Iranian APT Execution using Powershell |
Microsoft-Windows-PowerShell/ Operational |
4104 |
Execution |
T1059,T1059.001 |
PowerShell,Command and Scripting Interpreter,PowerShell, Command and Scripting Interpreter |
507 |
PowerShell Execution |
Sysmon |
1,17,7 |
Execution |
T1059,T1059.001 |
PowerShell,Command and Scripting Interpreter,PowerShell, Command and Scripting Interpreter |
508 |
SILENTTRINITY Stager Execution Detected |
Sysmon |
7 |
Execution |
T1569.002,T1569 |
Service Execution,System Services, System Services,Service Execution |
509 |
Windows User Local Group Enumeration |
Security |
4798 |
Discovery |
T1087.001,T1087 |
Local Account,Account Discovery |
510 |
NetNTLM Downgrade Attack Detected |
Sysmon, Security |
134,657 |
Defense Evasion |
T1562.001, T1112, T1562 |
Disable or Modify Tools,Modify Registry,Impair Defenses |
511 |
Indirect Command Execution Detected |
Sysmon |
1 |
Defense Evasion |
T1202 |
Indirect Command Execution |
512 |
Credential Dump Tools Dropped Files Detected |
Sysmon |
11 |
Credential Access |
T1003 |
OS Credential Dumping,Credential Dumping |
513 |
Mitre Credential Access Attack via Credential Dumping using Mimikatz |
Sysmon |
10 |
Credential Access,Persistence |
T1098 |
Account Manipulation |
514 |
Mimikatz through Windows Remote Management Detected |
Sysmon |
10 |
Lateral Movement, Credential Access, Execution |
T1021.006, T1003, T1021 |
Remote Services,Credential Dumping,Remote Services, Windows Remote Management,OS Credential Dumping,Windows Remote Management |
515 |
Psr Capture Screenshots Detected |
Sysmon |
1 |
Collection |
T1113 |
Screen Capture |
516 |
Possible Active Directory Enumeration via AD Module |
Microsoft-Windows-PowerShell/ Operational |
4103 |
Execution, Discovery |
T1018, T1059, T1059.001 |
Command and Scripting Interpreter,Remote System Discovery,PowerShell |
517 |
Proxy Execution of Payloads via Microsoft Signed Script |
Microsoft-Windows-PowerShell/ Operational |
4104 |
|
|
|
518 |
Automated Collection Detected |
Microsoft-Windows-PowerShell/ Operational |
4104 |
Collection |
T1119 |
Automated Collection |
519 |
Malicious File Execution Detected |
Sysmon |
1 |
Execution |
T1059 |
Command and Scripting Interpreter |
520 |
Windows User Rights Changes |
Security |
47,054,704 |
|
|
|
521 |
Judgement Panda Exfil Activity |
Sysmon |
1 |
Credential Access |
T1003, T1552.001, T1552 |
OS Credential Dumping,Credential Dumping,Credentials In Files,Unsecured Credentials,Credentials in Files |
522 |
Chafer Activity Detected |
System, Sysmon, Security |
7045, 4698, 13 |
Privilege Escalation, Execution, Persistence |
T1053.005, T1053 |
Scheduled Task,Scheduled Task/Job |
523 |
Suspicious Named Pipes Detected |
Sysmon |
18,17 |
Privilege Escalation, Privilege Escalation,Defense Evasion |
T1055 |
Process Injection |
524 |
Squirrel Lolbin Detected |
Sysmon |
1 |
Execution |
T1569.002,T1569 |
Service Execution,System Services, System Services,Service Execution |
525 |
Remotely Query Login Sessions - Process |
Sysmon |
1 |
Discovery |
T1082 |
System Information Discovery,Remote Query |
526 |
Remote PowerShell Session |
Sysmon, Microsoft-Windows-PowerShell/ Operational, Windows PowerShell |
14,103,400 |
Execution |
T1059,T1059.001 |
PowerShell,Command and Scripting Interpreter,PowerShell, Command and Scripting Interpreter |
527 |
Active Directory Replication User Backdoor |
Security |
5136 |
Defense Evasion |
T1222,T1222.001 |
Windows File and Directory Permissions Modification,File and Directory Permissions Modification |
528 |
Application Shimming - Registry Detected |
Sysmon |
13,12,14 |
Privilege Escalation, Persistence |
T1546,T1546.011 |
Application Shimming, Application Shimming,Event Triggered Execution, Event Triggered Execution |
529 |
Process Execution from Suspicious Location |
Security |
4688 |
|
|
|
530 |
Suspicious SYSVOL Domain Group Policy Access |
Sysmon |
1 |
Credential Access |
T1552.006,T1552 |
Group Policy Preferences,Unsecured Credentials |
531 |
Suspicious Computer Account Rename followed by TGT Request |
Security |
4768 |
Privilege Escalation |
T1134,T1134.003 |
Access Token Manipulation,Make and Impersonate Token |
532 |
Denied NetLogon Connections - CVE-2020-1472 |
Security |
58,285,827 |
Privilege Escalation |
T1068 |
Exploitation for Privilege Escalation |
533 |
Security Support Provider (SSP) Added to LSA Configuration |
Sysmon |
13 |
Exfiltration, Persistence |
T1011 |
Exfiltration Over Other Network Medium |
534 |
Audio Capture Detected |
Sysmon |
1 |
Collection |
T1123 |
Audio Capture |
535 |
Possible Data Exfiltration via FTP |
Sysmon |
3 |
Command and Control |
T1071.002 |
File Transfer Protocols |
536 |
CreateMiniDump Hacktool Detected |
Sysmon |
1,11 |
Credential Access |
T1003,T1003.001 |
OS Credential Dumping,LSASS Memory |
537 |
Credential Dumping using Mimikatz Detected |
Sysmon |
10 |
Credential Access |
T1003,T1003.001 |
OS Credential Dumping,LSASS Memory |
538 |
Alternate PowerShell Hosts Detected |
Sysmon, Microsoft-Windows-PowerShell/ Operational, Windows PowerShell |
4103, 17, 7, 400 |
Execution |
T1059,T1059.001 |
Command and Scripting Interpreter,PowerShell |
539 |
Transfering Files with Credential Data via Network Shares |
Security |
5145 |
Credential Access |
T1003 |
OS Credential Dumping,Credential Dumping |
540 |
smbexec Service Installation Detected |
System |
7045 |
Lateral Movement, Execution |
T1021, T1569.002, T1569 |
System Services,Remote Services,Service Execution |
541 |
IIS Native-Code Module Command Line Installation |
Sysmon |
1 |
Persistence |
T1505, T1505.003 |
Server Software Component, Server Software Component,Web Shell, Web Shell |
542 |
MSHTA - File Access Detected |
Sysmon |
11,15 |
Defense Evasion,Execution |
T1218.005,T1218 |
Mshta, Mshta,Signed Binary Proxy Execution, Signed Binary Proxy Execution |
543 |
Suspicious Kerberos S4U2self Request |
Security |
4769 |
Privilege Escalation |
T1134,T1134.003 |
Access Token Manipulation,Make and Impersonate Token |
544 |
Detection of PowerShell Execution via DLL |
Sysmon |
1 |
Execution |
T1059,T1059.001 |
PowerShell,Command and Scripting Interpreter,PowerShell, Command and Scripting Interpreter |
545 |
Defrag Deactivation Detected |
Sysmon, Security |
1, 4701 |
Privilege Escalation,Execution,Persistence |
T1053.005,T1053 |
Scheduled Task,Scheduled Task/Job, Scheduled Task |
546 |
ZOHO Dctask64 Process Injection Detected |
Sysmon |
1 |
Privilege Escalation,Defense Evasion |
T1055 |
Process Injection |
547 |
Command Obfuscation in Command Prompt |
Sysmon |
1 |
Execution |
T1059,T1059.003 |
Command and Scripting Interpreter,Windows Command Shell |
548 |
File or Folder Permissions Modifications |
Sysmon |
1 |
Defense Evasion |
T1222 |
File and Directory Permissions Modification |
549 |
LSASS Memory Dump File Creation |
Sysmon |
11 |
Credential Access |
T1003 |
OS Credential Dumping,Credential Dumping |
550 |
Tap Installer Execution Detected |
Sysmon |
1 |
Exfiltration |
T1048 |
Exfiltration Over Alternative Protocol |
551 |
Addition of SID History to Active Directory Object |
Security |
473, 847, 654, 766 |
Privilege Escalation,Defense Evasion,Persistence |
T1134,T1134.005 |
Access Token Manipulation, Access Token Manipulation, SID-History Injection,SID-History Injection |
552 |
External Disk Drive or USB Storage Device Detected |
Security |
6416 |
Lateral Movement,Initial Access |
T1091,T1200 |
Replication Through Removable Media,Hardware Additions |
553 |
Windows Error Process Masquerading |
Sysmon |
1,3 |
Defense Evasion |
T1055 |
Process Injection |
554 |
Remote PowerShell Session Detected |
Sysmon |
1 |
Execution |
T1059,T1059.001 |
PowerShell,Command and Scripting Interpreter,PowerShell, Command and Scripting Interpreter |
555 |
Shadow Copies Access via Symlink Detected |
Sysmon |
1 |
Credential Access |
T1003 |
OS Credential Dumping,Credential Dumping |
556 |
Suspicious Scheduled Task Creation via Masqueraded XML File |
Sysmon |
1 |
Defense Evasion, Execution, Persistence |
T1053.005, T1053, T1036 |
,Masquerading, Scheduled Task, Scheduled Task/Job, Scheduled Task |
557 |
Suspicious Program Location with Network Connections |
Sysmon |
3 |
Defense Evasion |
T1036 |
Masquerading |
558 |
GAC DLL Loaded Via Office Applications Detected |
Sysmon |
7 |
Initial Access |
T1566,T1566.001 |
Phishing, Phishing,Spearphishing Attachment, Spearphishing Attachment |
559 |
Remotely Query Login Sessions |
Sysmon |
1,3 |
Discovery |
T1082 |
System Information Discovery |
560 |
Hooking Activities Detected |
Sysmon |
1 |
Credential Access,Collection |
T1056.004,T1056 |
Credential API Hooking,Input Capture |
561 |
Whoami Execution Detected |
Sysmon |
1 |
Discovery |
T1033 |
System Owner/User Discovery |
562 |
Permission Groups Discovery - Process |
Sysmon |
1 |
Discovery |
T1069 |
Permission Groups Discovery |
563 |
TropicTrooper Campaign November 2018 Detected |
Sysmon |
1 |
Defense Evasion,Execution |
T1218.011,T1218 |
Rundll32, Rundll32,Signed Binary Proxy Execution, Signed Binary Proxy Execution |
564 |
PowerShell Module Logging Setting Discovery |
Sysmon |
13 |
Discovery |
T1012 |
Query Registry |
565 |
Control Panel Items - Registry Detected |
Sysmon |
13,12,14 |
Defense Evasion |
T1218.002,T1218 |
Control Panel, Control Panel,Signed Binary Proxy Execution |
566 |
Windows Registry Created |
Security |
4657 |
|
|
|
567 |
Elise Backdoor Detected |
Sysmon |
1 |
Privilege Escalation,Defense Evasion |
T1548 |
Bypass User Access Control,Abuse Elevation Control Mechanism |
568 |
User Added to Local Administrators Detected |
Security |
4732 |
Privilege Escalation,Defense Evasion,Initial Access,Persistence |
T1078 |
Valid Accounts |
569 |
RouterScan Execution |
Sysmon |
1 |
Discovery |
T1046 |
Network Service Scanning |
570 |
Remote Desktop Protocol - Process |
Sysmon |
13,12,14 |
Lateral Movement |
T1021,T1021.001 |
Remote Services,Remote Services, Remote Desktop Protocol,Remote Desktop Protocol |
571 |
Pandemic Registry Key Detected |
Sysmon |
1,13 |
Lateral Movement, Command and Control |
T1105 |
Remote File Copy,Ingress Tool Transfer |
572 |
InstallUtil Detected |
Sysmon |
3 |
Defense Evasion,Execution |
T1218.004,T1218 |
InstallUtil,Signed Binary Proxy Execution,InstallUtil, Signed Binary Proxy Execution |
573 |
Capture a Network Trace with netsh |
Sysmon |
1 |
Credential Access, Discovery |
T1040 |
Network Sniffing |
574 |
Suspicious Parent of Csc Detected |
Sysmon |
1 |
Defense Evasion |
T1036 |
Masquerading |
575 |
Credentials in Registry Detected |
Sysmon |
1 |
Credential Access |
T1552.002,T1552 |
Credentials in Registry,Unsecured Credentials, Unsecured Credentials,Credentials in Registry |
576 |
Suspicious Command Chain in Command Prompt |
Sysmon |
1 |
Defense Evasion,Execution |
T1059,T1059.003 |
Command and Scripting Interpreter,Windows Command Shell |
577 |
Exfiltration and Tunneling Tools Execution |
Sysmon |
1 |
Exfiltration |
T1020 |
Automated Exfiltration |
578 |
Authentication Package Detected |
Sysmon |
13,12,14 |
Privilege Escalation, Persistence |
T1547.002, T1547.005, T1547 |
Boot or Logon Autostart Execution, Authentication Package, Security Support Provider |
579 |
Execution via Windows Scripting Host Component Detected |
Sysmon |
7 |
Execution |
T1059 |
Command and Scripting Interpreter |
580 |
Possible Baby Shark Activity Detected |
Sysmon |
1 |
Defense Evasion, Execution, Discovery |
T1218.005, T1012, T1059, T1218, T1059.001 |
Signed Binary Proxy Execution, Mshta, Command and Scripting Interpreter, PowerShell, Query Registry |
581 |
Renamed ZOHO Dctask64 Detected |
Sysmon |
1 |
Privilege Escalation,Defense Evasion |
T1055 |
Process Injection |
582 |
Remote Service Activity via SVCCTL Named Pipe |
Security |
5145 |
Lateral Movement, Privilege Escalation, Execution, Persistence |
T1053.005, T1053 |
Scheduled Task,Scheduled Task/Job |
583 |
Winlogon Helper DLL |
Sysmon |
13,12,14 |
Privilege Escalation, Persistence |
T1547.004, T1547 |
Boot or Logon Autostart Execution,Boot or Logon Autostart Execution,Winlogon Helper DLL, Winlogon Helper DLL |
584 |
UAC Bypass Attempt via Windows Directory Masquerading |
Sysmon |
1 |
Privilege Escalation |
T1548, T1548.002 |
Bypass User Account Control,Abuse Elevation Control Mechanism |
585 |
Mimikatz Command Line Detected |
Sysmon |
1 |
Credential Access |
T1003 |
OS Credential Dumping,Credential Dumping |
586 |
CMSTP UAC Bypass via COM Object Access |
Sysmon |
1 |
Privilege Escalation,Defense Evasion,Execution |
T1218.003, T1548, T1218 |
Bypass User Access Control,Abuse Elevation Control Mechanism,Signed Binary Proxy Execution, CMSTP,CMSTP, Signed Binary Proxy Execution |
587 |
Possible Ursnif Registry Activity |
Sysmon |
13 |
Defense Evasion,Execution |
T1112 |
Modify Registry |
588 |
LSASS Memory Dumping Detected |
Sysmon |
1 |
Credential Access |
T1003 |
OS Credential Dumping,Credential Dumping |
589 |
Alternate PowerShell Hosts Module Load Detected |
Sysmon |
7 |
Execution |
T1059, T1059.001 |
PowerShell, Command and Scripting Interpreter, PowerShell, Command and Scripting Interpreter |