NON-MITRE ATT&CK Analytics

LP_Windows Login Attempt on Disabled Account

  • Trigger condition: A user attempts to log in using a disabled account.

  • ATT&CK Category: N/A

  • ATT&CK Tag: N/A

  • ATT&CK ID: N/A

  • Minimum Log Source Requirement: Windows

  • Query:

norm_id=WinServer* label=User label=Login label=Fail sub_status_code= "0xC0000072" -target_user=*−user = ∗-user IN EXCLUDED_USERS | rename user as target_user, domain as target_domain,reason as failure_reason
  • Trigger condition: VMware connection is up.

  • ATT&CK Category: N/A

  • ATT&CK Tag: N/A

  • ATT&CK ID: N/A

  • Minimum Log Source Requirement: VMware

  • Query:

norm_id=VmwareESX label = Link label=Up | chart count() by log_ts, host, switch, port_group, network_adapter
  • Trigger condition: VMmware’s connection is down.

  • ATT&CK Category: N/A

  • ATT&CK Tag: N/A

  • ATT&CK ID: N/A

  • Minimum Log Source Requirement: VMware

  • Query:

LP_LogPoint License Expiry Status

  • Trigger condition: Logpoint license is about to expire.

  • ATT&CK Category: N/A

  • ATT&CK Tag: N/A

  • ATT&CK ID: N/A

  • Minimum Log Source Requirement: Logpoint

  • Query:

  • Trigger condition: Malicious URL is detected.

  • ATT&CK Category: N/A

  • ATT&CK Tag: N/A

  • ATT&CK ID: N/A

  • Minimum Log Source Requirement: Mimecast

  • Query:

LP_Mitre Command and Control Using Standard Application Layer Protocol Detected

  • Trigger condition: Command and control activity using standard application layer protocol is detected.

  • ATT&CK Category: N/A

  • ATT&CK Tag: N/A

  • ATT&CK ID: N/A

  • Minimum Log Source Requirement: Proxy server

  • Query:

LP_Endpoint Protect Threat Content Detected

  • Trigger condition: Threat content is detected.

  • ATT&CK Category: N/A

  • ATT&CK Tag: N/A

  • ATT&CK ID: N/A

  • Minimum Log Source Requirement: Endpoint Protector

  • Query:

LP_Endpoint Protect Device Disconnect

  • Trigger condition: A USB device is disconnected.

  • ATT&CK Category: N/A

  • ATT&CK Tag: N/A

  • ATT&CK ID: N/A

  • Minimum Log Source Requirement: Endpoint Protector

  • Query:

LP_Endpoint Protect File Delete

  • Trigger condition: A file is deleted.

  • ATT&CK Category: N/A

  • ATT&CK Tag: N/A

  • ATT&CK ID: N/A

  • Minimum Log Source Requirement: Endpoint Protector

  • Query:

LP_Endpoint Protect File Copied To USB Device

  • Trigger condition: A file is copied to external USB drive.

  • ATT&CK Category: N/A

  • ATT&CK Tag: N/A

  • ATT&CK ID: N/A

  • Minimum Log Source Requirement: Endpoint Protector

  • Query:

LP_System Owner or User Discovery Process Detected

  • Trigger condition: An attack Discovery is performed using the attack technique System Owner or User Discovery.

  • ATT&CK Category: N/A

  • ATT&CK Tag: N/A

  • ATT&CK ID: N/A

  • Minimum Log Source Requirement: Windows

  • Query:

LP_System Services Discovery Detected

  • Trigger condition: An attack Discovery is performed using the attack technique System Service Discovery.

  • ATT&CK Category: N/A

  • ATT&CK Tag: N/A

  • ATT&CK ID: N/A

  • Minimum Log Source Requirement: Windows

  • Query:

LP_SolarisLDAP Password Spraying Attack Detected

  • Trigger condition: Password spraying attack is detected.

  • ATT&CK Category: N/A

  • ATT&CK Tag: N/A

  • ATT&CK ID: N/A

  • Minimum Log Source Requirement: Solaris LDAP

  • Query:

LP_Microsoft Defender AMSI Trigger

  • Trigger Condition: Logpoint detects Microsoft Defender with AMSI as the detection source.

  • ATT&CK Category: -

  • ATT&CK Tag: -

  • Minimum Log Source Requirement: Windows

  • Query:

LP_Petitpotam - Anonymous RPC and File Share

  • Trigger Condition: Events related to Petitpotam are logged.

  • Minimum Log Source Requirement: Windows

  • Query:

RDP Sensitive Settings Changed

  • Trigger Condition: Changes to RDP terminal service sensitive settings are detected.

  • Minimum Log Source Requirement: Windows

  • Query:

LP_Secure Deletion with SDelete

  • Trigger Condition: Renamed a file while deleting it with the SDelete tool. Adversaries use various tools to clean traces left after their intrusion activity.

  • Minimum Log Source Requirement: Windows

  • Query:

LP_Suspicious Keyboard Layout Load Detected

  • Trigger Condition: The keyboard preload installation with a suspicious keyboard layout, for example, Chinese, Iranian, or Vietnamese layout, loads in user sessions on systems that is maintained by US staff only.

  • Minimum Log Source Requirement: Windows Sysmon

  • Query:

LP_Remote Code Execution using WMI Win32_Process Class over WinRM

  • Trigger Condition: When an attempt to execute code or create a service on a remote host via winrm.vbs is detected.

  • Minimum Log Source Requirement: Windows Sysmon, Windows

  • Query:

Remote Code Execution using WMI Win32_Service Class over WinRM

  • Trigger Condition: Application Whitelisting Bypass and Arbitrary Unsigned Code Execution Technique is attempted using winrm.vbs.

  • Minimum Log Source Requirement: Windows Sysmon, Windows

  • Query:

LP_Suspicious Microsoft SQL Server PowerShell Module Use Detected

  • Trigger Condition: The execution of a PowerShell code by the sqlps.exe utility, which is included in the standard set of utilities supplied with the MSSQL Server is detected.

  • Minimum Log Source Requirement: Windows Sysmon, Windows

  • Query:

LP_Shadow Copy Deletion Using OS Utilities Detected

  • Trigger Condition: When shadow copies are deleted using operating systems utilities. Shadow copy is a Microsoft technology that can create backup copies or snapshots of computer files or volumes.

  • Minimum Log Source Requirement: Windows Sysmon, Windows

  • Query:

LP_Child Process Spawned via Diskshadow Detected

  • Trigger Condition: When child processes are created using the diskshadow binary. DiskShadow.exe is a Windows internal binary that exposes the functionality offered by the Volume Shadow Copy Service.

  • Minimum Log Source Requirement: Windows Sysmon, Windows

  • Query:

LP_Code Execution Via Diskshadow Detected

  • Trigger Condition: When diskshadow binary is used to execute code from a file. DiskShadow.exe is Windows internal binary that exposes the functionality offered by the Volume Shadow Copy Service.

  • Minimum Log Source Requirement: Windows Sysmon, Windows

  • Query:

LP_Process Pattern Match For CVE-2021-40444 Exploitation

  • Trigger Condition: The process pattern for CVE-2021-40444 is detected. CVE-22021-4044 is a remote code execution vulnerability in MSHTML, which is Microsoft’s proprietary browser engine for Internet Explorer.

  • Minimum Log Source Requirement: Windows Sysmon, Windows

  • Query:

Suspicious Extexport Execution Detected

  • Trigger Condition: When a service is created by loading a DLL using the ExtExport service in IE. ExtExport is a module that serves to import/export data from other programs, for example, favorites or bookmarks from other browsers. Attackers can use Extexport.exe to load any DLL using the built-in tool ExtExport.exe which can be found inside the Internet Explorer directory.

  • Minimum Log Source Requirement: Windows Sysmon, Windows

  • Query:

LP_Proxy Execution via Workfolders

  • Trigger Condition: This alert is triggered whenever it detects the usage of workfolders binary to execute other process.

  • Minimum Log Source Requirement: Windows Sysmon, Windows

  • Query:

Proxy Execution via Windows Update Client

  • Trigger Condition: When wuauclt.exe is used to proxy execute codes.

  • Minimum Log Source Requirement: Windows Sysmon, Windows

  • Query:

Suspicious DLL Execution Using Windows Address Book

  • Trigger Condition: When a suspicious DLL is executed using wab.exe.

  • ATT&CK Category: Defense Evasion

  • ATT&CK Tag: T1564.004 - NTFS File Attributes

  • Minimum Log Source Requirement: Windows Sysmon, Windows

  • Query:

LP_Suspicious Use of Dotnet Detected

  • Trigger Condition: This alert is triggered when execution of either suspicious DLL or unsigned code using dotnet.exe is detected.

  • Minimum Log Source Requirement: Windows Sysmon, Windows

  • Query:

Execution of Arbitrary Executable Using Stordiag

  • Trigger Condition: When a renamed arbitrary executable is executed using stordiag.exe. stordiag.exe collects storage and file system diagnostic logs and outputs to a folder.

  • Minimum Log Source Requirement: Windows Sysmon, Windows

  • Query:

Process Creation via Time Travel Tracer

  • Trigger Condition: When a new child process is spawned via tttracer.exe.

  • Minimum Log Source Requirement: Windows Sysmon, Windows

  • Query:

LP_Time Travel Debugging Utility DLL Loaded

  • Trigger Condition: This alert is triggered whenever time travel debugging utility DLLs are loaded. Ttdrecord.dll, ttdwriter.dll and ttdloader.dll are part of time travel debugging utility.

  • Minimum Log Source Requirement: Windows Sysmon

  • Query:

File Execution via Msdeploy

  • Trigger Condition: This alert is triggered whenever Msdeploy is used to execute files. Microsoft deploy (Msdeploy) is a binary that allows user to deploy Web Apllications.

  • Minimum Log Source Requirement: Windows Sysmon, Windows

  • Query:

CVE-2022-40684 Exploitation Detected

  • Trigger Condition: When an exploitation attempt of CVE-2022-40684 is detected. CVE-2022-40684 is an authentication bypass using an alternate path or channel vulnerability [CWE-288] in FortiOS, FortiProxy and FortiSwitchManager that may allow an unauthenticated attacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.

  • Minimum Log Source Requirement: Firewall, Proxy Server, Web Server

  • Query:

Possible Proxy Execution of Malicious Code

  • Trigger Condition: When the possible use of TE.exe for proxy execution of malicious scripts is detected. TE.exe is a testing tool included with Microsoft Test Authoring and Execution Framework (TAEF).

  • Minimum Log Source Requirement: Windows, Windows Sysmon

  • Query:

LP_Suspicious Usage of BitLocker Management Script

  • Trigger Condition: This alert is triggered whenever proxy execution of malicious payloads via Manage-bde.wsf is detected.

  • Minimum Log Source Requirement: Windows Sysmon, Windows

  • Query:

Proxy Execution of Payloads via Microsoft Signed Script

  • Trigger Condition: This alert rule is triggered when it detects proxy execution of PowerShell code via Microsoft signed script “CL_Mutexverifiers.ps1”.

  • Minimum Log Source Requirement: Windows

  • Query:

Execution of Windows Defender Offline Shell from Suspicious Folder

  • Trigger Condition: When OfflineScannerShell.exe is executed from a folder other than the default.

  • Minimum Log Source Requirement: Windows, Windows Sysmon

  • Query:

DLL Loaded Via AccCheckConsole

  • Trigger Condition: When DLL loading through AccCheckConsole binary is detected. AccCheckConsole is a command-line tool for verifying the accessibility implementation of your application’s UI. Adversaries can use this technique to load their malicious DLL.

  • Minimum Log Source Requirement: Windows Sysmon, Windows

  • Query:

LP_Proxy Execution via Appvlp

  • Trigger Condition: When proxy execution of binaries via appvlp.exe is detected. Appvlp, also known as Application Virtualization Utility, is included with Microsoft Office 2016, which makes applications available to end-user computers without having to install applications directly on those computers. Adversaries can use this technique to bypass process or signature-based defenses by proxying the execution of malicious content with signed or otherwise trusted binaries.

  • Minimum Log Source Requirement: Windows Sysmon, Windows

  • Query:

LP_Proxy DLL Execution via UtilityFunctions

  • Trigger Condition: When the use of UtilityFunctions script to execute a managed DLL is detected. UtilityFunctions is one of several powershell scripts from Microsoft for diagnostic and maintenance work. Adversaries can use this technique to proxy execute malicious files.

  • Minimum Log Source Requirement: Windows Sysmon, Windows

  • Query:

Suspicious Usage of Squirrel Binary

  • Trigger Condition: When squirrel.exe is run via using arguments download, update and updateRoolback arguments.

  • Minimum Log Source Requirement: Windows Sysmon, Windows

  • Query:

LP_Suspicious File Share Permission

  • Trigger Condition: This alert is triggered whenever it detects execution of binaries from suspicious folder.

  • Minimum Log Source Requirement: Windows Sysmon, Windows

  • Query:

LP_Legitimate Application Dropping Script File

  • Trigger Condition: When the creation of a new script file by those applications which should not create one such as office applications, Wordpad. Script files contain a set of instructions or commands and are executed by a script interpreter or runtime environment. Adversaries can use this technique to drop their payload in the system and execute it.

  • Minimum Log Source Requirement: Windows Sysmon

  • Query:

LP_Default Possible Non-PCI Compliant Inbound Network Traffic Detected

  • Trigger Condition: This alert is triggered whenever inbound connection is seen into secure devices over non-compliant ports as specified by PCI compliance practices. NON_PCI_COMPLIANT_PORT list needs to be updated for this query to work properly.

  • ATT&CK Category: N/A

  • ATT&CK Tag: N/A

  • ATT&CK ID: N/A

  • Minimum Log Source Requirement: Firewall, IDS, IPS

  • Query:

LP_High Severity EPP Alert

  • Trigger Condition: This alert is triggered whenever a high or critical severity alert is generated by any Endpoint Protection Platform (EPP).

  • Minimum Log Source Requirement: CrowdStrikeEPO, Microsoft Defender ATP, Trend Vision

  • Query:

LP_Medium Severity EPP Alert

  • Trigger Condition: This alert is triggered whenever a medium severity alert is generated by any Endpoint Protection Platform (EPP).

  • Minimum Log Source Requirement: CrowdStrikeEPO, Microsoft Defender ATP, Trend Vision

  • Query:

LP_Proxy Execution via Appvlp

  • Trigger Condition: This alert is triggered whenever proxy execution of binaries via appvlp.exe is detected.

  • Minimum Log Source Requirement: Windows Sysmon, Windows

  • Query:

LP_Suspicious Extexport Execution Detected

  • Trigger Condition: This alert is triggered when a service is created by loading a DLL using the ExtExport service in IE.

  • Minimum Log Source Requirement: Windows Sysmon, Windows

  • Query:

LP_Suspicious Usage of Squirrel Binary

  • Trigger Condition: This alert is triggered whenever squirrel.exe is run via using arguments download, update, and updateRoolback arguments.

  • Minimum Log Source Requirement: Windows Sysmon, Windows

  • Query:

LP_Threat Intel Connections with Suspicious Domains

  • Trigger Condition: This alert is triggered when a connection is established with suspicious domain.

  • Minimum Log Source Requirement: IDS, Firewall, IPS

  • Query:

Last updated

Was this helpful?