|
Cisco ASA - Logging Message Suppression
|
Cisco ASA Logs
|
Disable or Modify Windows Event Log
Indicator Removal
|
Anomaly
|
ArcaneDoor, Suspicious Cisco Adaptive Security Appliance Activity
|
2026-05-04
|
|
Cisco ASA - New Local User Account Created
|
Cisco ASA Logs
|
Local Account
Local Accounts
|
Anomaly
|
Suspicious Cisco Adaptive Security Appliance Activity
|
2026-04-15
|
|
Cisco ASA - User Account Deleted From Local Database
|
Cisco ASA Logs
|
Account Access Removal
Clear Mailbox Data
|
Anomaly
|
Suspicious Cisco Adaptive Security Appliance Activity
|
2026-04-15
|
|
Cisco ASA - User Privilege Level Change
|
Cisco ASA Logs
|
Local Accounts
Account Manipulation
|
Anomaly
|
ArcaneDoor, Suspicious Cisco Adaptive Security Appliance Activity
|
2026-04-15
|
|
Detect HTML Help Spawn Child Process
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Compiled HTML File
|
TTP
|
APT37 Rustonotto and FadeStealer, AgentTesla, Compromised Windows Host, Living Off The Land, Suspicious Compiled HTML Activity
|
2026-04-15
|
|
Email Attachments With Lots Of Spaces
|
|
Spearphishing Attachment
Masquerade File Type
|
Anomaly
|
Data Destruction, Emotet Malware DHS Report TA18-201A, Hermetic Wiper, Suspicious Emails
|
2026-03-25
|
|
ESXi Account Modified
|
VMWare ESXi Syslog
|
Local Account
Valid Accounts
Account Manipulation
|
Anomaly
|
Black Basta Ransomware, ESXi Post Compromise
|
2026-04-15
|
|
ESXi Audit Tampering
|
VMWare ESXi Syslog
|
Prevent Command History Logging
Indicator Removal
|
TTP
|
Black Basta Ransomware, ESXi Post Compromise
|
2026-05-04
|
|
ESXi External Root Login Activity
|
VMWare ESXi Syslog
|
Valid Accounts
|
Anomaly
|
Black Basta Ransomware, ESXi Post Compromise
|
2026-04-15
|
|
ESXi Shared or Stolen Root Account
|
VMWare ESXi Syslog
|
Valid Accounts
|
Anomaly
|
Black Basta Ransomware, ESXi Post Compromise
|
2026-04-15
|
|
ESXi System Clock Manipulation
|
VMWare ESXi Syslog
|
Timestomp
|
TTP
|
Black Basta Ransomware, ESXi Post Compromise
|
2026-04-15
|
|
ESXi User Granted Admin Role
|
VMWare ESXi Syslog
|
Account Manipulation
Valid Accounts
|
TTP
|
Black Basta Ransomware, ESXi Post Compromise
|
2026-04-15
|
|
M365 Copilot Application Usage Pattern Anomalies
|
M365 Copilot Graph API
|
Valid Accounts
|
Anomaly
|
Suspicious Microsoft 365 Copilot Activities
|
2026-04-15
|
|
M365 Copilot Session Origin Anomalies
|
M365 Copilot Graph API
|
Valid Accounts
|
Anomaly
|
Suspicious Microsoft 365 Copilot Activities
|
2026-03-10
|
|
Okta Authentication Failed During MFA Challenge
|
Okta
|
Cloud Accounts
Cloud Accounts
Multi-Factor Authentication Request Generation
|
TTP
|
Okta Account Takeover, Scattered Lapsus$ Hunters
|
2026-04-15
|
|
Okta New API Token Created
|
Okta
|
Default Accounts
|
TTP
|
Okta Account Takeover, Scattered Lapsus$ Hunters
|
2026-04-15
|
|
Okta Phishing Detection with FastPass Origin Check
|
Okta
|
Default Accounts
Modify Authentication Process
|
TTP
|
Okta Account Takeover
|
2026-03-10
|
|
Okta Risk Threshold Exceeded
|
Okta
|
Valid Accounts
Brute Force
|
Correlation
|
Okta Account Takeover, Okta MFA Exhaustion, Suspicious Okta Activity
|
2026-04-15
|
|
Okta Successful Single Factor Authentication
|
Okta
|
Cloud Accounts
Cloud Accounts
Multi-Factor Authentication Request Generation
|
Anomaly
|
Okta Account Takeover
|
2026-04-15
|
|
Okta Suspicious Activity Reported
|
Okta
|
Default Accounts
|
TTP
|
Okta Account Takeover
|
2026-04-15
|
|
Okta ThreatInsight Threat Detected
|
Okta
|
Cloud Accounts
|
Anomaly
|
Okta Account Takeover
|
2026-04-15
|
|
PingID Multiple Failed MFA Requests For User
|
PingID
|
Multi-Factor Authentication Request Generation
Valid Accounts
Brute Force
|
TTP
|
Compromised User Account
|
2026-04-15
|
|
Splunk User Enumeration Attempt
|
Splunk
|
Valid Accounts
|
TTP
|
Splunk Vulnerabilities
|
2025-05-02
|
|
Zoom High Video Latency
|
|
Valid Accounts
|
Anomaly
|
Remote Employment Fraud
|
2026-04-15
|
|
ASL AWS Create Policy Version to allow all resources
|
ASL AWS CloudTrail
|
Cloud Accounts
|
TTP
|
AWS IAM Privilege Escalation, Scattered Lapsus$ Hunters
|
2026-04-15
|
|
ASL AWS SAML Update identity provider
|
ASL AWS CloudTrail
|
Valid Accounts
|
TTP
|
Cloud Federated Credential Abuse
|
2026-04-15
|
|
AWS Bedrock Invoke Model Access Denied
|
AWS CloudTrail
|
Valid Accounts
Use Alternate Authentication Material
|
TTP
|
AWS Bedrock Security
|
2026-04-15
|
|
AWS Create Policy Version to allow all resources
|
AWS CloudTrail CreatePolicyVersion
|
Cloud Accounts
|
TTP
|
AWS IAM Privilege Escalation
|
2026-04-15
|
|
AWS SAML Update identity provider
|
AWS CloudTrail UpdateSAMLProvider
|
Valid Accounts
|
TTP
|
Cloud Federated Credential Abuse
|
2026-04-15
|
|
AWS SetDefaultPolicyVersion
|
AWS CloudTrail SetDefaultPolicyVersion
|
Cloud Accounts
|
TTP
|
AWS IAM Privilege Escalation
|
2026-04-15
|
|
AWS Successful Console Authentication From Multiple IPs
|
AWS CloudTrail ConsoleLogin
|
Compromise Accounts
Unused/Unsupported Cloud Regions
|
Anomaly
|
Compromised User Account, Suspicious AWS Login Activities
|
2026-04-15
|
|
AWS Successful Single-Factor Authentication
|
AWS CloudTrail ConsoleLogin
|
Cloud Accounts
Cloud Accounts
|
TTP
|
AWS Identity and Access Management Account Takeover
|
2026-04-15
|
|
Azure AD Authentication Failed During MFA Challenge
|
Azure Active Directory
|
Cloud Accounts
Cloud Accounts
Multi-Factor Authentication Request Generation
|
TTP
|
Azure Active Directory Account Takeover
|
2026-04-15
|
|
Azure AD Multiple AppIDs and UserAgents Authentication Spike
|
Azure Active Directory Sign-in activity
|
Valid Accounts
|
Anomaly
|
Azure Active Directory Account Takeover
|
2026-04-15
|
|
Azure AD Multiple Failed MFA Requests For User
|
Azure Active Directory Sign-in activity
|
Cloud Accounts
Cloud Accounts
Multi-Factor Authentication Request Generation
|
TTP
|
Azure Active Directory Account Takeover
|
2026-04-15
|
|
Azure AD Service Principal Authentication
|
Azure Active Directory Sign-in activity
|
Cloud Accounts
|
TTP
|
Azure Active Directory Account Takeover, NOBELIUM Group
|
2026-04-15
|
|
Azure AD Successful PowerShell Authentication
|
Azure Active Directory
|
Cloud Accounts
Cloud Accounts
|
TTP
|
Azure Active Directory Account Takeover
|
2026-04-15
|
|
Azure AD Successful Single-Factor Authentication
|
Azure Active Directory
|
Cloud Accounts
Cloud Accounts
|
TTP
|
Azure Active Directory Account Takeover
|
2026-04-15
|
|
Azure Runbook Webhook Created
|
Azure Audit Create or Update an Azure Automation webhook
|
Cloud Accounts
|
TTP
|
Azure Active Directory Persistence
|
2026-04-15
|
|
Cloud API Calls From Previously Unseen User Roles
|
AWS CloudTrail
|
Valid Accounts
|
Anomaly
|
Suspicious Cloud User Activities
|
2026-04-15
|
|
Cloud Compute Instance Created By Previously Unseen User
|
AWS CloudTrail
|
Cloud Accounts
|
Anomaly
|
Cloud Cryptomining
|
2026-04-15
|
|
Cloud Compute Instance Created In Previously Unused Region
|
AWS CloudTrail
|
Unused/Unsupported Cloud Regions
|
Anomaly
|
Cloud Cryptomining
|
2026-04-15
|
|
Cloud Instance Modified By Previously Unseen User
|
AWS CloudTrail
|
Cloud Accounts
|
Anomaly
|
Suspicious Cloud Instance Activities
|
2026-04-15
|
|
Cloud Provisioning Activity From Previously Unseen City
|
AWS CloudTrail
|
Valid Accounts
|
Anomaly
|
Suspicious Cloud Provisioning Activities
|
2026-04-15
|
|
Cloud Provisioning Activity From Previously Unseen Country
|
AWS CloudTrail
|
Valid Accounts
|
Anomaly
|
Suspicious Cloud Provisioning Activities
|
2026-04-15
|
|
Cloud Provisioning Activity From Previously Unseen IP Address
|
AWS CloudTrail
|
Valid Accounts
|
Anomaly
|
Suspicious Cloud Provisioning Activities
|
2026-04-15
|
|
Cloud Provisioning Activity From Previously Unseen Region
|
AWS CloudTrail
|
Valid Accounts
|
Anomaly
|
Suspicious Cloud Provisioning Activities
|
2026-04-15
|
|
Detect AWS Console Login by User from New City
|
AWS CloudTrail
|
Unused/Unsupported Cloud Regions
Cloud Accounts
|
Hunting
|
AWS Identity and Access Management Account Takeover, Compromised User Account, Suspicious AWS Login Activities, Suspicious Cloud Authentication Activities
|
2026-02-25
|
|
Detect AWS Console Login by User from New Country
|
AWS CloudTrail
|
Unused/Unsupported Cloud Regions
Cloud Accounts
|
Hunting
|
AWS Identity and Access Management Account Takeover, Compromised User Account, Suspicious AWS Login Activities, Suspicious Cloud Authentication Activities
|
2026-02-25
|
|
Detect AWS Console Login by User from New Region
|
AWS CloudTrail
|
Unused/Unsupported Cloud Regions
Cloud Accounts
|
Hunting
|
AWS Identity and Access Management Account Takeover, Compromised User Account, Suspicious AWS Login Activities, Suspicious Cloud Authentication Activities
|
2026-02-25
|
|
GCP Authentication Failed During MFA Challenge
|
Google Workspace login_failure
|
Cloud Accounts
Cloud Accounts
Multi-Factor Authentication Request Generation
|
TTP
|
GCP Account Takeover, Scattered Lapsus$ Hunters
|
2026-04-15
|
|
GCP Detect gcploit framework
|
|
Valid Accounts
|
TTP
|
GCP Cross Account Activity
|
2026-03-12
|
|
GCP Multiple Failed MFA Requests For User
|
Google Workspace
|
Cloud Accounts
Cloud Accounts
Multi-Factor Authentication Request Generation
|
TTP
|
GCP Account Takeover, Scattered Lapsus$ Hunters
|
2026-04-15
|
|
GCP Successful Single-Factor Authentication
|
Google Workspace
|
Cloud Accounts
Cloud Accounts
|
TTP
|
GCP Account Takeover, Scattered Lapsus$ Hunters
|
2026-04-15
|
|
Geographic Improbable Location
|
Okta
|
Valid Accounts
|
Anomaly
|
Remote Employment Fraud
|
2026-04-15
|
|
Microsoft Intune Device Health Scripts
|
Azure Monitor Activity
|
Software Deployment Tools
Cloud Services
Indirect Command Execution
Ingress Tool Transfer
|
Hunting
|
Azure Active Directory Account Takeover
|
2026-02-25
|
|
Microsoft Intune Mobile Apps
|
Azure Monitor Activity
|
Software Deployment Tools
Cloud Services
Indirect Command Execution
Ingress Tool Transfer
|
Hunting
|
Azure Active Directory Account Takeover
|
2026-02-25
|
|
O365 BEC Email Hiding Rule Created
|
|
Email Hiding Rules
|
TTP
|
Office 365 Account Takeover
|
2026-04-15
|
|
O365 Email Hard Delete Excessive Volume
|
Office 365 Universal Audit Log
|
Clear Mailbox Data
Data Destruction
|
Anomaly
|
Data Destruction, Office 365 Account Takeover, Suspicious Emails
|
2026-04-15
|
|
O365 Email New Inbox Rule Created
|
Office 365 Universal Audit Log
|
Email Forwarding Rule
Email Hiding Rules
|
Anomaly
|
Office 365 Collection Techniques
|
2026-04-15
|
|
O365 Email Password and Payroll Compromise Behavior
|
Office 365 Reporting Message Trace, Office 365 Universal Audit Log
|
Clear Mailbox Data
Data Destruction
Local Email Collection
|
TTP
|
Data Destruction, Office 365 Account Takeover, Office 365 Collection Techniques, Suspicious Emails
|
2026-04-15
|
|
O365 Email Receive and Hard Delete Takeover Behavior
|
Office 365 Reporting Message Trace, Office 365 Universal Audit Log
|
Clear Mailbox Data
Data Destruction
Local Email Collection
|
Anomaly
|
Data Destruction, Office 365 Account Takeover, Office 365 Collection Techniques, Suspicious Emails
|
2026-04-15
|
|
O365 Email Send and Hard Delete Exfiltration Behavior
|
Office 365 Reporting Message Trace, Office 365 Universal Audit Log
|
Local Email Collection
Clear Mailbox Data
Data Destruction
|
Anomaly
|
Data Destruction, Office 365 Account Takeover, Office 365 Collection Techniques, Suspicious Emails
|
2026-04-15
|
|
O365 Email Send and Hard Delete Suspicious Behavior
|
Office 365 Universal Audit Log
|
Local Email Collection
Clear Mailbox Data
Data Destruction
|
Anomaly
|
Data Destruction, Office 365 Account Takeover, Office 365 Collection Techniques, Suspicious Emails
|
2026-04-15
|
|
O365 Email Send Attachments Excessive Volume
|
Office 365 Universal Audit Log
|
Clear Mailbox Data
Data Destruction
|
Anomaly
|
Office 365 Account Takeover, Suspicious Emails
|
2026-04-15
|
|
O365 Email Transport Rule Changed
|
Office 365 Universal Audit Log
|
Email Forwarding Rule
Email Hiding Rules
|
Anomaly
|
Data Exfiltration, Office 365 Account Takeover
|
2026-04-15
|
|
O365 Multiple AppIDs and UserAgents Authentication Spike
|
O365 UserLoggedIn, O365 UserLoginFailed
|
Valid Accounts
|
Anomaly
|
Office 365 Account Takeover
|
2026-04-15
|
|
O365 Security And Compliance Alert Triggered
|
|
Cloud Accounts
|
TTP
|
Office 365 Account Takeover
|
2026-04-15
|
|
Okta Non-Standard VPN Usage
|
Okta
|
Valid Accounts
Protocol Tunneling
Proxy
|
TTP
|
Remote Employment Fraud, Suspicious Okta Activity
|
2026-04-15
|
|
Attacker Tools On Endpoint
|
Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
OS Credential Dumping
Match Legitimate Resource Name or Location
Active Scanning
|
TTP
|
CISA AA22-264A, Cisco Network Visibility Module Analytics, Compromised Windows Host, PHP-CGI RCE Attack on Japanese Organizations, SamSam Ransomware, Scattered Spider, Unusual Processes, XMRig
|
2026-04-15
|
|
BITS Job Persistence
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
BITS Jobs
|
TTP
|
BITS Jobs, Living Off The Land
|
2026-04-15
|
|
BITSAdmin Download File
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
BITS Jobs
Ingress Tool Transfer
|
TTP
|
APT37 Rustonotto and FadeStealer, BITS Jobs, DarkSide Ransomware, Flax Typhoon, GhostRedirector IIS Module and Rungan Backdoor, Gozi Malware, Hellcat Ransomware, Ingress Tool Transfer, Living Off The Land, Scattered Spider
|
2026-04-15
|
|
CertUtil With Decode Argument
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Deobfuscate/Decode Files or Information
|
TTP
|
APT29 Diplomatic Deceptions with WINELOADER, Deobfuscate-Decode Files or Information, Forest Blizzard, GhostRedirector IIS Module and Rungan Backdoor, Living Off The Land, Storm-2460 CLFS Zero Day Exploitation
|
2026-04-15
|
|
Cisco NVM - Curl Execution With Insecure Flags
|
Cisco Network Visibility Module Flow Data
|
BITS Jobs
|
Anomaly
|
Cisco Network Visibility Module Analytics, Microsoft WSUS CVE-2025-59287, PromptLock
|
2026-04-15
|
|
Cisco NVM - MSHTML or MSHTA Network Execution Without URL in CLI
|
Cisco Network Visibility Module Flow Data
|
Mshta
Visual Basic
|
Anomaly
|
BlankGrabber Stealer, Cisco Network Visibility Module Analytics
|
2026-04-15
|
|
Cisco NVM - Non-Network Binary Making Network Connection
|
Cisco Network Visibility Module Flow Data
|
Process Injection
Masquerading
|
Anomaly
|
Cisco Network Visibility Module Analytics
|
2026-04-15
|
|
Cisco NVM - Rundll32 Abuse of MSHTML.DLL for Payload Download
|
Cisco Network Visibility Module Flow Data
|
Mshta
|
Anomaly
|
Cisco Network Visibility Module Analytics
|
2026-04-15
|
|
Cisco NVM - Suspicious Download From File Sharing Website
|
Cisco Network Visibility Module Flow Data
|
BITS Jobs
|
Anomaly
|
APT37 Rustonotto and FadeStealer, BlankGrabber Stealer, Cisco Network Visibility Module Analytics
|
2026-04-15
|
|
Cisco NVM - Suspicious Network Connection From Process With No Args
|
Cisco Network Visibility Module Flow Data
|
Process Injection
System Binary Proxy Execution
|
Anomaly
|
Cisco Network Visibility Module Analytics
|
2026-04-15
|
|
Cisco NVM - Suspicious Network Connection Initiated via MsXsl
|
Cisco Network Visibility Module Flow Data
|
XSL Script Processing
|
Anomaly
|
Cisco Network Visibility Module Analytics
|
2026-04-15
|
|
Clear Unallocated Sector Using Cipher App
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
File Deletion
|
TTP
|
Compromised Windows Host, Ransomware, Scattered Spider
|
2026-04-15
|
|
CMLUA Or CMSTPLUA UAC Bypass
|
Sysmon EventID 7
|
CMSTP
|
TTP
|
DarkSide Ransomware, LockBit Ransomware, Ransomware, ValleyRAT
|
2026-04-15
|
|
Control Loading from World Writable Directory
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Control Panel
|
TTP
|
Compromised Windows Host, Living Off The Land, Microsoft MSHTML Remote Code Execution CVE-2021-40444
|
2026-04-15
|
|
Create or delete windows shares using net exe
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Network Share Connection Removal
|
TTP
|
CISA AA22-277A, DarkGate Malware, Hidden Cobra Malware, Prestige Ransomware, Windows Post-Exploitation
|
2026-04-15
|
|
Create Remote Thread In Shell Application
|
Sysmon EventID 8
|
Process Injection
|
TTP
|
IcedID, Qakbot, Warzone RAT
|
2026-04-15
|
|
CSC Net On The Fly Compilation
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Compile After Delivery
|
Hunting
|
Windows Defense Evasion Tactics
|
2026-02-25
|
|
Curl Execution with Percent Encoded URL
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Sysmon for Linux EventID 1, Windows Event Log Security 4688
|
Obfuscated Files or Information
Ingress Tool Transfer
|
Anomaly
|
Compromised Windows Host, Ingress Tool Transfer, Living Off The Land
|
2026-04-28
|
|
Detect Excessive Account Lockouts From Endpoint
|
|
Domain Accounts
|
Anomaly
|
Active Directory Password Spraying
|
2026-04-15
|
|
Detect Excessive User Account Lockouts
|
|
Local Accounts
|
Anomaly
|
Active Directory Password Spraying, Scattered Lapsus$ Hunters
|
2026-04-15
|
|
Detect HTML Help Renamed
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Compiled HTML File
|
Hunting
|
APT37 Rustonotto and FadeStealer, Living Off The Land, Suspicious Compiled HTML Activity
|
2026-02-25
|
|
Detect HTML Help URL in Command Line
|
Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Compiled HTML File
|
TTP
|
APT37 Rustonotto and FadeStealer, Cisco Network Visibility Module Analytics, Compromised Windows Host, Living Off The Land, Suspicious Compiled HTML Activity
|
2026-04-15
|
|
Detect HTML Help Using InfoTech Storage Handlers
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Compiled HTML File
|
TTP
|
APT37 Rustonotto and FadeStealer, Compromised Windows Host, Living Off The Land, Suspicious Compiled HTML Activity
|
2026-04-15
|
|
Detect mshta inline hta execution
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Mshta
|
TTP
|
APT37 Rustonotto and FadeStealer, BlankGrabber Stealer, Compromised Windows Host, Gozi Malware, Living Off The Land, Suspicious MSHTA Activity, XWorm
|
2026-04-15
|
|
Detect mshta renamed
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Mshta
|
Hunting
|
APT37 Rustonotto and FadeStealer, Living Off The Land, Suspicious MSHTA Activity
|
2026-02-25
|
|
Detect MSHTA Url in Command Line
|
Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Mshta
|
TTP
|
APT37 Rustonotto and FadeStealer, Cisco Network Visibility Module Analytics, Compromised Windows Host, Living Off The Land, Lumma Stealer, NetSupport RMM Tool Abuse, Suspicious MSHTA Activity, XWorm
|
2026-04-15
|
|
Detect Path Interception By Creation Of program exe
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Path Interception by Unquoted Path
|
TTP
|
Scattered Lapsus$ Hunters, Windows Persistence Techniques
|
2026-04-15
|
|
Detect Regasm Spawning a Process
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Regsvcs/Regasm
|
TTP
|
Compromised Windows Host, DarkGate Malware, Handala Wiper, Living Off The Land, Snake Keylogger, Suspicious Regsvcs Regasm Activity, Void Manticore
|
2026-04-15
|
|
Detect Regasm with Network Connection
|
Sysmon EventID 3
|
Regsvcs/Regasm
|
TTP
|
Handala Wiper, Hellcat Ransomware, Living Off The Land, Suspicious Regsvcs Regasm Activity, Void Manticore
|
2026-04-15
|
|
Detect Regasm with no Command Line Arguments
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Regsvcs/Regasm
|
TTP
|
Handala Wiper, Living Off The Land, Suspicious Regsvcs Regasm Activity, Void Manticore
|
2026-04-15
|
|
Detect Regsvcs Spawning a Process
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Regsvcs/Regasm
|
TTP
|
Compromised Windows Host, Living Off The Land, Suspicious Regsvcs Regasm Activity
|
2026-04-15
|
|
Detect Regsvcs with Network Connection
|
Sysmon EventID 3
|
Regsvcs/Regasm
|
TTP
|
Hellcat Ransomware, Living Off The Land, Suspicious Regsvcs Regasm Activity
|
2026-04-15
|
|
Detect Regsvcs with No Command Line Arguments
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Regsvcs/Regasm
|
TTP
|
Living Off The Land, Suspicious Regsvcs Regasm Activity
|
2026-04-15
|
|
Detect Regsvr32 Application Control Bypass
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Regsvr32
|
TTP
|
BlackByte Ransomware, Cobalt Strike, Compromised Windows Host, Graceful Wipe Out Attack, Living Off The Land, PHP-CGI RCE Attack on Japanese Organizations, Suspicious Regsvr32 Activity
|
2026-04-15
|
|
Detect RTLO In File Name
|
Sysmon EventID 11
|
Right-to-Left Override
|
TTP
|
Spearphishing Attachments
|
2026-04-15
|
|
Detect RTLO In Process
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Right-to-Left Override
|
TTP
|
Spearphishing Attachments
|
2026-04-15
|
|
Detect Rundll32 Inline HTA Execution
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Mshta
|
TTP
|
APT37 Rustonotto and FadeStealer, Living Off The Land, NOBELIUM Group, Suspicious MSHTA Activity
|
2026-04-15
|
|
Disable Show Hidden Files
|
Sysmon EventID 13
|
Modify Registry
Disable or Modify Tools
Hidden Files and Directories
|
Anomaly
|
Azorult, Windows Defense Evasion Tactics, Windows Registry Abuse
|
2026-05-04
|
|
DLLHost with no Command Line Arguments with Network
|
Sysmon EventID 1, Sysmon EventID 3
|
Process Injection
|
TTP
|
BlackByte Ransomware, Cactus Ransomware, Cobalt Strike, Earth Alux, Graceful Wipe Out Attack, Storm-2460 CLFS Zero Day Exploitation
|
2026-04-15
|
|
ETW Registry Disabled
|
Sysmon EventID 13
|
Trusted Developer Utilities Proxy Execution
Disable or Modify Tools
|
TTP
|
CISA AA23-347A, Data Destruction, Hermetic Wiper, Windows Persistence Techniques, Windows Privilege Escalation, Windows Registry Abuse
|
2026-05-04
|
|
Executables Or Script Creation In Suspicious Path
|
Sysmon EventID 11
|
Masquerading
|
Anomaly
|
AcidPour, AgentTesla, Amadey, AsyncRAT, Axios Supply Chain Post Compromise, Azorult, BlackByte Ransomware, Brute Ratel C4, CISA AA23-347A, Cactus Ransomware, Castle RAT, Chaos Ransomware, China-Nexus Threat Activity, Crypto Stealer, DarkCrystal RAT, DarkGate Malware, Data Destruction, Derusbi, Double Zero Destructor, DynoWiper, Earth Alux, GhostRedirector IIS Module and Rungan Backdoor, Graceful Wipe Out Attack, Handala Wiper, Hermetic Wiper, IcedID, Industroyer2, Interlock Ransomware, Interlock Rat, LockBit Ransomware, Lokibot, Meduza Stealer, MoonPeak, NailaoLocker Ransomware, NjRAT, PlugX, PromptLock, Qakbot, Quasar RAT, RedLine Stealer, Remcos, Rhysida Ransomware, Salt Typhoon, SesameOp, Snake Keylogger, SnappyBee, Swift Slicer, SystemBC, Trickbot, VIP Keylogger, ValleyRAT, Void Manticore, Volt Typhoon, Warzone RAT, WhisperGate, WinDealer RAT, XML Runner Loader, XMRig
|
2026-04-21
|
|
Executables Or Script Creation In Temp Path
|
Sysmon EventID 11
|
Masquerading
|
Anomaly
|
APT37 Rustonotto and FadeStealer, AcidPour, AgentTesla, Amadey, AsyncRAT, Axios Supply Chain Post Compromise, Azorult, BlackByte Ransomware, Brute Ratel C4, CISA AA23-347A, Chaos Ransomware, China-Nexus Threat Activity, Crypto Stealer, DarkCrystal RAT, DarkGate Malware, Data Destruction, Derusbi, Double Zero Destructor, Graceful Wipe Out Attack, Handala Wiper, Hermetic Wiper, IcedID, Industroyer2, Interlock Rat, LockBit Ransomware, Lokibot, Meduza Stealer, MoonPeak, NjRAT, PlugX, PromptFlux, PromptLock, Qakbot, RedLine Stealer, Remcos, Rhysida Ransomware, Salt Typhoon, SesameOp, Snake Keylogger, SnappyBee, Swift Slicer, Trickbot, VIP Keylogger, ValleyRAT, Void Manticore, Volt Typhoon, Warzone RAT, WhisperGate, WinDealer RAT, XML Runner Loader, XMRig
|
2026-04-21
|
|
Execution of File with Multiple Extensions
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Rename Legitimate Utilities
|
TTP
|
AsyncRAT, DarkGate Malware, Masquerading - Rename System Utilities, Windows File Extension and Association Abuse
|
2026-04-15
|
|
Fsutil Zeroing File
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Indicator Removal
|
TTP
|
LockBit Ransomware, Ransomware
|
2026-04-15
|
|
GitHub Workflow File Creation or Modification
|
Sysmon EventID 11, Sysmon for Linux EventID 11
|
Dynamic Linker Hijacking
Compromise Host Software Binary
Supply Chain Compromise
|
Hunting
|
NPM Supply Chain Compromise
|
2025-11-25
|
|
GPUpdate with no Command Line Arguments with Network
|
Sysmon EventID 1, Sysmon EventID 3
|
Process Injection
|
TTP
|
BlackByte Ransomware, Cobalt Strike, Compromised Windows Host, Graceful Wipe Out Attack, Hellcat Ransomware
|
2026-04-09
|
|
Headless Browser Mockbin or Mocky Request
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Hidden Window
|
TTP
|
Forest Blizzard, GhostRedirector IIS Module and Rungan Backdoor
|
2026-04-15
|
|
Headless Browser Usage
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Virtualization/Sandbox Evasion
Hidden Window
|
Anomaly
|
Browser Hijacking, Forest Blizzard
|
2026-04-15
|
|
Linux Account Manipulation Of SSH Config and Keys
|
Sysmon for Linux EventID 11
|
File Deletion
Data Destruction
|
Anomaly
|
AcidRain, Hellcat Ransomware
|
2026-04-15
|
|
Linux Auditd AI CLI Permission Override Activated
|
Linux Auditd Proctitle
|
Execution Guardrails
|
Anomaly
|
QuietVault
|
2026-04-15
|
|
Linux Auditd Base64 Decode Files
|
Linux Auditd Execve
|
Deobfuscate/Decode Files or Information
|
Anomaly
|
Compromised Linux Host, Linux Living Off The Land, Linux Persistence Techniques, Linux Privilege Escalation
|
2026-04-15
|
|
Linux Auditd Kernel Module Enumeration
|
Linux Auditd Syscall
|
System Information Discovery
Rootkit
|
Anomaly
|
Compromised Linux Host, Linux Rootkit, XorDDos
|
2026-04-15
|
|
Linux Auditd Preload Hijack Library Calls
|
Linux Auditd Execve
|
Dynamic Linker Hijacking
|
TTP
|
China-Nexus Threat Activity, Compromised Linux Host, Linux Persistence Techniques, Linux Privilege Escalation, Salt Typhoon
|
2026-04-15
|
|
Linux Auditd Preload Hijack Via Preload File
|
Linux Auditd Cwd, Linux Auditd Path
|
Dynamic Linker Hijacking
|
TTP
|
Compromised Linux Host, Linux Living Off The Land, Linux Persistence Techniques, Linux Privilege Escalation, VoidLink Cloud-Native Linux Malware
|
2026-04-15
|
|
Linux Decode Base64 to Shell
|
Cisco Isovalent Process Exec, Sysmon for Linux EventID 1
|
Obfuscated Files or Information
Unix Shell
|
TTP
|
Cisco Isovalent Suspicious Activity, Linux Living Off The Land
|
2026-04-15
|
|
Linux Deletion Of Cron Jobs
|
Sysmon for Linux EventID 11
|
File Deletion
Data Destruction
|
Anomaly
|
AcidPour, AcidRain, Data Destruction
|
2026-04-15
|
|
Linux Deletion Of Init Daemon Script
|
Sysmon for Linux EventID 11
|
File Deletion
Data Destruction
|
TTP
|
AcidPour, AcidRain, Data Destruction
|
2026-04-15
|
|
Linux Deletion Of Services
|
Sysmon for Linux EventID 11
|
File Deletion
Data Destruction
|
TTP
|
AcidPour, AcidRain, AwfulShred, Data Destruction
|
2026-04-15
|
|
Linux Deletion of SSL Certificate
|
Sysmon for Linux EventID 11
|
File Deletion
Data Destruction
|
Anomaly
|
AcidPour, AcidRain
|
2026-04-15
|
|
Linux High Frequency Of File Deletion In Boot Folder
|
Sysmon for Linux EventID 11
|
File Deletion
Data Destruction
|
TTP
|
AcidPour, Data Destruction, Industroyer2
|
2026-04-15
|
|
Linux High Frequency Of File Deletion In Etc Folder
|
Sysmon for Linux EventID 11
|
File Deletion
Data Destruction
|
Anomaly
|
AcidRain, Data Destruction
|
2026-04-15
|
|
Linux Indicator Removal Clear Cache
|
Sysmon for Linux EventID 1
|
Indicator Removal
|
TTP
|
AwfulShred, Data Destruction
|
2026-04-15
|
|
Linux Indicator Removal Service File Deletion
|
Sysmon for Linux EventID 1
|
File Deletion
|
Anomaly
|
AwfulShred, Data Destruction
|
2026-04-15
|
|
Linux Kernel Module Enumeration
|
Sysmon for Linux EventID 1
|
System Information Discovery
Rootkit
|
Anomaly
|
Linux Rootkit, XorDDos
|
2026-04-15
|
|
Linux Kworker Process In Writable Process Path
|
Sysmon for Linux EventID 1
|
Masquerade Task or Service
|
Hunting
|
Cyclops Blink, Sandworm Tools
|
2026-02-25
|
|
Linux Medusa Rootkit
|
Sysmon for Linux EventID 11
|
Rootkit
Credentials
|
TTP
|
China-Nexus Threat Activity, Hellcat Ransomware, Medusa Rootkit, VoidLink Cloud-Native Linux Malware
|
2026-04-15
|
|
Linux Obfuscated Files or Information Base64 Decode
|
Sysmon for Linux EventID 1
|
Obfuscated Files or Information
|
Anomaly
|
Linux Living Off The Land
|
2026-04-15
|
|
Linux Preload Hijack Library Calls
|
Sysmon for Linux EventID 1
|
Dynamic Linker Hijacking
|
TTP
|
China-Nexus Threat Activity, Linux Persistence Techniques, Linux Privilege Escalation, Salt Typhoon, VoidLink Cloud-Native Linux Malware
|
2026-04-15
|
|
Loading Of Dynwrapx Module
|
Sysmon EventID 7
|
Dynamic-link Library Injection
|
TTP
|
AsyncRAT, Remcos
|
2026-04-15
|
|
LOLBAS With Network Traffic
|
Sysmon EventID 3
|
Ingress Tool Transfer
Exfiltration Over Web Service
System Binary Proxy Execution
|
TTP
|
APT37 Rustonotto and FadeStealer, Fake CAPTCHA Campaigns, GhostRedirector IIS Module and Rungan Backdoor, Hellcat Ransomware, Living Off The Land, Malicious Inno Setup Loader, NetSupport RMM Tool Abuse, Water Gamayun
|
2026-04-15
|
|
MacOS Hidden Files and Directories
|
Osquery Results
|
Hidden Files and Directories
|
Anomaly
|
MacOS Persistence Techniques
|
2026-04-15
|
|
MacOS Log Removal
|
Osquery Results
|
Indicator Removal
|
TTP
|
MacOS Post-Exploitation
|
2026-04-15
|
|
Malicious InProcServer32 Modification
|
Sysmon EventID 12, Sysmon EventID 13
|
Regsvr32
Modify Registry
|
TTP
|
Remcos, Suspicious Regsvr32 Activity
|
2026-04-15
|
|
Malicious PowerShell Process - Encoded Command
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Obfuscated Files or Information
|
Hunting
|
CISA AA22-320A, Crypto Stealer, DarkCrystal RAT, Data Destruction, GhostRedirector IIS Module and Rungan Backdoor, Hermetic Wiper, Lumma Stealer, Malicious PowerShell, Microsoft SharePoint Vulnerabilities, Microsoft WSUS CVE-2025-59287, NOBELIUM Group, Qakbot, Sandworm Tools, Scattered Spider, SolarWinds WHD RCE Post Exploitation, Volt Typhoon, WhisperGate
|
2026-03-25
|
|
Mmc LOLBAS Execution Process Spawn
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Distributed Component Object Model
MMC
|
TTP
|
Active Directory Lateral Movement, Living Off The Land, Water Gamayun, XML Runner Loader
|
2026-04-15
|
|
MSBuild Suspicious Spawned By Script Process
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
MSBuild
|
TTP
|
Storm-2460 CLFS Zero Day Exploitation, Trusted Developer Utilities Proxy Execution MSBuild
|
2026-05-04
|
|
Mshta spawning Rundll32 OR Regsvr32 Process
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Mshta
|
TTP
|
APT37 Rustonotto and FadeStealer, IcedID, Living Off The Land, Trickbot
|
2026-04-15
|
|
MSI Module Loaded by Non-System Binary
|
Sysmon EventID 7
|
DLL
|
Hunting
|
Data Destruction, Hermetic Wiper, Windows Privilege Escalation
|
2025-05-02
|
|
Msmpeng Application DLL Side Loading
|
Sysmon EventID 11
|
DLL
|
TTP
|
Ransomware, Revil Ransomware
|
2026-04-15
|
|
Notepad with no Command Line Arguments
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Process Injection
|
TTP
|
BishopFox Sliver Adversary Emulation Framework
|
2026-04-15
|
|
Ping Sleep Batch Command
|
CrowdStrike ProcessRollup2, Sysmon EventID 1
|
Time Based Checks
|
Anomaly
|
BlackByte Ransomware, Data Destruction, Gh0st RAT, Meduza Stealer, Quasar RAT, Void Manticore, Warzone RAT, WhisperGate
|
2026-04-15
|
|
Possible Lateral Movement PowerShell Spawn
|
CrowdStrike ProcessRollup2, Sysmon EventID 1
|
Distributed Component Object Model
Windows Remote Management
Windows Management Instrumentation
Scheduled Task
PowerShell
MMC
Windows Service
|
Anomaly
|
Active Directory Lateral Movement, CISA AA24-241A, Data Destruction, Hermetic Wiper, Malicious PowerShell, Microsoft WSUS CVE-2025-59287, Scheduled Tasks
|
2026-04-15
|
|
Potential password in username
|
Linux Secure
|
Local Accounts
Credentials In Files
|
Hunting
|
Credential Dumping, Insider Threat
|
2026-02-25
|
|
Powershell Creating Thread Mutex
|
Powershell Script Block Logging 4104
|
Indicator Removal from Tools
PowerShell
|
TTP
|
Malicious PowerShell, Water Gamayun
|
2026-04-15
|
|
Powershell Enable SMB1Protocol Feature
|
Powershell Script Block Logging 4104
|
Indicator Removal from Tools
|
TTP
|
Data Destruction, Hermetic Wiper, Malicious PowerShell, Ransomware
|
2026-04-15
|
|
Powershell Fileless Process Injection via GetProcAddress
|
Powershell Script Block Logging 4104
|
Process Injection
PowerShell
|
TTP
|
Data Destruction, Hellcat Ransomware, Hermetic Wiper, Malicious PowerShell
|
2026-04-15
|
|
Powershell Fileless Script Contains Base64 Encoded Content
|
Powershell Script Block Logging 4104
|
Obfuscated Files or Information
PowerShell
|
TTP
|
0bj3ctivity Stealer, APT37 Rustonotto and FadeStealer, AsyncRAT, Axios Supply Chain Post Compromise, Data Destruction, GhostRedirector IIS Module and Rungan Backdoor, Hellcat Ransomware, Hermetic Wiper, IcedID, Malicious PowerShell, Medusa Ransomware, Microsoft WSUS CVE-2025-59287, MuddyWater, NetSupport RMM Tool Abuse, NjRAT, VIP Keylogger, Winter Vivern, XWorm
|
2026-04-21
|
|
PowerShell PInvoke Process Injection API Chain
|
Powershell Script Block Logging 4104
|
Dynamic-link Library Injection
Thread Execution Hijacking
Asynchronous Procedure Call
Process Hollowing
Process Doppelgänging
PowerShell
Reflective Code Loading
|
TTP
|
VIP Keylogger
|
2026-04-22
|
|
Powershell Remote Thread To Known Windows Process
|
Sysmon EventID 8
|
Process Injection
|
TTP
|
Trickbot
|
2026-04-15
|
|
PowerShell Start-BitsTransfer
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
BITS Jobs
|
TTP
|
BITS Jobs, Gozi Malware
|
2026-04-15
|
|
PowerShell WebRequest Using Memory Stream
|
Powershell Script Block Logging 4104
|
PowerShell
Ingress Tool Transfer
Fileless Storage
|
TTP
|
Malicious PowerShell, Medusa Ransomware, MoonPeak, PHP-CGI RCE Attack on Japanese Organizations
|
2026-04-15
|
|
Process Deleting Its Process File Path
|
Sysmon EventID 1
|
Indicator Removal
|
TTP
|
Clop Ransomware, Data Destruction, Remcos, WhisperGate
|
2026-04-15
|
|
Recursive Delete of Directory In Batch CMD
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
File Deletion
|
TTP
|
APT37 Rustonotto and FadeStealer, Ransomware
|
2026-04-15
|
|
Reg exe Manipulating Windows Services Registry Keys
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Services Registry Permissions Weakness
|
TTP
|
Living Off The Land, Windows Persistence Techniques, Windows Service Abuse
|
2026-04-15
|
|
Regsvr32 Silent and Install Param Dll Loading
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Regsvr32
|
Anomaly
|
AsyncRAT, Data Destruction, Hermetic Wiper, Living Off The Land, Remcos, Suspicious Regsvr32 Activity
|
2026-04-15
|
|
Regsvr32 with Known Silent Switch Cmdline
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Regsvr32
|
Anomaly
|
AsyncRAT, IcedID, Living Off The Land, Qakbot, Remcos, Suspicious Regsvr32 Activity
|
2026-04-15
|
|
Runas Execution in CommandLine
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Token Impersonation/Theft
|
Hunting
|
Data Destruction, Hermetic Wiper, Quasar RAT, Windows Privilege Escalation
|
2025-12-15
|
|
Rundll32 Control RunDLL Hunt
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Rundll32
|
Hunting
|
Living Off The Land, Microsoft MSHTML Remote Code Execution CVE-2021-40444, Suspicious Rundll32 Activity
|
2026-02-25
|
|
Rundll32 Control RunDLL World Writable Directory
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Rundll32
|
TTP
|
Compromised Windows Host, Living Off The Land, Microsoft MSHTML Remote Code Execution CVE-2021-40444, Suspicious Rundll32 Activity
|
2026-04-15
|
|
Rundll32 Create Remote Thread To A Process
|
Sysmon EventID 8
|
Process Injection
|
TTP
|
IcedID, Living Off The Land
|
2026-04-15
|
|
Rundll32 CreateRemoteThread In Browser
|
Sysmon EventID 8
|
Process Injection
|
TTP
|
IcedID, Living Off The Land
|
2026-04-15
|
|
Rundll32 LockWorkStation
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Rundll32
|
Anomaly
|
Ransomware
|
2026-04-15
|
|
Rundll32 Process Creating Exe Dll Files
|
Sysmon EventID 11
|
Rundll32
|
TTP
|
Gh0st RAT, IcedID, Living Off The Land
|
2026-04-15
|
|
Rundll32 with no Command Line Arguments with Network
|
Sysmon EventID 1, Sysmon EventID 3
|
Rundll32
|
TTP
|
BlackByte Ransomware, BlackSuit Ransomware, Cactus Ransomware, Cobalt Strike, Compromised Windows Host, Graceful Wipe Out Attack, PrintNightmare CVE-2021-34527, Suspicious Rundll32 Activity
|
2026-04-15
|
|
RunDLL Loading DLL By Ordinal
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Rundll32
|
TTP
|
IcedID, Living Off The Land, Suspicious Rundll32 Activity, Unusual Processes
|
2026-04-15
|
|
Sdelete Application Execution
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
File Deletion
Data Destruction
|
TTP
|
Masquerading - Rename System Utilities, Scattered Spider, Void Manticore
|
2026-04-15
|
|
SearchProtocolHost with no Command Line with Network
|
Sysmon EventID 1, Sysmon EventID 3
|
Process Injection
|
TTP
|
BlackByte Ransomware, Cactus Ransomware, Cobalt Strike, Compromised Windows Host, Graceful Wipe Out Attack, Hellcat Ransomware
|
2026-04-09
|
|
Shai-Hulud Workflow File Creation or Modification
|
Sysmon EventID 11, Sysmon for Linux EventID 11
|
Dynamic Linker Hijacking
Compromise Host Software Binary
Supply Chain Compromise
|
TTP
|
NPM Supply Chain Compromise
|
2026-04-15
|
|
Short Lived Windows Accounts
|
Windows Event Log System 4720, Windows Event Log System 4726
|
Local Accounts
Local Account
|
TTP
|
Active Directory Lateral Movement, GhostRedirector IIS Module and Rungan Backdoor
|
2026-04-15
|
|
Suspicious Computer Account Name Change
|
Windows Event Log Security 4781
|
Domain Accounts
|
TTP
|
Active Directory Privilege Escalation, Compromised Windows Host, Scattered Lapsus$ Hunters, sAMAccountName Spoofing and Domain Controller Impersonation
|
2026-04-15
|
|
Suspicious Copy on System32
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Rename Legitimate Utilities
|
Anomaly
|
AsyncRAT, Compromised Windows Host, IcedID, Qakbot, Sandworm Tools, Unusual Processes, Volt Typhoon, Water Gamayun
|
2026-04-15
|
|
Suspicious DLLHost no Command Line Arguments
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Process Injection
|
TTP
|
BlackByte Ransomware, Cactus Ransomware, Cobalt Strike, Graceful Wipe Out Attack
|
2026-04-15
|
|
Suspicious GPUpdate no Command Line Arguments
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Process Injection
|
TTP
|
BlackByte Ransomware, Cobalt Strike, Graceful Wipe Out Attack, Hellcat Ransomware
|
2026-04-15
|
|
Suspicious IcedID Rundll32 Cmdline
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Rundll32
|
TTP
|
IcedID, Living Off The Land
|
2026-04-15
|
|
Suspicious Kerberos Service Ticket Request
|
Windows Event Log Security 4769
|
Domain Accounts
|
TTP
|
Active Directory Kerberos Attacks, Active Directory Privilege Escalation, sAMAccountName Spoofing and Domain Controller Impersonation
|
2026-04-15
|
|
Suspicious microsoft workflow compiler rename
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Rename Legitimate Utilities
Trusted Developer Utilities Proxy Execution
|
Hunting
|
BlackByte Ransomware, Cobalt Strike, Graceful Wipe Out Attack, Living Off The Land, Masquerading - Rename System Utilities, Trusted Developer Utilities Proxy Execution
|
2026-05-04
|
|
Suspicious microsoft workflow compiler usage
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Trusted Developer Utilities Proxy Execution
|
TTP
|
Living Off The Land, Trusted Developer Utilities Proxy Execution
|
2026-05-04
|
|
Suspicious msbuild path
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Rename Legitimate Utilities
MSBuild
|
TTP
|
BlackByte Ransomware, Cobalt Strike, Graceful Wipe Out Attack, Living Off The Land, Masquerading - Rename System Utilities, Storm-2460 CLFS Zero Day Exploitation, Trusted Developer Utilities Proxy Execution MSBuild
|
2026-05-04
|
|
Suspicious MSBuild Rename
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Rename Legitimate Utilities
MSBuild
|
Hunting
|
BlackByte Ransomware, Cobalt Strike, Graceful Wipe Out Attack, Living Off The Land, Masquerading - Rename System Utilities, Storm-2460 CLFS Zero Day Exploitation, Trusted Developer Utilities Proxy Execution MSBuild
|
2026-05-04
|
|
Suspicious MSBuild Spawn
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
MSBuild
|
TTP
|
Living Off The Land, Storm-2460 CLFS Zero Day Exploitation, Trusted Developer Utilities Proxy Execution MSBuild
|
2026-05-04
|
|
Suspicious mshta child process
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Mshta
|
TTP
|
Living Off The Land, Lumma Stealer, MuddyWater, Suspicious MSHTA Activity
|
2026-04-15
|
|
Suspicious mshta spawn
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Mshta
|
TTP
|
APT37 Rustonotto and FadeStealer, Living Off The Land, Suspicious MSHTA Activity
|
2026-04-15
|
|
Suspicious Process Executed From Container File
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Malicious File
Masquerade File Type
|
TTP
|
APT37 Rustonotto and FadeStealer, Amadey, GhostRedirector IIS Module and Rungan Backdoor, Remcos, Snake Keylogger, Unusual Processes, Water Gamayun
|
2026-04-15
|
|
Suspicious Regsvr32 Register Suspicious Path
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Regsvr32
|
TTP
|
China-Nexus Threat Activity, Derusbi, IcedID, Living Off The Land, Qakbot, Salt Typhoon, Suspicious Regsvr32 Activity
|
2026-04-15
|
|
Suspicious Rundll32 dllregisterserver
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Rundll32
|
TTP
|
IcedID, Living Off The Land, Suspicious Rundll32 Activity
|
2026-04-15
|
|
Suspicious Rundll32 no Command Line Arguments
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Rundll32
|
TTP
|
BlackByte Ransomware, Cobalt Strike, Graceful Wipe Out Attack, Hellcat Ransomware, PrintNightmare CVE-2021-34527, Suspicious Rundll32 Activity
|
2026-04-15
|
|
Suspicious Rundll32 PluginInit
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Rundll32
|
TTP
|
IcedID
|
2026-04-15
|
|
Suspicious Rundll32 StartW
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Rundll32
|
TTP
|
BlackByte Ransomware, Cobalt Strike, Graceful Wipe Out Attack, Hellcat Ransomware, Suspicious Rundll32 Activity, Trickbot
|
2026-04-15
|
|
Suspicious SearchProtocolHost no Command Line Arguments
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Process Injection
|
TTP
|
BlackByte Ransomware, Cactus Ransomware, Cobalt Strike, Graceful Wipe Out Attack, Hellcat Ransomware
|
2026-04-15
|
|
Suspicious Ticket Granting Ticket Request
|
Windows Event Log Security 4768, Windows Event Log Security 4781
|
Domain Accounts
|
Hunting
|
Active Directory Kerberos Attacks, Active Directory Privilege Escalation, sAMAccountName Spoofing and Domain Controller Impersonation
|
2026-02-25
|
|
Suspicious writes to windows Recycle Bin
|
Sysmon EventID 1, Sysmon EventID 11
|
Masquerading
|
TTP
|
Collection and Staging, PlugX
|
2026-04-09
|
|
System Processes Run From Unexpected Locations
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Rename Legitimate Utilities
|
Anomaly
|
DarkGate Malware, Masquerading - Rename System Utilities, Qakbot, Ransomware, Suspicious Command-Line Executions, Unusual Processes, Windows Error Reporting Service Elevation of Privilege Vulnerability
|
2026-04-15
|
|
Trickbot Named Pipe
|
Sysmon EventID 17, Sysmon EventID 18
|
Process Injection
|
TTP
|
Hellcat Ransomware, Trickbot
|
2026-04-15
|
|
UAC Bypass MMC Load Unsigned Dll
|
Sysmon EventID 7
|
MMC
Bypass User Account Control
|
TTP
|
Windows Defense Evasion Tactics
|
2026-04-15
|
|
UAC Bypass With Colorui COM Object
|
Sysmon EventID 7
|
CMSTP
|
TTP
|
LockBit Ransomware, Ransomware
|
2026-04-15
|
|
Uninstall App Using MsiExec
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Msiexec
|
TTP
|
Ransomware
|
2026-04-15
|
|
Unusual Number of Computer Service Tickets Requested
|
Windows Event Log Security 4769
|
Valid Accounts
|
Hunting
|
Active Directory Kerberos Attacks, Active Directory Lateral Movement, Active Directory Privilege Escalation, Scattered Lapsus$ Hunters
|
2026-02-25
|
|
Unusual Number of Remote Endpoint Authentication Events
|
Windows Event Log Security 4624
|
Valid Accounts
|
Hunting
|
Active Directory Lateral Movement, Active Directory Privilege Escalation
|
2026-02-25
|
|
USN Journal Deletion
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Indicator Removal
|
TTP
|
Ransomware, Windows Log Manipulation
|
2026-04-15
|
|
Verclsid CLSID Execution
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Verclsid
|
Hunting
|
Unusual Processes
|
2025-12-15
|
|
Wbemprox COM Object Execution
|
Sysmon EventID 7
|
CMSTP
|
TTP
|
LockBit Ransomware, Ransomware, Revil Ransomware
|
2026-04-15
|
|
Wermgr Process Create Executable File
|
Sysmon EventID 11
|
Obfuscated Files or Information
|
TTP
|
Trickbot
|
2026-04-15
|
|
Windows Access Token Manipulation SeDebugPrivilege
|
Windows Event Log Security 4703
|
Create Process with Token
|
Anomaly
|
AsyncRAT, Brute Ratel C4, CISA AA23-347A, China-Nexus Threat Activity, DarkGate Malware, Derusbi, Gh0st RAT, GhostRedirector IIS Module and Rungan Backdoor, Lokibot, Meduza Stealer, PathWiper, PlugX, Salt Typhoon, Scattered Lapsus$ Hunters, SnappyBee, Tuoni, ValleyRAT, WinDealer RAT
|
2026-04-15
|
|
Windows Access Token Manipulation Winlogon Duplicate Token Handle
|
Sysmon EventID 10
|
Token Impersonation/Theft
|
Hunting
|
Brute Ratel C4
|
2025-05-02
|
|
Windows Access Token Winlogon Duplicate Handle In Uncommon Path
|
Sysmon EventID 10
|
Token Impersonation/Theft
|
Anomaly
|
Brute Ratel C4, PathWiper
|
2026-04-15
|
|
Windows AD Cross Domain SID History Addition
|
Windows Event Log Security 4738, Windows Event Log Security 4742
|
SID-History Injection
|
TTP
|
Compromised Windows Host, Sneaky Active Directory Persistence Tricks
|
2026-04-15
|
|
Windows AD Privileged Account SID History Addition
|
Windows Event Log Security 4738, Windows Event Log Security 4742
|
SID-History Injection
|
TTP
|
Compromised Windows Host, Sneaky Active Directory Persistence Tricks
|
2026-04-07
|
|
Windows AD Same Domain SID History Addition
|
Windows Event Log Security 4738, Windows Event Log Security 4742
|
SID-History Injection
|
TTP
|
Compromised Windows Host, Sneaky Active Directory Persistence Tricks, Windows Persistence Techniques
|
2026-04-15
|
|
Windows AD SID History Attribute Modified
|
Windows Event Log Security 5136
|
SID-History Injection
|
TTP
|
Sneaky Active Directory Persistence Tricks
|
2026-04-15
|
|
Windows Advanced Installer MSIX with AI_STUBS Execution
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
System Binary Proxy Execution
Mark-of-the-Web Bypass
Malicious File
|
TTP
|
MSIX Package Abuse
|
2026-04-15
|
|
Windows Alternate DataStream - Base64 Content
|
Sysmon EventID 15
|
NTFS File Attributes
|
TTP
|
APT37 Rustonotto and FadeStealer, Windows Defense Evasion Tactics
|
2026-04-15
|
|
Windows Alternate DataStream - Executable Content
|
Sysmon EventID 15
|
NTFS File Attributes
|
TTP
|
Windows Defense Evasion Tactics
|
2026-04-15
|
|
Windows Alternate DataStream - Process Execution
|
Sysmon EventID 1, Windows Event Log Security 4688
|
NTFS File Attributes
|
TTP
|
Compromised Windows Host, Windows Defense Evasion Tactics
|
2026-04-15
|
|
Windows Application Whitelisting Bypass Attempt via Rundll32
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Rundll32
|
TTP
|
Compromised Windows Host, Living Off The Land, Suspicious Rundll32 Activity
|
2026-04-15
|
|
Windows AppLocker Block Events
|
|
System Binary Proxy Execution
|
Anomaly
|
Windows AppLocker
|
2026-04-15
|
|
Windows AppLocker Execution from Uncommon Locations
|
|
System Binary Proxy Execution
|
Hunting
|
Windows AppLocker
|
2026-02-25
|
|
Windows AppLocker Privilege Escalation via Unauthorized Bypass
|
|
System Binary Proxy Execution
|
TTP
|
Windows AppLocker
|
2026-04-15
|
|
Windows AppLocker Rare Application Launch Detection
|
|
System Binary Proxy Execution
|
Hunting
|
Windows AppLocker
|
2026-02-25
|
|
Windows Azure PowerShell Module Installation Via PowerShell Script
|
Powershell Script Block Logging 4104
|
Valid Accounts
Cloud Services
Cloud Account
Account Manipulation
Cloud Groups
|
Anomaly
|
Azure Active Directory Account Takeover, Azure Active Directory Persistence, Azure Active Directory Privilege Escalation
|
2026-04-13
|
|
Windows Binary Proxy Execution Mavinject DLL Injection
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Mavinject
|
TTP
|
Living Off The Land
|
2026-04-15
|
|
Windows BitDefender Submission Wizard DLL Sideloading
|
Sysmon EventID 7
|
Hijack Execution Flow
|
TTP
|
Lotus Blossom Chrysalis Backdoor
|
2026-04-15
|
|
Windows BitLockerToGo Process Execution
|
Sysmon EventID 1, Windows Event Log Security 4688
|
System Binary Proxy Execution
|
Hunting
|
Lumma Stealer
|
2026-02-25
|
|
Windows BitLockerToGo with Network Activity
|
Sysmon EventID 22
|
System Binary Proxy Execution
|
Hunting
|
Hellcat Ransomware, Lumma Stealer
|
2026-02-25
|
|
Windows Bluetooth Service Installed From Uncommon Location
|
Windows Event Log System 7045
|
Windows Service
Masquerading
|
Anomaly
|
Lotus Blossom Chrysalis Backdoor
|
2026-04-15
|
|
Windows BootLoader Inventory
|
|
System Firmware
|
Hunting
|
BlackLotus Campaign, Windows BootKits
|
2026-02-25
|
|
Windows Chromium Browser Launched with Small Window Size
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Virtualization/Sandbox Evasion
|
TTP
|
Browser Hijacking
|
2026-04-15
|
|
Windows Chromium Browser No Security Sandbox Process
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Virtualization/Sandbox Evasion
|
TTP
|
Malicious Inno Setup Loader
|
2026-04-15
|
|
Windows Chromium Browser with Custom User Data Directory
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Virtualization/Sandbox Evasion
|
Anomaly
|
Lokibot, Malicious Inno Setup Loader, StealC Stealer
|
2026-04-15
|
|
Windows Chromium process Launched with Disable Popup Blocking
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Virtualization/Sandbox Evasion
|
Anomaly
|
Browser Hijacking
|
2026-04-15
|
|
Windows Chromium Process Launched with Logging Disabled
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Virtualization/Sandbox Evasion
|
Anomaly
|
Browser Hijacking
|
2026-04-15
|
|
Windows Chromium Process with Disabled Extensions
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Virtualization/Sandbox Evasion
|
Anomaly
|
Browser Hijacking
|
2026-04-15
|
|
Windows Command Obfuscation with Environment Variable Substrings
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Command Obfuscation
|
Anomaly
|
Malicious PowerShell
|
2026-04-13
|
|
Windows ConHost with Headless Argument
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Hidden Window
Run Virtual Instance
|
TTP
|
Compromised Windows Host, Spearphishing Attachments
|
2026-04-15
|
|
Windows ConsoleHost History File Deletion
|
Sysmon EventID 23, Sysmon EventID 26
|
Clear Command History
|
Anomaly
|
Medusa Ransomware
|
2026-04-15
|
|
Windows ConvertTo-AADIntBackdoor Execution Via PowerShell Script
|
Powershell Script Block Logging 4104
|
Domain Trust Discovery
Valid Accounts
Exploitation for Credential Access
Web Protocols
|
TTP
|
Azure Active Directory Account Takeover, Azure Active Directory Persistence, Azure Active Directory Privilege Escalation
|
2026-04-13
|
|
Windows Debugger Tool Execution
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Masquerading
|
Hunting
|
DarkGate Malware, PlugX
|
2026-02-25
|
|
Windows Default Rdp File Deletion
|
Sysmon EventID 23, Sysmon EventID 26
|
File Deletion
|
Anomaly
|
Windows RDP Artifacts and Defense Evasion
|
2026-04-15
|
|
Windows Diskshadow Proxy Execution
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
System Binary Proxy Execution
|
TTP
|
Living Off The Land
|
2026-04-15
|
|
Windows DLL Search Order Hijacking Hunt with Sysmon
|
Sysmon EventID 7
|
DLL
|
Hunting
|
Living Off The Land, Malicious Inno Setup Loader, Qakbot, Windows Defense Evasion Tactics
|
2025-05-26
|
|
Windows DLL Search Order Hijacking with iscsicpl
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
DLL
|
TTP
|
Compromised Windows Host, Living Off The Land, Windows Defense Evasion Tactics
|
2026-04-15
|
|
Windows DLL Side-Loading In Calc
|
Sysmon EventID 7
|
DLL
|
TTP
|
Earth Alux, Qakbot
|
2026-04-07
|
|
Windows DLL Side-Loading Process Child Of Calc
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
DLL
|
Anomaly
|
Earth Alux, Qakbot
|
2026-04-15
|
|
Windows DotNet Binary in Non Standard Path
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Rename Legitimate Utilities
InstallUtil
|
TTP
|
Data Destruction, Masquerading - Rename System Utilities, Ransomware, Signed Binary Proxy Execution InstallUtil, Unusual Processes, WhisperGate
|
2026-04-15
|
|
Windows Driver Load Non-Standard Path
|
Windows Event Log System 7045
|
Rootkit
Exploitation for Privilege Escalation
|
TTP
|
AgentTesla, BlackByte Ransomware, BlackSuit Ransomware, CISA AA22-320A, Windows Drivers
|
2026-04-15
|
|
Windows Drivers Loaded by Signature
|
Sysmon EventID 6
|
Rootkit
Exploitation for Privilege Escalation
|
Hunting
|
AgentTesla, BlackByte Ransomware, CISA AA22-320A, Windows Drivers
|
2026-02-25
|
|
Windows EFI Bootloader File Modification
|
Sysmon EventID 11
|
Bootkit
|
TTP
|
Windows BootKits
|
2026-04-13
|
|
Windows EFI Volume Mount Attempt Via Mountvol
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Malicious File
Pre-OS Boot
Safe Mode Boot
|
Anomaly
|
Compromised Windows Host
|
2026-04-13
|
|
Windows Entra User Management Via Azure CLI
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Create Account
Cloud Accounts
Account Manipulation
|
Anomaly
|
Azure Active Directory Persistence
|
2026-04-13
|
|
Windows Executable Masquerading as Benign File Types
|
Sysmon EventID 29
|
Masquerade File Type
|
Anomaly
|
NetSupport RMM Tool Abuse
|
2026-04-15
|
|
Windows Execute Arbitrary Commands with MSDT
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
System Binary Proxy Execution
|
TTP
|
Compromised Windows Host, Microsoft Support Diagnostic Tool Vulnerability CVE-2022-30190
|
2026-04-15
|
|
Windows Execution of Microsoft MSC File In Suspicious Path
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
MMC
|
Anomaly
|
XML Runner Loader
|
2026-04-15
|
|
Windows Get-Variable.EXE Execution from WindowsApps Folder
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Path Interception by Search Order Hijacking
|
Anomaly
|
Windows Persistence Techniques
|
2026-04-13
|
|
Windows GrimResource - MMC Process Accessing APDS DLL
|
Windows Event Log Security 4663
|
JavaScript
MMC
|
TTP
|
Compromised Windows Host
|
2026-04-13
|
|
Windows Group Policy Object Created
|
Windows Event Log Security 5136, Windows Event Log Security 5137
|
Domain Accounts
Group Policy Modification
|
TTP
|
Active Directory Privilege Escalation, Sneaky Active Directory Persistence Tricks
|
2026-04-15
|
|
Windows Guest Account Enabled Via Net.EXE
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Default Accounts
|
Anomaly
|
Windows Persistence Techniques
|
2026-04-13
|
|
Windows Handle Duplication in Known UAC-Bypass Binaries
|
Sysmon EventID 10
|
Token Impersonation/Theft
|
Anomaly
|
Castle RAT
|
2026-04-15
|
|
Windows Hijack Execution Flow Version Dll Side Load
|
Sysmon EventID 7
|
DLL
|
Anomaly
|
Brute Ratel C4, Malicious Inno Setup Loader, SolarWinds WHD RCE Post Exploitation, XWorm
|
2026-04-15
|
|
Windows HTTP Network Communication From MSIExec
|
Cisco Network Visibility Module Flow Data, Sysmon EventID 1, Sysmon EventID 3
|
Msiexec
|
Anomaly
|
APT37 Rustonotto and FadeStealer, Cisco Network Visibility Module Analytics, GhostRedirector IIS Module and Rungan Backdoor, SolarWinds WHD RCE Post Exploitation, Water Gamayun, Windows System Binary Proxy Execution MSIExec
|
2026-04-09
|
|
Windows Indicator Removal Via Rmdir
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Indicator Removal
|
Anomaly
|
APT37 Rustonotto and FadeStealer, DarkGate Malware, ZOVWiper
|
2026-04-15
|
|
Windows Indirect Command Execution Via forfiles
|
CrowdStrike ProcessRollup2, Sysmon EventID 1
|
Indirect Command Execution
|
TTP
|
Living Off The Land, Windows Post-Exploitation
|
2026-04-15
|
|
Windows Indirect Command Execution Via pcalua
|
CrowdStrike ProcessRollup2, Sysmon EventID 1
|
Indirect Command Execution
|
TTP
|
Living Off The Land
|
2026-04-15
|
|
Windows Indirect Command Execution Via Series Of Forfiles
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Indirect Command Execution
|
Anomaly
|
Prestige Ransomware, Windows Post-Exploitation
|
2026-04-15
|
|
Windows InstallUtil Credential Theft
|
Sysmon EventID 7
|
InstallUtil
|
TTP
|
Signed Binary Proxy Execution InstallUtil
|
2026-04-15
|
|
Windows InstallUtil in Non Standard Path
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Rename Legitimate Utilities
InstallUtil
|
TTP
|
Data Destruction, Living Off The Land, Masquerading - Rename System Utilities, Ransomware, Signed Binary Proxy Execution InstallUtil, Unusual Processes, WhisperGate
|
2026-04-15
|
|
Windows InstallUtil Remote Network Connection
|
Cisco Network Visibility Module Flow Data, Sysmon EventID 1, Sysmon EventID 3
|
InstallUtil
|
Anomaly
|
Cisco Network Visibility Module Analytics, Compromised Windows Host, Living Off The Land, Signed Binary Proxy Execution InstallUtil
|
2026-04-15
|
|
Windows InstallUtil Uninstall Option
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
InstallUtil
|
TTP
|
Compromised Windows Host, Living Off The Land, Signed Binary Proxy Execution InstallUtil
|
2026-04-15
|
|
Windows InstallUtil URL in Command Line
|
Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
InstallUtil
|
TTP
|
Cisco Network Visibility Module Analytics, Compromised Windows Host, Living Off The Land, Signed Binary Proxy Execution InstallUtil
|
2026-04-15
|
|
Windows IOBit Unlocker Extension DLL Registration via Regsvr32
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Regsvr32
|
TTP
|
Compromised Windows Host
|
2026-04-13
|
|
Windows Known Abused DLL Created
|
Sysmon EventID 11
|
DLL
|
Anomaly
|
Living Off The Land, Windows Defense Evasion Tactics
|
2026-04-15
|
|
Windows Known Abused DLL Loaded Suspiciously
|
Sysmon EventID 7
|
DLL
|
TTP
|
Living Off The Land, SolarWinds WHD RCE Post Exploitation, Windows Defense Evasion Tactics
|
2026-04-15
|
|
Windows Known GraphicalProton Loaded Modules
|
Sysmon EventID 7
|
DLL
|
Anomaly
|
CISA AA23-347A, Hellcat Ransomware, Water Gamayun
|
2026-04-15
|
|
Windows Large Number of Computer Service Tickets Requested
|
Windows Event Log Security 4769
|
Network Share Discovery
Valid Accounts
|
Anomaly
|
Active Directory Lateral Movement, Active Directory Privilege Escalation
|
2026-04-15
|
|
Windows List ENV Variables Via SET Command From Uncommon Parent
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Process Injection
|
Anomaly
|
Qakbot
|
2026-04-15
|
|
Windows LOLBAS Executed As Renamed File
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Rename Legitimate Utilities
Rundll32
|
TTP
|
Living Off The Land, Masquerading - Rename System Utilities, Water Gamayun, Windows Defense Evasion Tactics
|
2026-04-15
|
|
Windows LOLBAS Executed Outside Expected Path
|
Sysmon EventID 1, Windows Event Log Security 4688
|
Match Legitimate Resource Name or Location
Rundll32
|
Anomaly
|
Living Off The Land, Masquerading - Rename System Utilities, Windows Defense Evasion Tactics
|
2026-04-15
|
|
Windows Masquerading Explorer As Child Process
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
DLL
|
TTP
|
Compromised Windows Host, Qakbot, Water Gamayun
|
2026-04-13
|
|
Windows Masquerading Msdtc Process
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Masquerading
|
TTP
|
Compromised Windows Host, PlugX
|
2026-04-15
|
|
Windows MMC Loaded Script Engine DLL
|
Sysmon EventID 7
|
Reflective Code Loading
|
Anomaly
|
XML Runner Loader
|
2026-04-15
|
|
Windows Mock Trusted Directory MSC File Creation
|
Sysmon EventID 11
|
MMC
Bypass User Account Control
Hijack Execution Flow
|
TTP
|
Windows Persistence Techniques, Windows Privilege Escalation
|
2026-04-13
|
|
Windows MSC EvilTwin Directory Path Manipulation
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
System Binary Proxy Execution
Match Legitimate Resource Name or Location
Exploitation for Client Execution
|
TTP
|
Living Off The Land, Water Gamayun, Windows Defense Evasion Tactics
|
2026-04-15
|
|
Windows Mshta Execution In Registry
|
Sysmon EventID 13
|
Mshta
|
TTP
|
Suspicious Windows Registry Activities, Windows Persistence Techniques
|
2026-04-15
|
|
Windows MSHTA Writing to World Writable Path
|
Sysmon EventID 11
|
Mshta
|
TTP
|
APT29 Diplomatic Deceptions with WINELOADER, Suspicious MSHTA Activity, XWorm
|
2026-04-15
|
|
Windows MSI Rollback Script Deleted By Non-Msiexec Process
|
Sysmon EventID 23
|
Msiexec
Exploitation for Privilege Escalation
|
TTP
|
Windows Privilege Escalation
|
2026-04-13
|
|
Windows MSIExec DLLRegisterServer
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Msiexec
|
TTP
|
Water Gamayun, Windows System Binary Proxy Execution MSIExec
|
2026-04-15
|
|
Windows MsiExec HideWindow Rundll32 Execution
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Msiexec
|
TTP
|
Qakbot, Water Gamayun
|
2026-04-15
|
|
Windows MSIExec Remote Download
|
Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Msiexec
|
Anomaly
|
Cisco Network Visibility Module Analytics, SolarWinds WHD RCE Post Exploitation, StealC Stealer, Water Gamayun, Windows System Binary Proxy Execution MSIExec
|
2026-04-15
|
|
Windows MSIExec Spawn Discovery Command
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Msiexec
|
Anomaly
|
Medusa Ransomware, StealC Stealer, Water Gamayun, Windows System Binary Proxy Execution MSIExec
|
2026-04-15
|
|
Windows MSIExec Spawn WinDBG
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Msiexec
|
TTP
|
Compromised Windows Host, DarkGate Malware
|
2026-04-15
|
|
Windows MSIExec Unregister DLLRegisterServer
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Msiexec
|
TTP
|
Windows System Binary Proxy Execution MSIExec
|
2026-04-15
|
|
Windows Multiple Account Passwords Changed
|
Windows Event Log Security 4724
|
Account Manipulation
Valid Accounts
|
TTP
|
Azure Active Directory Persistence
|
2026-04-15
|
|
Windows Multiple Accounts Deleted
|
Windows Event Log Security 4726
|
Account Manipulation
Valid Accounts
|
TTP
|
Azure Active Directory Persistence
|
2026-04-15
|
|
Windows Multiple Accounts Disabled
|
Windows Event Log Security 4725
|
Account Manipulation
Valid Accounts
|
TTP
|
Azure Active Directory Persistence
|
2026-04-15
|
|
Windows Mustang Panda USB Tool Execution
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
DLL
Malicious File
Automated Exfiltration
|
TTP
|
Compromised Windows Host
|
2026-04-13
|
|
Windows NetSupport RMM DLL Loaded By Uncommon Process
|
Sysmon EventID 7
|
Masquerading
|
Anomaly
|
NetSupport RMM Tool Abuse
|
2026-04-15
|
|
Windows New Deny Permission Set On Service SD Via Sc.EXE
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Hide Artifacts
|
Anomaly
|
Defense Evasion or Unauthorized Access Via SDDL Tampering
|
2026-04-15
|
|
Windows New Service Security Descriptor Set Via Sc.EXE
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Hide Artifacts
|
Anomaly
|
Defense Evasion or Unauthorized Access Via SDDL Tampering
|
2026-04-15
|
|
Windows Njrat Fileless Storage via Registry
|
Sysmon EventID 13
|
Fileless Storage
|
TTP
|
NjRAT
|
2026-04-15
|
|
Windows Obfuscated Files or Information via RAR SFX
|
Sysmon EventID 11
|
Encrypted/Encoded File
|
Anomaly
|
APT37 Rustonotto and FadeStealer, Crypto Stealer, GhostRedirector IIS Module and Rungan Backdoor
|
2026-04-15
|
|
Windows Odbcconf Hunting
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Odbcconf
|
Hunting
|
Living Off The Land
|
2026-02-25
|
|
Windows Odbcconf Load DLL
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Odbcconf
|
TTP
|
Living Off The Land
|
2026-04-15
|
|
Windows Odbcconf Load Response File
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Odbcconf
|
TTP
|
Living Off The Land
|
2026-04-15
|
|
Windows Parent PID Spoofing with Explorer
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Parent PID Spoofing
|
TTP
|
Compromised Windows Host, Windows Defense Evasion Tactics
|
2026-04-15
|
|
Windows Potential AppDomainManager Hijack Artifacts Creation
|
Sysmon EventID 11
|
AppDomainManager
|
Anomaly
|
SesameOp
|
2026-04-15
|
|
Windows Powershell History File Deletion
|
Powershell Script Block Logging 4104
|
Windows Command Shell
Clear Command History
|
Anomaly
|
Medusa Ransomware
|
2026-04-15
|
|
Windows PowerShell Module File Created
|
Sysmon EventID 11
|
Shared Modules
PowerShell
Hijack Execution Flow
|
Anomaly
|
Malicious PowerShell, Windows Persistence Techniques
|
2026-04-13
|
|
Windows PowerShell Process Implementing Manual Base64 Decoder
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Command Obfuscation
PowerShell
|
Anomaly
|
Compromised Windows Host, Deobfuscate-Decode Files or Information
|
2026-04-15
|
|
Windows PowerView AD Access Control List Enumeration
|
Powershell Script Block Logging 4104
|
Domain Accounts
Permission Groups Discovery
|
TTP
|
Active Directory Discovery, Active Directory Privilege Escalation, Rhysida Ransomware
|
2026-04-15
|
|
Windows Privilege Escalation Suspicious Process Elevation
|
Sysmon EventID 1
|
Exploitation for Privilege Escalation
Abuse Elevation Control Mechanism
Access Token Manipulation
|
TTP
|
BlackSuit Ransomware, GhostRedirector IIS Module and Rungan Backdoor, Windows Privilege Escalation
|
2026-04-15
|
|
Windows Privilege Escalation System Process Without System Parent
|
Sysmon EventID 1
|
Exploitation for Privilege Escalation
Abuse Elevation Control Mechanism
Access Token Manipulation
|
TTP
|
BlackSuit Ransomware, Windows Privilege Escalation
|
2026-04-15
|
|
Windows Privilege Escalation User Process Spawn System Process
|
Sysmon EventID 1
|
Exploitation for Privilege Escalation
Abuse Elevation Control Mechanism
Access Token Manipulation
|
TTP
|
BlackSuit Ransomware, Compromised Windows Host, GhostRedirector IIS Module and Rungan Backdoor, Windows Privilege Escalation
|
2026-04-15
|
|
Windows Process Execution From ProgramData
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Match Legitimate Resource Name or Location
|
Hunting
|
APT37 Rustonotto and FadeStealer, Axios Supply Chain Post Compromise, China-Nexus Threat Activity, GhostRedirector IIS Module and Rungan Backdoor, Salt Typhoon, SnappyBee, SolarWinds WHD RCE Post Exploitation, StealC Stealer, XWorm
|
2026-03-31
|
|
Windows Process Execution in Temp Dir
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Create or Modify System Process
Match Legitimate Resource Name or Location
|
Anomaly
|
AgentTesla, Axios Supply Chain Post Compromise, Gh0st RAT, Lokibot, NjRAT, PathWiper, PromptLock, Qakbot, Ransomware, Remcos, Ryuk Ransomware, SesameOp, Trickbot, XWorm
|
2026-04-16
|
|
Windows Process Injection In Non-Service SearchIndexer
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Process Injection
|
TTP
|
Qakbot
|
2026-04-15
|
|
Windows Process Injection into Commonly Abused Processes
|
Sysmon EventID 10
|
Portable Executable Injection
|
Anomaly
|
APT37 Rustonotto and FadeStealer, BishopFox Sliver Adversary Emulation Framework, Earth Alux, SAP NetWeaver Exploitation
|
2026-04-15
|
|
Windows Process Injection into Notepad
|
Sysmon EventID 10
|
Portable Executable Injection
|
Anomaly
|
APT37 Rustonotto and FadeStealer, BishopFox Sliver Adversary Emulation Framework, Earth Alux
|
2026-04-15
|
|
Windows Process Injection Of Wermgr to Known Browser
|
Sysmon EventID 8
|
Dynamic-link Library Injection
|
TTP
|
Qakbot
|
2026-04-15
|
|
Windows Process Injection Remote Thread
|
Sysmon EventID 8
|
Portable Executable Injection
|
TTP
|
Earth Alux, Graceful Wipe Out Attack, Qakbot, Warzone RAT, Water Gamayun
|
2026-04-15
|
|
Windows Process Injection Wermgr Child Process
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Process Injection
|
Anomaly
|
Qakbot, Windows Error Reporting Service Elevation of Privilege Vulnerability
|
2026-04-15
|
|
Windows Process Injection With Public Source Path
|
Sysmon EventID 8
|
Portable Executable Injection
|
Hunting
|
Brute Ratel C4, Earth Alux
|
2025-05-02
|
|
Windows Process With NamedPipe CommandLine
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Process Injection
|
Anomaly
|
Windows Defense Evasion Tactics
|
2026-04-15
|
|
Windows Process Writing File to World Writable Path
|
Sysmon EventID 11
|
Mshta
|
Hunting
|
APT29 Diplomatic Deceptions with WINELOADER, PHP-CGI RCE Attack on Japanese Organizations, PathWiper
|
2025-10-21
|
|
Windows Proxy Execution of .NET Utilities via Scripts
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
System Binary Proxy Execution
|
Anomaly
|
VIP Keylogger
|
2026-04-16
|
|
Windows PUA Named Pipe
|
Sysmon EventID 17, Sysmon EventID 18
|
Inter-Process Communication
SMB/Windows Admin Shares
Process Injection
|
Anomaly
|
Active Directory Lateral Movement, BlackByte Ransomware, CISA AA22-320A, Cactus Ransomware, DHS Report TA18-074A, DarkGate Malware, DarkSide Ransomware, HAFNIUM Group, IcedID, Medusa Ransomware, Rhysida Ransomware, SamSam Ransomware, Sandworm Tools, Seashell Blizzard, VanHelsing Ransomware, Volt Typhoon
|
2026-04-15
|
|
Windows Rasautou DLL Execution
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Dynamic-link Library Injection
System Binary Proxy Execution
|
TTP
|
Compromised Windows Host, Hellcat Ransomware, Windows Defense Evasion Tactics
|
2026-04-15
|
|
Windows Rdp AutomaticDestinations Deletion
|
Sysmon EventID 23, Sysmon EventID 26
|
File Deletion
|
Anomaly
|
Windows RDP Artifacts and Defense Evasion
|
2026-04-15
|
|
Windows RDP Cache File Deletion
|
Sysmon EventID 23, Sysmon EventID 26
|
File Deletion
|
Anomaly
|
Windows RDP Artifacts and Defense Evasion
|
2026-04-15
|
|
Windows RDP Server Registry Deletion
|
Sysmon EventID 12, Sysmon EventID 13
|
File Deletion
|
Anomaly
|
Windows RDP Artifacts and Defense Evasion
|
2026-04-15
|
|
Windows Registry BootExecute Modification
|
Sysmon EventID 13
|
Pre-OS Boot
Registry Run Keys / Startup Folder
|
TTP
|
Windows BootKits
|
2026-04-15
|
|
Windows Registry Payload Injection
|
Sysmon EventID 13
|
Fileless Storage
|
TTP
|
Unusual Processes
|
2026-04-15
|
|
Windows Regsvr32 Renamed Binary
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Regsvr32
|
TTP
|
Compromised Windows Host, Qakbot
|
2026-04-15
|
|
Windows Remote Assistance Spawning Process
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Process Injection
|
TTP
|
Compromised Windows Host, Unusual Processes
|
2026-04-15
|
|
Windows Renamed Powershell Execution
|
Sysmon EventID 1
|
Rename Legitimate Utilities
|
TTP
|
Axios Supply Chain Post Compromise, Hellcat Ransomware, XWorm
|
2026-04-16
|
|
Windows RMM Named Pipe
|
Sysmon EventID 17, Sysmon EventID 18
|
Inter-Process Communication
SMB/Windows Admin Shares
Process Injection
|
Anomaly
|
CISA AA24-241A, Cactus Ransomware, Command And Control, GhostRedirector IIS Module and Rungan Backdoor, Gozi Malware, Insider Threat, Interlock Ransomware, Ransomware, Remote Monitoring and Management Software, Scattered Lapsus$ Hunters, Scattered Spider, Seashell Blizzard
|
2026-04-15
|
|
Windows Rundll32 Apply User Settings Changes
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Rundll32
|
Anomaly
|
Rhysida Ransomware
|
2026-04-15
|
|
Windows Rundll32 Execution With Log.DLL
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Hijack Execution Flow
|
Anomaly
|
Lotus Blossom Chrysalis Backdoor
|
2026-04-15
|
|
Windows Rundll32 Load DLL in Temp Dir
|
Sysmon EventID 1
|
Rundll32
|
Anomaly
|
Interlock Rat
|
2026-04-15
|
|
Windows Rundll32 with Non-Standard File Extension
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Rundll32
|
Anomaly
|
Gh0st RAT, Living Off The Land, Suspicious Rundll32 Activity
|
2026-04-15
|
|
Windows RunMRU Command Execution
|
Sysmon EventID 13
|
Indirect Command Execution
|
Anomaly
|
Fake CAPTCHA Campaigns, Lumma Stealer
|
2026-04-15
|
|
Windows Service Creation Using Registry Entry
|
Sysmon EventID 13
|
Services Registry Permissions Weakness
|
Anomaly
|
Active Directory Lateral Movement, Brute Ratel C4, CISA AA23-347A, China-Nexus Threat Activity, Crypto Stealer, Derusbi, Gh0st RAT, PlugX, Salt Typhoon, SnappyBee, SolarWinds WHD RCE Post Exploitation, Suspicious Windows Registry Activities, Windows Persistence Techniques, Windows Registry Abuse
|
2026-04-15
|
|
Windows Set Custom DNS ServerLevelPlugin Via Dnscmd
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Hijack Execution Flow
|
Anomaly
|
Windows Persistence Techniques
|
2026-04-13
|
|
Windows Snake Malware File Modification Crmlog
|
Sysmon EventID 11
|
Obfuscated Files or Information
|
TTP
|
Snake Malware
|
2026-04-15
|
|
Windows SoftEther VPN Masquerading as Legitimate Binary
|
Sysmon EventID 1
|
Masquerading
Protocol Tunneling
|
TTP
|
Flax Typhoon, Linux Persistence Techniques, Linux Privilege Escalation
|
2026-04-13
|
|
Windows SqlWriter SQLDumper DLL Sideload
|
Sysmon EventID 7
|
DLL
|
TTP
|
APT29 Diplomatic Deceptions with WINELOADER
|
2026-04-15
|
|
Windows Suspicious C2 Named Pipe
|
Sysmon EventID 17, Sysmon EventID 18
|
Inter-Process Communication
SMB/Windows Admin Shares
Process Injection
|
TTP
|
APT37 Rustonotto and FadeStealer, BlackByte Ransomware, Brute Ratel C4, Cobalt Strike, DarkSide Ransomware, Gozi Malware, Graceful Wipe Out Attack, Hellcat Ransomware, LockBit Ransomware, Meterpreter, Remote Monitoring and Management Software, Storm-0501 Ransomware, Trickbot, Tuoni
|
2026-04-15
|
|
Windows Suspicious File in EFI Volume
|
Sysmon EventID 11
|
System Firmware
Inhibit System Recovery
|
TTP
|
BlackLotus Campaign, Sandworm Tools, Windows BootKits
|
2026-04-13
|
|
Windows Suspicious Named Pipe
|
Sysmon EventID 17, Sysmon EventID 18
|
Inter-Process Communication
SMB/Windows Admin Shares
Process Injection
|
TTP
|
APT37 Rustonotto and FadeStealer, BlackByte Ransomware, Brute Ratel C4, Cobalt Strike, DarkSide Ransomware, Gozi Malware, Graceful Wipe Out Attack, Hellcat Ransomware, LockBit Ransomware, Meterpreter, Remote Monitoring and Management Software, Trickbot, Tuoni
|
2026-04-15
|
|
Windows Suspicious Process File Path
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Create or Modify System Process
Match Legitimate Resource Name or Location
|
TTP
|
AgentTesla, Amadey, AsyncRAT, Axios Supply Chain Post Compromise, Azorult, BlackByte Ransomware, Brute Ratel C4, CISA AA23-347A, Castle RAT, Chaos Ransomware, China-Nexus Threat Activity, DarkCrystal RAT, DarkGate Malware, Data Destruction, Double Zero Destructor, Earth Alux, GhostRedirector IIS Module and Rungan Backdoor, Graceful Wipe Out Attack, Handala Wiper, Hermetic Wiper, IcedID, Industroyer2, Interlock Ransomware, Interlock Rat, LockBit Ransomware, Lokibot, Malicious Inno Setup Loader, Meduza Stealer, MoonPeak, NailaoLocker Ransomware, Phemedrone Stealer, PlugX, Prestige Ransomware, PromptLock, Qakbot, Quasar RAT, RedLine Stealer, Remcos, Rhysida Ransomware, Salt Typhoon, SesameOp, SnappyBee, StealC Stealer, Swift Slicer, SystemBC, Trickbot, VIP Keylogger, ValleyRAT, Void Manticore, Volt Typhoon, Warzone RAT, Water Gamayun, WhisperGate, XMRig, XWorm
|
2026-04-21
|
|
Windows Suspicious QEMU Execution
|
Sysmon EventID 1
|
Malicious File
Data Obfuscation
Masquerading
Run Virtual Instance
|
TTP
|
Compromised Linux Host, Linux Living Off The Land, Linux Post-Exploitation, Linux Privilege Escalation, Linux Rootkit, VoidLink Cloud-Native Linux Malware
|
2026-04-13
|
|
Windows Svchost.exe Parent Process Anomaly
|
Sysmon EventID 1, Windows Event Log Security 4688
|
Break Process Trees
|
Anomaly
|
China-Nexus Threat Activity, SnappyBee
|
2026-04-15
|
|
Windows SymbolicLink-Testing-Tools Utility Execution
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
File and Directory Permissions Modification
NTFS File Attributes
|
TTP
|
Windows Persistence Techniques, Windows Post-Exploitation, Windows Privilege Escalation
|
2026-04-13
|
|
Windows System Binary Proxy Execution Compiled HTML File Decompile
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Compiled HTML File
|
TTP
|
APT37 Rustonotto and FadeStealer, Compromised Windows Host, Living Off The Land, Suspicious Compiled HTML Activity
|
2026-04-15
|
|
Windows System Script Proxy Execution Syncappvpublishingserver
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
System Script Proxy Execution
System Binary Proxy Execution
|
TTP
|
Living Off The Land
|
2026-04-15
|
|
Windows Time Based Evasion
|
CrowdStrike ProcessRollup2, Sysmon EventID 1
|
Time Based Checks
|
TTP
|
BlankGrabber Stealer, NjRAT
|
2026-04-15
|
|
Windows Time Based Evasion via Choice Exec
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Time Based Checks
|
Anomaly
|
0bj3ctivity Stealer, Snake Keylogger, VIP Keylogger
|
2026-04-21
|
|
Windows TinyCC Shellcode Execution
|
Sysmon EventID 1, Windows Event Log Security 4688
|
Windows Command Shell
Obfuscated Files or Information
Masquerading
|
TTP
|
Lotus Blossom Chrysalis Backdoor
|
2026-04-15
|
|
Windows Unsigned DLL Side-Loading
|
Sysmon EventID 7
|
DLL
|
Anomaly
|
China-Nexus Threat Activity, Derusbi, Earth Alux, NjRAT, Salt Typhoon, SolarWinds WHD RCE Post Exploitation, Warzone RAT
|
2026-04-15
|
|
Windows Unsigned DLL Side-Loading In Same Process Path
|
Sysmon EventID 7
|
DLL
|
TTP
|
China-Nexus Threat Activity, DarkGate Malware, Derusbi, Lokibot, Malicious Inno Setup Loader, NailaoLocker Ransomware, PlugX, Salt Typhoon, SnappyBee, SolarWinds WHD RCE Post Exploitation, XWorm
|
2026-04-15
|
|
Windows Unsigned MS DLL Side-Loading
|
Sysmon EventID 7
|
DLL
Boot or Logon Autostart Execution
|
Anomaly
|
APT29 Diplomatic Deceptions with WINELOADER, China-Nexus Threat Activity, Derusbi, Earth Alux, Salt Typhoon, XWorm
|
2026-04-15
|
|
Windows Unusual Process Load Mozilla NSS-Mozglue Module
|
Sysmon EventID 7
|
CMSTP
|
Anomaly
|
0bj3ctivity Stealer, Lokibot, Quasar RAT, StealC Stealer, VIP Keylogger
|
2026-04-21
|
|
Windows Unusual SysWOW64 Process Run System32 Executable
|
Sysmon EventID 1, Windows Event Log Security 4688
|
Break Process Trees
|
Anomaly
|
China-Nexus Threat Activity, DarkGate Malware, Salt Typhoon
|
2026-04-15
|
|
Windows WinLogon with Public Network Connection
|
Sysmon EventID 1, Sysmon EventID 3
|
Bootkit
|
Hunting
|
BlackLotus Campaign
|
2026-02-25
|
|
Winhlp32 Spawning a Process
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Process Injection
|
TTP
|
Compromised Windows Host, Remcos
|
2026-04-15
|
|
WMIC XSL Execution via URL
|
Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
XSL Script Processing
|
TTP
|
Cisco Network Visibility Module Analytics, Compromised Windows Host, Suspicious WMI Use
|
2026-04-15
|
|
Wscript Or Cscript Suspicious Child Process
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Process Injection
Parent PID Spoofing
Create or Modify System Process
|
Anomaly
|
0bj3ctivity Stealer, Axios Supply Chain Post Compromise, Data Destruction, FIN7, MuddyWater, NjRAT, Remcos, ShrinkLocker, Unusual Processes, VIP Keylogger, WhisperGate, XWorm
|
2026-04-21
|
|
XSL Script Execution With WMIC
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
XSL Script Processing
|
TTP
|
FIN7, Suspicious WMI Use
|
2026-04-15
|
|
Cisco IOS Suspicious Privileged Account Creation
|
Cisco IOS Logs
|
Create Account
Valid Accounts
|
Anomaly
|
Cisco Smart Install Remote Code Execution CVE-2018-0171
|
2026-04-15
|
|
Cisco Privileged Account Creation with HTTP Command Execution
|
|
SSH
Create Account
Valid Accounts
|
Correlation
|
Cisco Secure Firewall Threat Defense Analytics, Salt Typhoon
|
2026-04-15
|
|
Cisco Privileged Account Creation with Suspicious SSH Activity
|
|
SSH
Create Account
Valid Accounts
|
Correlation
|
Cisco Secure Firewall Threat Defense Analytics, Salt Typhoon
|
2026-04-15
|
|
Cisco Secure Firewall - Communication Over Suspicious Ports
|
Cisco Secure Firewall Threat Defense Connection Event
|
Remote Services
Process Injection
PowerShell
Ingress Tool Transfer
Remote Access Tools
Non-Standard Port
|
Anomaly
|
Cisco Secure Firewall Threat Defense Analytics
|
2026-04-15
|
|
Cisco Secure Firewall - High Priority Intrusion Classification
|
Cisco Secure Firewall Threat Defense Intrusion Event
|
Exploitation for Client Execution
OS Credential Dumping
Application Layer Protocol
Exploit Public-Facing Application
Valid Accounts
|
TTP
|
Cisco Secure Firewall Threat Defense Analytics
|
2026-04-15
|
|
Cisco Secure Firewall - Lumma Stealer Activity
|
Cisco Secure Firewall Threat Defense Intrusion Event
|
Exploit Public-Facing Application
Exploitation of Remote Services
Obfuscated Files or Information
User Execution
|
TTP
|
Cisco Secure Firewall Threat Defense Analytics, Lumma Stealer
|
2026-04-15
|
|
Cisco Secure Firewall - Repeated Malware Downloads
|
Cisco Secure Firewall Threat Defense File Event
|
Ingress Tool Transfer
Obfuscated Files or Information
|
Anomaly
|
Cisco Secure Firewall Threat Defense Analytics, Hellcat Ransomware
|
2026-04-15
|
|
Cisco Secure Firewall - Snort Rule Triggered Across Multiple Hosts
|
Cisco Secure Firewall Threat Defense Intrusion Event
|
Ingress Tool Transfer
Obfuscated Files or Information
|
Anomaly
|
Cisco Secure Firewall Threat Defense Analytics
|
2026-04-15
|
|
Detect Software Download To Network Device
|
|
TFTP Boot
|
TTP
|
Router and Infrastructure Security
|
2026-03-10
|
|
Rundll32 DNSQuery
|
Sysmon EventID 22
|
Rundll32
|
TTP
|
IcedID, Living Off The Land
|
2026-04-15
|