Indicator catalog

3076 value patterns flagged by two or more production detection rules across Sigma, Elastic, and Splunk — process names, file paths, registry keys, and other tokens that rule authors treat as suspicious. 35 of these are flagged by rules from at least two vendors (high-confidence corpus consensus). Field names are unified across vendors (Image covers process.executable, NewProcessName, etc.); the eq: / match: / ends_with: prefix shows the operator a rule uses to check a value. Click any entry for the contributing rules and MITRE technique attribution.

3076 entries

CommandLine 882 entries

match: http 31 rules
Ingress Tool Transfer T1105, System Binary Proxy Execution T1218, PowerShell T1059.001, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Hidden Window T1564.003
match: rundll32 19 rules
Windows Management Instrumentation T1047, Windows Service T1543.003, Malicious File T1204.002, Regsvr32 T1218.010, Compromise Software Supply Chain T1195.002, Adversary-in-the-Middle T1557
match: \Users\Public\ 17 rules
System Binary Proxy Execution T1218, Ingress Tool Transfer T1105, Windows Management Instrumentation T1047, Rundll32 T1218.011, Trusted Developer Utilities Proxy Execution T1127, Hidden Files and Directories T1564.001
match: \AppData\Local\Temp\ 16 rules
System Binary Proxy Execution T1218, Visual Basic T1059.005, JavaScript T1059.007, Regsvr32 T1218.010, Trusted Developer Utilities Proxy Execution T1127, Compile After Delivery T1027.004
match: add 16 rules
Disable or Modify Tools T1562.001, Modify Registry T1112, Local Account T1136.001, Indicator Blocking T1562.006, Control Panel T1218.002, Event Triggered Execution T1546
match: powershell 16 rules
Scheduled Task T1053.005, Windows Command Shell T1059.003, PowerShell T1059.001, Windows Service T1543.003, Windows Management Instrumentation T1047, SSH T1021.004
match: .dll 15 rules
Odbcconf T1218.008, Ingress Tool Transfer T1105, Rundll32 T1218.011, Hidden Files and Directories T1564.001, Rename Legitimate Utilities T1036.003, BITS Jobs T1197
match: :\Windows\Temp\ 15 rules
System Binary Proxy Execution T1218, Trusted Developer Utilities Proxy Execution T1127, Hidden Window T1564.003, Remote Desktop Software T1219.002, Disable or Modify System Firewall T1562.004, Odbcconf T1218.008
match: http:// 15 rules
System Binary Proxy Execution T1218, Ingress Tool Transfer T1105, Exfiltration Over Web Service T1567, Compiled HTML File T1218.001, Mshta T1218.005, Indirect Command Execution T1202
match: /create 14 rules
Scheduled Task T1053.005, Rename Legitimate Utilities T1036.003, Ingress Tool Transfer T1105, BITS Jobs T1197, System Binary Proxy Execution T1218, Masquerade Task or Service T1036.004
match: :\Temp\ 14 rules
System Binary Proxy Execution T1218, Regsvr32 T1218.010, Trusted Developer Utilities Proxy Execution T1127, Rename Legitimate Utilities T1036.003, Ingress Tool Transfer T1105, BITS Jobs T1197
match: :\Users\Public\ 14 rules
Rename Legitimate Utilities T1036.003, Ingress Tool Transfer T1105, BITS Jobs T1197, Compile After Delivery T1027.004, System Binary Proxy Execution T1218, Remote Desktop Software T1219.002
match: https:// 14 rules
System Binary Proxy Execution T1218, Ingress Tool Transfer T1105, Exfiltration Over Web Service T1567, Compiled HTML File T1218.001, Mshta T1218.005, Indirect Command Execution T1202
match: \Downloads\ 12 rules
System Binary Proxy Execution T1218, Windows Service T1543.003, Hidden Files and Directories T1564.001, Hidden Window T1564.003, Windows Management Instrumentation T1047, PowerShell T1059.001
match: cscript 12 rules
Scheduled Task T1053.005, Windows Management Instrumentation T1047, Windows Service T1543.003, Malicious File T1204.002, Regsvr32 T1218.010, Command and Scripting Interpreter T1059
match: wscript 12 rules
Scheduled Task T1053.005, Windows Management Instrumentation T1047, Windows Service T1543.003, Malicious File T1204.002, Regsvr32 T1218.010, Command and Scripting Interpreter T1059
match: -c 11 rules
System Binary Proxy Execution T1218, Modify Registry T1112, LSASS Memory T1003.001, Indirect Command Execution T1202, Native API T1106, Trusted Developer Utilities Proxy Execution T1127
match: add 11 rules
Registry Run Keys / Startup Folder T1547.001, Modify Registry T1112, Disable or Modify Tools T1562.001, Windows Management Instrumentation T1047, Disable Windows Event Logging T1562.002, Exploitation for Privilege Escalation T1068
match: \Desktop\ 11 rules
Ingress Tool Transfer T1105, System Binary Proxy Execution T1218, Windows Service T1543.003, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: copy 11 rules
Rename Legitimate Utilities T1036.003, File Deletion T1070.004, Inhibit System Recovery T1490, Accessibility Features T1546.008, Credentials from Web Browsers T1555.003, SMB/Windows Admin Shares T1021.002
match: mshta 11 rules
Windows Management Instrumentation T1047, Windows Service T1543.003, Malicious File T1204.002, Regsvr32 T1218.010, Obfuscated Files or Information T1027, PowerShell T1059.001
match: regsvr32 11 rules
Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010, Compromise Software Supply Chain T1195.002, Adversary-in-the-Middle T1557, Scheduled Task T1053.005
match: \AppData\Roaming\ 10 rules
System Binary Proxy Execution T1218, Scheduled Task T1053.005, Rename Legitimate Utilities T1036.003, Ingress Tool Transfer T1105, BITS Jobs T1197, Obfuscated Files or Information T1027
match: \Windows\Temp\ 10 rules
System Binary Proxy Execution T1218, Windows Management Instrumentation T1047, Hidden Files and Directories T1564.001, Obfuscated Files or Information T1027, Compile After Delivery T1027.004, PowerShell T1059.001
ends_with: .dll 9 rules
Ingress Tool Transfer T1105, System Binary Proxy Execution T1218, Rundll32 T1218.011
match: %tmp% 9 rules
Ingress Tool Transfer T1105, Windows Management Instrumentation T1047, Registry Run Keys / Startup Folder T1547.001, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, System Binary Proxy Execution T1218
match: add 9 rules
Disable or Modify Tools T1562.001, Command and Scripting Interpreter T1059, Services Registry Permissions Weakness T1574.011, Disable or Modify System Firewall T1562.004, Windows Service T1543.003
match: \\\\ 8 rules
Ingress Tool Transfer T1105, SMB/Windows Admin Shares T1021.002, System Binary Proxy Execution T1218, Regsvr32 T1218.010, Rundll32 T1218.011, Malware T1587.001
match: .bat 8 rules
Hidden Files and Directories T1564.001, Rename Legitimate Utilities T1036.003, Ingress Tool Transfer T1105, BITS Jobs T1197, Obfuscated Files or Information T1027, Hidden Window T1564.003
match: \AppData\ 8 rules
Ingress Tool Transfer T1105, Scheduled Task T1053.005, PowerShell T1059.001, Rundll32 T1218.011, Domain Groups T1069.002, Domain Account T1087.002
match: \AppData\Local\ 8 rules
System Binary Proxy Execution T1218, Scheduled Task T1053.005, Hidden Files and Directories T1564.001, Rename Legitimate Utilities T1036.003, Ingress Tool Transfer T1105, BITS Jobs T1197
match: \AppData\Local\Temp 8 rules
Command and Scripting Interpreter T1059, Windows Service T1543.003, Windows Management Instrumentation T1047, Registry Run Keys / Startup Folder T1547.001, System Binary Proxy Execution T1218, Scheduled Task T1053.005
match: config 8 rules
Disable or Modify Tools T1562.001, Windows Service T1543.003, Disable Windows Event Logging T1562.002, Exfiltration to Cloud Storage T1567.002, Services Registry Permissions Weakness T1574.011, Service Stop T1489
match: create 8 rules
Windows Service T1543.003, Windows Management Instrumentation T1047, OS Credential Dumping T1003, Security Account Manager T1003.002, NTDS T1003.003, Malicious File T1204.002
match: curl 8 rules
Ingress Tool Transfer T1105, System Binary Proxy Execution T1218, PowerShell T1059.001, Scheduled Task T1053.005, Stage Capabilities T1608
match: iwr 8 rules
Ingress Tool Transfer T1105, PowerShell T1059.001, Command and Scripting Interpreter T1059, Stage Capabilities T1608
ends_with: .dat 7 rules
Ingress Tool Transfer T1105, Regsvr32 T1218.010
ends_with: .vbe 7 rules
Ingress Tool Transfer T1105
ends_with: .vbs 7 rules
Ingress Tool Transfer T1105
match: %AppData% 7 rules
Ingress Tool Transfer T1105, Scheduled Task T1053.005, Windows Management Instrumentation T1047, Registry Run Keys / Startup Folder T1547.001, PowerShell T1059.001, Windows Command Shell T1059.003
match: .jpg 7 rules
Ingress Tool Transfer T1105, JavaScript T1059.007, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027, Deobfuscate/Decode Files or Information T1140
match: .png 7 rules
Ingress Tool Transfer T1105, JavaScript T1059.007, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027, Deobfuscate/Decode Files or Information T1140
match: .txt 7 rules
JavaScript T1059.007, Rename Legitimate Utilities T1036.003, Ingress Tool Transfer T1105, BITS Jobs T1197, System Binary Proxy Execution T1218, LSASS Memory T1003.001
match: /c 7 rules
Windows Command Shell T1059.003, Obfuscated Files or Information T1027, PowerShell T1059.001, Distributed Component Object Model T1021.003, Windows Management Instrumentation T1047, Visual Basic T1059.005
match: FromBase64String 7 rules
Scheduled Task T1053.005, PowerShell T1059.001, Standard Encoding T1132.001, Rundll32 T1218.011, Remote System Discovery T1018, System Owner/User Discovery T1033
match: \Temp\ 7 rules
Ingress Tool Transfer T1105, Scheduled Task T1053.005, Rundll32 T1218.011, Rename Legitimate Utilities T1036.003
match: \\\\ 7 rules
Ingress Tool Transfer T1105, System Binary Proxy Execution T1218, Windows Management Instrumentation T1047, Visual Basic T1059.005, JavaScript T1059.007, XSL Script Processing T1220
match: call 7 rules
Windows Management Instrumentation T1047, Query Registry T1012, Modify Registry T1112, Malicious File T1204.002, Regsvr32 T1218.010, Disable or Modify Tools T1562.001
match: delete 7 rules
Disable or Modify Tools T1562.001, Indicator Removal T1070, Inhibit System Recovery T1490, Bootkit T1542.003, Screen Capture T1113
match: ftp:// 7 rules
System Binary Proxy Execution T1218, Exfiltration Over Web Service T1567, Mshta T1218.005
match: set 7 rules
Disable or Modify System Firewall T1562.004, Inhibit System Recovery T1490, Command and Scripting Interpreter T1059, Windows File and Directory Permissions Modification T1222.001, Obfuscated Files or Information T1027, PowerShell T1059.001
match: wget 7 rules
Ingress Tool Transfer T1105, PowerShell T1059.001, Stage Capabilities T1608
ends_with: .dll" 6 rules
System Binary Proxy Execution T1218
ends_with: .dll' 6 rules
System Binary Proxy Execution T1218
ends_with: .exe 6 rules
Ingress Tool Transfer T1105
ends_with: .hta 6 rules
Ingress Tool Transfer T1105
ends_with: .ps1 6 rules
Ingress Tool Transfer T1105
ends_with: .psm1 6 rules
Ingress Tool Transfer T1105
match: -d 6 rules
PowerShell T1059.001, Windows Management Instrumentation T1047, Scheduled Task/Job T1053, Windows Command Shell T1059.003, Brute Force T1110, Password Policy Discovery T1201
match: -enc 6 rules
PowerShell T1059.001, Obfuscated Files or Information T1027, Scheduled Task T1053.005, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087
match: use 6 rules
SMB/Windows Admin Shares T1021.002, System Network Connections Discovery T1049, Valid Accounts T1078, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087
match: -i 6 rules
Msiexec T1218.007, Ingress Tool Transfer T1105, System Binary Proxy Execution T1218, Boot or Logon Autostart Execution T1547, Scheduled Task T1053.005, Network Sniffing T1040
match: .dmp 6 rules
LSASS Memory T1003.001, Archive via Utility T1560.001, Masquerading T1036
match: .gif 6 rules
JavaScript T1059.007, Rename Legitimate Utilities T1036.003, Ingress Tool Transfer T1105, BITS Jobs T1197, Obfuscated Files or Information T1027, Deobfuscate/Decode Files or Information T1140
match: .jpeg 6 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027, Regsvcs/Regasm T1218.009, Rundll32 T1218.011
match: .js 6 rules
JavaScript T1059.007, Hidden Window T1564.003, Phishing T1566, Spearphishing Attachment T1566.001, Windows Service T1543.003, Services Registry Permissions Weakness T1574.011
match: :\PerfLogs\ 6 rules
Odbcconf T1218.008, Regsvr32 T1218.010, Command and Scripting Interpreter T1059
match: :\Users\ 6 rules
System Binary Proxy Execution T1218, Windows Management Instrumentation T1047, Registry Run Keys / Startup Folder T1547.001, Compile After Delivery T1027.004, Command and Scripting Interpreter T1059
match: :\Windows\Tasks\ 6 rules
Trusted Developer Utilities Proxy Execution T1127, System Binary Proxy Execution T1218, Remote Desktop Software T1219.002, Disable or Modify System Firewall T1562.004, Odbcconf T1218.008, Command and Scripting Interpreter T1059
match: C:\ProgramData\ 6 rules
Scheduled Task T1053.005, Ingress Tool Transfer T1105, Native API T1106, Modify Registry T1112, Regsvr32 T1218.010
match: Invoke-WebRequest 6 rules
Ingress Tool Transfer T1105, PowerShell T1059.001, Stage Capabilities T1608
match: \Contacts\ 6 rules
Rename Legitimate Utilities T1036.003, Ingress Tool Transfer T1105, BITS Jobs T1197, Hidden Window T1564.003, Compile After Delivery T1027.004, System Binary Proxy Execution T1218
match: \Favorites\ 6 rules
Rename Legitimate Utilities T1036.003, Ingress Tool Transfer T1105, BITS Jobs T1197, Hidden Window T1564.003, Compile After Delivery T1027.004, System Binary Proxy Execution T1218
match: \Favourites\ 6 rules
Rename Legitimate Utilities T1036.003, Ingress Tool Transfer T1105, BITS Jobs T1197, Hidden Window T1564.003, Compile After Delivery T1027.004, System Binary Proxy Execution T1218
match: \Temporary Internet 6 rules
Command and Scripting Interpreter T1059, Compile After Delivery T1027.004, System Binary Proxy Execution T1218, Scheduled Task T1053.005
match: cmd.exe /c 6 rules
Scheduled Task T1053.005, PowerShell T1059.001, LSASS Memory T1003.001, Windows Management Instrumentation T1047
match: cmd.exe /k 6 rules
Scheduled Task T1053.005, PowerShell T1059.001, LSASS Memory T1003.001, Windows Management Instrumentation T1047
match: cmd.exe /r 6 rules
Scheduled Task T1053.005, PowerShell T1059.001, LSASS Memory T1003.001, Windows Management Instrumentation T1047
match: query 6 rules
System Information Discovery T1082, System Network Configuration Discovery T1016, Domain Trust Discovery T1482, System Service Discovery T1007, Query Registry T1012, Software Discovery T1518
match: start 6 rules
System Binary Proxy Execution T1218, Network Sniffing T1040, Disable or Modify Tools T1562.001, Exploitation for Privilege Escalation T1068, Exploitation for Client Execution T1203, NTDS T1003.003
match: type 6 rules
PowerShell T1059.001, Ingress Tool Transfer T1105, NTFS File Attributes T1564.004, DLL T1574.001
ends_with: .bat 5 rules
ends_with: .bat" 5 rules
ends_with: .bat' 5 rules
ends_with: .dat" 5 rules
ends_with: .dat' 5 rules
ends_with: .exe" 5 rules
ends_with: .exe' 5 rules
ends_with: .hta" 5 rules
ends_with: .hta' 5 rules
ends_with: .msi 5 rules
ends_with: .msi" 5 rules
ends_with: .msi' 5 rules
ends_with: .ps1" 5 rules
ends_with: .ps1' 5 rules
ends_with: .psm1" 5 rules
ends_with: .psm1' 5 rules
ends_with: .vbe" 5 rules
ends_with: .vbe' 5 rules
ends_with: .vbs" 5 rules
ends_with: .vbs' 5 rules
match: -e 5 rules
PowerShell T1059.001, Modify Registry T1112, Trusted Developer Utilities Proxy Execution T1127
match: -f 5 rules
LSASS Memory T1003.001, Masquerading T1036, Odbcconf T1218.008, File Deletion T1070.004
match: -n 5 rules
File Deletion T1070.004, Regsvr32 T1218.010, OS Credential Dumping T1003, Obfuscated Files or Information T1027, Access Token Manipulation T1134, Remote System Discovery T1018
match: -p 5 rules
LSASS Memory T1003.001, Windows Management Instrumentation T1047, Scheduled Task/Job T1053, PowerShell T1059.001, Windows Command Shell T1059.003, Brute Force T1110
match: /add 5 rules
Account Manipulation T1098, Local Account T1087.001, Domain Account T1087.002, Remote Desktop Protocol T1021.001, External Remote Services T1133, Local Account T1136.001
match: /addfile 5 rules
Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Ingress Tool Transfer T1105
match: /transfer 5 rules
Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Ingress Tool Transfer T1105
match: > 5 rules
System Owner/User Discovery T1033, Ingress Tool Transfer T1105, NTFS File Attributes T1564.004, PowerShell T1059.001
match: cp 5 rules
Rename Legitimate Utilities T1036.003, Masquerading T1036, Credentials from Web Browsers T1555.003, SMB/Windows Admin Shares T1021.002, Data from Network Shared Drive T1039, Exfiltration Over Alternative Protocol T1048
match: %temp% 5 rules
Windows Management Instrumentation T1047, Registry Run Keys / Startup Folder T1547.001, Rename Legitimate Utilities T1036.003, Ingress Tool Transfer T1105, BITS Jobs T1197, System Binary Proxy Execution T1218
match: --headless 5 rules
Hidden Window T1564.003, Ingress Tool Transfer T1105, Browser Session Hijacking T1185, PowerShell T1059.001, Windows Command Shell T1059.003
match: -f 5 rules
Obfuscated Files or Information T1027, PowerShell T1059.001, Ingress Tool Transfer T1105, System Binary Proxy Execution T1218, Scheduled Task T1053.005
match: .cab 5 rules
NTFS File Attributes T1564.004, Ingress Tool Transfer T1105
match: .cmd 5 rules
Rename Legitimate Utilities T1036.003, Ingress Tool Transfer T1105, BITS Jobs T1197, Hidden Window T1564.003, Phishing T1566, Spearphishing Attachment T1566.001
match: .hta 5 rules
Hidden Files and Directories T1564.001, Hidden Window T1564.003, Native API T1106, Phishing T1566, Spearphishing Attachment T1566.001, Command and Scripting Interpreter T1059
match: .scr 5 rules
Hidden Window T1564.003, Phishing T1566, Spearphishing Attachment T1566.001, Screensaver T1546.002, Windows Service T1543.003, Services Registry Permissions Weakness T1574.011
match: .vbs 5 rules
Hidden Files and Directories T1564.001, Rename Legitimate Utilities T1036.003, Ingress Tool Transfer T1105, BITS Jobs T1197, Hidden Window T1564.003, Command and Scripting Interpreter T1059
match: .xml 5 rules
JavaScript T1059.007, Obfuscated Files or Information T1027, Group Policy Preferences T1552.006, Deobfuscate/Decode Files or Information T1140, Mshta T1218.005, Match Legitimate Resource Name or Location T1036.005
match: :\ProgramData\ 5 rules
Rename Legitimate Utilities T1036.003, Ingress Tool Transfer T1105, BITS Jobs T1197, System Binary Proxy Execution T1218, Odbcconf T1218.008, Regsvr32 T1218.010
match: C:\Users\ 5 rules
System Binary Proxy Execution T1218, Modify Registry T1112, Regsvr32 T1218.010, Scheduled Task T1053.005, PowerShell T1059.001, Bypass User Account Control T1548.002
match: DownloadString 5 rules
Rundll32 T1218.011, Indirect Command Execution T1202, System Binary Proxy Execution T1218
match: Invoke- 5 rules
Code Repositories T1593.003
match: anonfiles.com 5 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: bitsadmin 5 rules
Compromise Software Supply Chain T1195.002, Adversary-in-the-Middle T1557, Scheduled Task T1053.005, Command and Scripting Interpreter T1059, Hide Artifacts T1564, Malicious Copy and Paste T1204.004
match: cdn.discordapp.com 5 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: certutil 5 rules
Compromise Software Supply Chain T1195.002, Adversary-in-the-Middle T1557, Scheduled Task T1053.005, Command and Scripting Interpreter T1059, Hide Artifacts T1564, Malicious Copy and Paste T1204.004
match: cmd 5 rules
Obfuscated Files or Information T1027, PowerShell T1059.001, SSH T1021.004, Windows Command Shell T1059.003, Remote Access Tools T1219, Token Impersonation/Theft T1134.001
match: cmd /c 5 rules
Scheduled Task T1053.005, PowerShell T1059.001, LSASS Memory T1003.001, Windows Management Instrumentation T1047
match: cmd /k 5 rules
Scheduled Task T1053.005, PowerShell T1059.001, LSASS Memory T1003.001, Windows Management Instrumentation T1047
match: cmd /r 5 rules
Scheduled Task T1053.005, PowerShell T1059.001, LSASS Memory T1003.001, Windows Management Instrumentation T1047
match: ddns.net 5 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: del 5 rules
File Deletion T1070.004, Disable or Modify Tools T1562.001, Indicator Removal T1070
match: dl.dropboxusercontent.com 5 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: ghostbin.co 5 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: glitch.me 5 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: gofile.io 5 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: hastebin.com 5 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: mediafire.com 5 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: mega.nz 5 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: onrender.com 5 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: pages.dev 5 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: paste.ee 5 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: pastebin.com 5 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: pastebin.pl 5 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: pastetext.net 5 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: privatlab.com 5 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: privatlab.net 5 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: pwsh 5 rules
Windows Management Instrumentation T1047, SSH T1021.004, Windows Command Shell T1059.003, Remote Access Tools T1219, Scheduled Task T1053.005, Malicious Copy and Paste T1204.004
match: send.exploit.in 5 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: sendspace.com 5 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: storage.googleapis.com 5 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: storjshare.io 5 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: supabase.co 5 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: temp.sh 5 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: transfer.sh 5 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: trycloudflare.com 5 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: ufile.io 5 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: w3spaces.com 5 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: workers.dev 5 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
regex_match: ://[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3} 5 rules
Ingress Tool Transfer T1105
ends_with: .gif 4 rules
Ingress Tool Transfer T1105, Regsvr32 T1218.010
ends_with: .jpeg 4 rules
Ingress Tool Transfer T1105, Regsvr32 T1218.010
ends_with: .png 4 rules
Ingress Tool Transfer T1105, Regsvr32 T1218.010
match: -R 4 rules
Remote Desktop Protocol T1021.001, Protocol Tunneling T1572, Masquerading T1036, SSH T1021.004, Remote Services T1021
match: -a 4 rules
Modify Registry T1112, Trusted Developer Utilities Proxy Execution T1127, Archive via Utility T1560.001
match: -c 4 rules
Command Obfuscation T1027.010, Python T1059.006, Command and Scripting Interpreter T1059, Account Discovery T1087, Local Account T1087.001, Domain Account T1087.002
match: -decode 4 rules
Scheduled Task T1053.005, OS Credential Dumping T1003, Obfuscated Files or Information T1027, Access Token Manipulation T1134, Remote System Discovery T1018, System Owner/User Discovery T1033
match: -e 4 rules
Command and Scripting Interpreter T1059, PowerShell T1059.001, Obfuscated Files or Information T1027
match: -ma 4 rules
LSASS Memory T1003.001, Rename Legitimate Utilities T1036.003, OS Credential Dumping T1003, Obfuscated Files or Information T1027, Access Token Manipulation T1134, Masquerading T1036
match: -u 4 rules
LSASS Memory T1003.001, Masquerading T1036, Windows Management Instrumentation T1047, Scheduled Task/Job T1053, PowerShell T1059.001, Windows Command Shell T1059.003
match: a 4 rules
Archive via Utility T1560.001, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087, Web Shell T1505.003
match: copy 4 rules
Rename Legitimate Utilities T1036.003, Exfiltration to Cloud Storage T1567.002, Disable or Modify Tools T1562.001
match: delete 4 rules
Disable or Modify Tools T1562.001, Exploitation of Remote Services T1210, Service Stop T1489
match: set 4 rules
Command and Scripting Interpreter T1059, Windows Management Instrumentation T1047, Account Manipulation T1098
match: %ProgramData% 4 rules
Scheduled Task T1053.005, Rename Legitimate Utilities T1036.003, Ingress Tool Transfer T1105, BITS Jobs T1197, Windows Management Instrumentation T1047
match: %Public% 4 rules
Ingress Tool Transfer T1105, Windows Management Instrumentation T1047, Registry Run Keys / Startup Folder T1547.001, Scheduled Task T1053.005
match: %Temp% 4 rules
Ingress Tool Transfer T1105, Rundll32 T1218.011, Scheduled Task T1053.005
match: %appdata% 4 rules
System Binary Proxy Execution T1218, Modify Registry T1112, Scheduled Task T1053.005, Windows Management Instrumentation T1047
match: -a 4 rules
Msiexec T1218.007, Ingress Tool Transfer T1105, Boot or Logon Autostart Execution T1547
match: .cpl 4 rules
Hidden Window T1564.003, Hijack Execution Flow T1574, Rundll32 T1218.011, Command and Scripting Interpreter T1059, Exploitation for Defense Evasion T1211
match: .doc 4 rules
JavaScript T1059.007, Obfuscated Files or Information T1027, Deobfuscate/Decode Files or Information T1140, Mshta T1218.005, Automated Collection T1119, Credentials In Files T1552.001
match: .exe 4 rules
Hidden Files and Directories T1564.001, System Binary Proxy Execution T1218, Windows Service T1543.003, Services Registry Permissions Weakness T1574.011, Command and Scripting Interpreter T1059, Exploitation for Defense Evasion T1211
match: .githubusercontent.com 4 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: .ppt 4 rules
JavaScript T1059.007, Obfuscated Files or Information T1027, Deobfuscate/Decode Files or Information T1140, Mshta T1218.005, Automated Collection T1119, Credentials In Files T1552.001
match: .vbe 4 rules
Hidden Files and Directories T1564.001, Rename Legitimate Utilities T1036.003, Ingress Tool Transfer T1105, BITS Jobs T1197, Hidden Window T1564.003, Visual Basic T1059.005
match: .xls 4 rules
JavaScript T1059.007, Obfuscated Files or Information T1027, Deobfuscate/Decode Files or Information T1140, Mshta T1218.005, Automated Collection T1119, Credentials In Files T1552.001
match: .zip 4 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Indirect Command Execution T1202, System Binary Proxy Execution T1218, NTFS File Attributes T1564.004
match: /Create 4 rules
Scheduled Task T1053.005, PowerShell T1059.001
match: /delete 4 rules
Indirect Command Execution T1202, System Binary Proxy Execution T1218, Network Share Connection Removal T1070.005, Service Stop T1489, System Owner/User Discovery T1033, Local Account T1087.001
match: /v 4 rules
Group Policy Discovery T1615, Data Encrypted for Impact T1486, Software Discovery T1518, Hidden Users T1564.002
match: 0 4 rules
Disable or Modify Tools T1562.001, Screen Capture T1113, Impair Defenses T1562
match: :// 4 rules
Ingress Tool Transfer T1105, Windows Management Instrumentation T1047, Visual Basic T1059.005, JavaScript T1059.007, XSL Script Processing T1220, PowerShell T1059.001
match: :\Perflogs\ 4 rules
Hidden Window T1564.003, Compile After Delivery T1027.004, System Binary Proxy Execution T1218, Command and Scripting Interpreter T1059
match: C:\Windows\Temp\ 4 rules
System Binary Proxy Execution T1218, Ingress Tool Transfer T1105, Native API T1106, Modify Registry T1112
match: Invoke-RestMethod 4 rules
PowerShell T1059.001, Ingress Tool Transfer T1105
match: Invoke-WebRequest 4 rules
PowerShell T1059.001, Ingress Tool Transfer T1105, Command and Scripting Interpreter T1059, Remote Access Tools T1219
match: NT AUT 4 rules
Scheduled Task T1053.005, PowerShell T1059.001
match: New-ItemProperty 4 rules
Modify Registry T1112, Disable or Modify Tools T1562.001, Indicator Blocking T1562.006, Downgrade Attack T1562.010, Change Default File Association T1546.001, Bypass User Account Control T1548.002
match: Set-ItemProperty 4 rules
Modify Registry T1112, Disable or Modify Tools T1562.001, Indicator Blocking T1562.006, Downgrade Attack T1562.010, Change Default File Association T1546.001, Bypass User Account Control T1548.002
match: backup 4 rules
Inhibit System Recovery T1490, Exfiltration Over Alternative Protocol T1048, Exfiltration to Cloud Storage T1567.002, NTDS T1003.003
match: binPath 4 rules
Windows Service T1543.003, Services Registry Permissions Weakness T1574.011
match: cmd /c 4 rules
PowerShell T1059.001, Windows Service T1543.003, Scheduled Task T1053.005
match: copy-item 4 rules
Rename Legitimate Utilities T1036.003, Credentials from Web Browsers T1555.003, SMB/Windows Admin Shares T1021.002, Data from Network Shared Drive T1039, Exfiltration Over Alternative Protocol T1048
match: cpi 4 rules
Rename Legitimate Utilities T1036.003, Credentials from Web Browsers T1555.003, SMB/Windows Admin Shares T1021.002, Data from Network Shared Drive T1039, Exfiltration Over Alternative Protocol T1048
match: delete 4 rules
Disable or Modify Tools T1562.001, Clear Windows Event Logs T1070.001, Disable or Modify System Firewall T1562.004, Inhibit System Recovery T1490
match: dir 4 rules
Automated Collection T1119, Credentials In Files T1552.001, System Owner/User Discovery T1033, Local Account T1087.001, Private Keys T1552.004
match: firewall 4 rules
Disable or Modify System Firewall T1562.004
match: github.com 4 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: install 4 rules
Network Service Discovery T1046, Web Shell T1505.003, Process Injection T1055, Command and Scripting Interpreter T1059
match: lsass 4 rules
LSASS Memory T1003.001, Group Policy Preferences T1552.006, Masquerading T1036
match: msiexec 4 rules
Remote Access Tools T1219, Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010
match: ping 4 rules
File Deletion T1070.004, Remote System Discovery T1018, Command and Scripting Interpreter T1059, OS Credential Dumping T1003, Obfuscated Files or Information T1027, Access Token Manipulation T1134
match: reg 4 rules
Registry Run Keys / Startup Folder T1547.001, Windows Management Instrumentation T1047, Disable or Modify Tools T1562.001
match: rundll32.exe 4 rules
Rundll32 T1218.011, Process Injection T1055
match: sdset 4 rules
Windows Service T1543.003, Services Registry Permissions Weakness T1574.011
match: si 4 rules
Disable or Modify Tools T1562.001, Modify Registry T1112, Registry Run Keys / Startup Folder T1547.001
match: user 4 rules
Local Account T1136.001, Exfiltration to Cloud Storage T1567.002, System Owner/User Discovery T1033, Local Account T1087.001
regex_match: :[^ \\] 4 rules
Modify Registry T1112
ends_with: .log 3 rules
Regsvr32 T1218.010
ends_with: .txt 3 rules
Ingress Tool Transfer T1105, Regsvr32 T1218.010
match: -Group 3 rules
Account Manipulation T1098, Remote Desktop Protocol T1021.001, External Remote Services T1133, Local Account T1136.001
match: -O 3 rules
match: -en 3 rules
PowerShell T1059.001
match: -f 3 rules
File Deletion T1070.004, Domain Account T1087.002, Ingress Tool Transfer T1105, NTFS File Attributes T1564.004
match: -hp 3 rules
Archive via Utility T1560.001, Command and Scripting Interpreter T1059, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087, Web Shell T1505.003
match: -i 3 rules
Domain Account T1087.002, Regsvr32 T1218.010
match: -i 3 rules
Ingress Tool Transfer T1105, System Binary Proxy Execution T1218, Credentials In Files T1552.001, NTFS File Attributes T1564.004, Command and Scripting Interpreter T1059, Indirect Command Execution T1202
match: -m 3 rules
Archive via Utility T1560.001, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087, Web Shell T1505.003
match: -mp 3 rules
LSASS Memory T1003.001, Rename Legitimate Utilities T1036.003, Masquerading T1036
match: -w hidden 3 rules
Scheduled Task T1053.005, Command and Scripting Interpreter T1059, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087, Web Shell T1505.003
match: /s 3 rules
Control Panel T1218.002, Event Triggered Execution T1546, Modify Registry T1112, Automated Collection T1119, Credentials In Files T1552.001
match: 0 3 rules
Modify Registry T1112, Disable or Modify Tools T1562.001
match: administrateur 3 rules
Local Account T1087.001, Domain Account T1087.002, Account Manipulation T1098
match: stop 3 rules
Service Stop T1489, Disable or Modify Tools T1562.001
match: tunnel 3 rules
Proxy T1090, Web Service T1102, Protocol Tunneling T1572, Internal Proxy T1090.001
match: user 3 rules
Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087, Web Shell T1505.003, Archive via Utility T1560.001
match: # 3 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001, Command Obfuscation T1027.010
match: #+ 3 rules
Command Obfuscation T1027.010, LSASS Memory T1003.001, Masquerading T1036
match: #- 3 rules
Command Obfuscation T1027.010, LSASS Memory T1003.001, Masquerading T1036
match: %comspec% 3 rules
Scheduled Task T1053.005, Malicious Copy and Paste T1204.004, Windows Management Instrumentation T1047
match: --accept-server-license-terms 3 rules
Remote Access Tools T1219, Web Protocols T1071.001
match: --healthcheck 3 rules
Active Scanning T1595, Command and Scripting Interpreter T1059, Indirect Command Execution T1202
match: --level Full 3 rules
Active Scanning T1595, Command and Scripting Interpreter T1059, Indirect Command Execution T1202
match: --no-enum-limit 3 rules
Active Scanning T1595, Command and Scripting Interpreter T1059, Indirect Command Execution T1202
match: --output 3 rules
match: --output-document 3 rules
match: --remote-name 3 rules
match: --scanner aclcheck 3 rules
Active Scanning T1595, Command and Scripting Interpreter T1059, Indirect Command Execution T1202
match: --scanner antivirus 3 rules
Active Scanning T1595, Command and Scripting Interpreter T1059, Indirect Command Execution T1202
match: --scanner computerversion 3 rules
Active Scanning T1595, Command and Scripting Interpreter T1059, Indirect Command Execution T1202
match: --scanner foreignusers 3 rules
Active Scanning T1595, Command and Scripting Interpreter T1059, Indirect Command Execution T1202
match: --scanner laps_bitlocker 3 rules
Active Scanning T1595, Command and Scripting Interpreter T1059, Indirect Command Execution T1202
match: --scanner localadmin 3 rules
Active Scanning T1595, Command and Scripting Interpreter T1059, Indirect Command Execution T1202
match: --scanner nullsession 3 rules
Active Scanning T1595, Command and Scripting Interpreter T1059, Indirect Command Execution T1202
match: --scanner nullsession-trust 3 rules
Active Scanning T1595, Command and Scripting Interpreter T1059, Indirect Command Execution T1202
match: --scanner oxidbindings 3 rules
Active Scanning T1595, Command and Scripting Interpreter T1059, Indirect Command Execution T1202
match: --scanner remote 3 rules
Active Scanning T1595, Command and Scripting Interpreter T1059, Indirect Command Execution T1202
match: --scanner share 3 rules
Active Scanning T1595, Command and Scripting Interpreter T1059, Indirect Command Execution T1202
match: --scanner smb 3 rules
Active Scanning T1595, Command and Scripting Interpreter T1059, Indirect Command Execution T1202
match: --scanner smb3querynetwork 3 rules
Active Scanning T1595, Command and Scripting Interpreter T1059, Indirect Command Execution T1202
match: --scanner spooler 3 rules
Active Scanning T1595, Command and Scripting Interpreter T1059, Indirect Command Execution T1202
match: --scanner startup 3 rules
Active Scanning T1595, Command and Scripting Interpreter T1059, Indirect Command Execution T1202
match: --scanner zerologon 3 rules
Active Scanning T1595, Command and Scripting Interpreter T1059, Indirect Command Execution T1202
match: --server 3 rules
Active Scanning T1595, Command and Scripting Interpreter T1059, Indirect Command Execution T1202
match: -config 3 rules
Proxy T1090, Web Service T1102, Protocol Tunneling T1572, Internal Proxy T1090.001
match: -encode 3 rules
Obfuscated Files or Information T1027
match: -r 3 rules
Data from Local System T1005, Disable or Modify Tools T1562.001, Archive Collected Data T1560, Archive via Utility T1560.001
match: -s 3 rules
System Binary Proxy Execution T1218
match: -u 3 rules
OS Credential Dumping T1003, Disable or Modify Tools T1562.001, Archive Collected Data T1560, Archive via Utility T1560.001
match: -u 3 rules
Windows Remote Management T1021.006, Brute Force T1110, Password Guessing T1110.001, System Binary Proxy Execution T1218
match: .DownloadFile( 3 rules
Command and Scripting Interpreter T1059, Ingress Tool Transfer T1105, Stage Capabilities T1608
match: .DownloadString( 3 rules
Command and Scripting Interpreter T1059, Ingress Tool Transfer T1105, Stage Capabilities T1608
match: .downloadfile( 3 rules
Hidden Window T1564.003, OS Credential Dumping T1003, Obfuscated Files or Information T1027, Access Token Manipulation T1134, Remote System Discovery T1018, System Owner/User Discovery T1033
match: .downloadstring( 3 rules
Hidden Window T1564.003, OS Credential Dumping T1003, Obfuscated Files or Information T1027, Access Token Manipulation T1134, Remote System Discovery T1018, System Owner/User Discovery T1033
match: .dump 3 rules
Archive via Utility T1560.001
match: .hdmp 3 rules
Archive via Utility T1560.001
match: .inf 3 rules
System Binary Proxy Execution T1218, Boot or Logon Autostart Execution T1547, Command and Scripting Interpreter T1059, Exploitation for Defense Evasion T1211
match: .pdf 3 rules
Obfuscated Files or Information T1027, JavaScript T1059.007, Deobfuscate/Decode Files or Information T1140, Mshta T1218.005, Automated Collection T1119, Credentials In Files T1552.001
match: .ps 3 rules
Phishing T1566, Spearphishing Attachment T1566.001, Windows Service T1543.003, Services Registry Permissions Weakness T1574.011, Command and Scripting Interpreter T1059, Exploitation for Defense Evasion T1211
match: .ps1 3 rules
Hidden Files and Directories T1564.001, Rename Legitimate Utilities T1036.003, Ingress Tool Transfer T1105, BITS Jobs T1197, Hidden Window T1564.003
match: .reg 3 rules
Modify Registry T1112, Command and Scripting Interpreter T1059, Exploitation for Defense Evasion T1211
match: .tmp 3 rules
Obfuscated Files or Information T1027, JavaScript T1059.007, Deobfuscate/Decode Files or Information T1140, Mshta T1218.005, Rundll32 T1218.011
match: .vb 3 rules
Phishing T1566, Spearphishing Attachment T1566.001, Windows Service T1543.003, Services Registry Permissions Weakness T1574.011, Command and Scripting Interpreter T1059, Exploitation for Defense Evasion T1211
match: /C 3 rules
Distributed Component Object Model T1021.003, Windows Management Instrumentation T1047, Ingress Tool Transfer T1105, System Binary Proxy Execution T1218
match: /add 3 rules
System Owner/User Discovery T1033, Install Root Certificate T1553.004, Local Account T1087.001, Remote System Discovery T1018, Account Discovery T1087, Web Shell T1505.003
match: /r 3 rules
Windows Command Shell T1059.003, Obfuscated Files or Information T1027, PowerShell T1059.001, Windows File and Directory Permissions Modification T1222.001
match: /s 3 rules
File Deletion T1070.004, Credentials in Registry T1552.002, CMSTP T1218.003, Bypass User Account Control T1548.002
match: /user: 3 rules
System Binary Proxy Execution T1218, Indirect Command Execution T1202
match: ://1 3 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: ://2 3 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: ://3 3 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: ://4 3 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: ://5 3 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: ://6 3 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: ://7 3 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: ://8 3 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: ://9 3 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027
match: :3389 3 rules
Protocol Tunneling T1572, Remote Services T1021
match: :\Perflogs 3 rules
Windows Management Instrumentation T1047, Registry Run Keys / Startup Folder T1547.001, Rename Legitimate Utilities T1036.003, Ingress Tool Transfer T1105, BITS Jobs T1197, Scheduled Task T1053.005
match: :\Users\Default\ 3 rules
Hidden Window T1564.003, Disable or Modify System Firewall T1562.004, Scheduled Task T1053.005
match: :\Windows\System32\Tasks\ 3 rules
Trusted Developer Utilities Proxy Execution T1127, System Binary Proxy Execution T1218, Command and Scripting Interpreter T1059
match: > 3 rules
Remote Services T1021, Exfiltration Over Alternative Protocol T1048
match: Add-LocalGroupMember 3 rules
Account Manipulation T1098, Remote Desktop Protocol T1021.001, External Remote Services T1133, Local Account T1136.001
match: Add-MpPreference 3 rules
Disable or Modify Tools T1562.001
match: C:\Windows\TEMP\ 3 rules
Windows Service T1543.003, System Binary Proxy Execution T1218
match: C:\windows\system32\davclnt.dll,DavSetCookie 3 rules
Exfiltration Over Unencrypted Non-C2 Protocol T1048.003, Exploitation for Credential Access T1212
match: CATALINA_HOME 3 rules
Web Shell T1505.003, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087
match: ControlSet 3 rules
Downgrade Attack T1562.010, Services Registry Permissions Weakness T1574.011, Modify Registry T1112
match: MSExchange 3 rules
Web Shell T1505.003, Exploit Public-Facing Application T1190, Service Stop T1489, Disable or Modify Tools T1562.001
match: MiniDump 3 rules
LSASS Memory T1003.001, Masquerading T1036, Rundll32 T1218.011, OS Credential Dumping T1003, Obfuscated Files or Information T1027, Access Token Manipulation T1134
match: New-ItemProperty 3 rules
Disable or Modify Tools T1562.001
match: Out-File 3 rules
System Owner/User Discovery T1033, Command and Scripting Interpreter T1059
match: Remote Desktop Users 3 rules
Local Account T1087.001, Domain Account T1087.002, Remote Desktop Protocol T1021.001, External Remote Services T1133, Local Account T1136.001
match: Set-ItemProperty 3 rules
Disable or Modify Tools T1562.001
match: Set-MpPreference 3 rules
Disable or Modify Tools T1562.001
match: URL 3 rules
Obfuscated Files or Information T1027, Ingress Tool Transfer T1105
match: Usuarios de escritorio remoto 3 rules
Local Account T1087.001, Domain Account T1087.002, Remote Desktop Protocol T1021.001, External Remote Services T1133, Local Account T1136.001
match: Utilisateurs du Bureau à distance 3 rules
Local Account T1087.001, Domain Account T1087.002, Remote Desktop Protocol T1021.001, External Remote Services T1133, Local Account T1136.001
match: \Microsoft\Windows\Start Menu\Programs\Startup\ 3 rules
Windows Service T1543.003, Regsvcs/Regasm T1218.009
match: \Pictures\ 3 rules
Rename Legitimate Utilities T1036.003, Ingress Tool Transfer T1105, BITS Jobs T1197, Compile After Delivery T1027.004
match: accepteula 3 rules
Malware T1587.001
match: advfirewall 3 rules
Disable or Modify System Firewall T1562.004
match: catalina.jar 3 rules
Web Shell T1505.003, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087
match: cmd /k 3 rules
PowerShell T1059.001, Windows Service T1543.003, Scheduled Task T1053.005
match: cmd /r 3 rules
PowerShell T1059.001, Windows Service T1543.003, Scheduled Task T1053.005
match: cmd.exe /c 3 rules
Windows Service T1543.003, PowerShell T1059.001
match: cmd.exe /k 3 rules
Windows Service T1543.003, PowerShell T1059.001
match: cmd.exe /r 3 rules
Windows Service T1543.003, PowerShell T1059.001
match: copy 3 rules
Exfiltration to Cloud Storage T1567.002, SMB/Windows Admin Shares T1021.002, Data from Network Shared Drive T1039, Exfiltration Over Alternative Protocol T1048, Command and Scripting Interpreter T1059, Exploitation for Defense Evasion T1211
match: curl 3 rules
Compromise Software Supply Chain T1195.002, Adversary-in-the-Middle T1557, Scheduled Task T1053.005, Malicious Copy and Paste T1204.004
match: echo 3 rules
Token Impersonation/Theft T1134.001, Create Process with Token T1134.002, Command and Scripting Interpreter T1059, Exploitation for Defense Evasion T1211, Remote Services T1021
match: erase 3 rules
File Deletion T1070.004, Indicator Removal T1070
match: findstr 3 rules
Credentials In Files T1552.001, Ingress Tool Transfer T1105, System Binary Proxy Execution T1218, NTFS File Attributes T1564.004, Steal Application Access Token T1528
match: hkey_local_machine 3 rules
Query Registry T1012, Security Account Manager T1003.002, LSA Secrets T1003.004, Cached Domain Credentials T1003.005
match: hklm 3 rules
Query Registry T1012, Security Account Manager T1003.002, LSA Secrets T1003.004, Cached Domain Credentials T1003.005
match: iex 3 rules
Command and Scripting Interpreter T1059, PowerShell T1059.001
match: irm 3 rules
Command and Scripting Interpreter T1059, PowerShell T1059.001
match: localgroup 3 rules
Account Manipulation T1098, Remote Desktop Protocol T1021.001, External Remote Services T1133, Local Account T1136.001
match: new-object 3 rules
PowerShell T1059.001, Obfuscated Files or Information T1027
match: pixeldrain.com 3 rules
match: process 3 rules
Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010
match: reg 3 rules
Windows Service T1543.003, Services Registry Permissions Weakness T1574.011, NTFS File Attributes T1564.004, Modify Registry T1112
match: schtasks 3 rules
Rename Legitimate Utilities T1036.003, Scheduled Task T1053.005, Disable or Modify Tools T1562.001, Malicious Copy and Paste T1204.004
match: service 3 rules
Web Protocols T1071.001, Remote Access Tools T1219, Windows Management Instrumentation T1047
match: snapshot 3 rules
Domain Groups T1069.002, Domain Account T1087.002, Domain Trust Discovery T1482, NTDS T1003.003
match: source 3 rules
Command and Scripting Interpreter T1059
match: tunnel 3 rules
Internal Proxy T1090.001, Remote Access Tools T1219
match: urlcache 3 rules
Obfuscated Files or Information T1027, Ingress Tool Transfer T1105
match: verifyctl 3 rules
Obfuscated Files or Information T1027, Ingress Tool Transfer T1105
regex_match: \s-O\s 3 rules
ends_with: .cpl 2 rules
Control Panel T1218.002, Event Triggered Execution T1546, Rundll32 T1218.011
ends_with: .exe tunnel 2 rules
Web Protocols T1071.001, Remote Access Tools T1219
ends_with: .gif" 2 rules
ends_with: .gif' 2 rules
ends_with: .jpeg" 2 rules
ends_with: .jpeg' 2 rules
ends_with: .jpg 2 rules
Ingress Tool Transfer T1105, Regsvr32 T1218.010
ends_with: .log" 2 rules
ends_with: .log' 2 rules
ends_with: .png" 2 rules
ends_with: .png' 2 rules
ends_with: .rdp 2 rules
Remote Desktop Software T1219.002
ends_with: .rdp" 2 rules
Remote Desktop Software T1219.002
ends_with: .temp 2 rules
Ingress Tool Transfer T1105, Regsvr32 T1218.010
ends_with: .tmp 2 rules
Ingress Tool Transfer T1105, Regsvr32 T1218.010
ends_with: \rundll32.exe 2 rules
Indirect Command Execution T1202
ends_with: \sam 2 rules
Query Registry T1012
ends_with: \security 2 rules
Query Registry T1012
ends_with: \system 2 rules
Query Registry T1012
ends_with: rundll32.exe 2 rules
Exploitation for Privilege Escalation T1068, Exploitation for Client Execution T1203, Rundll32 T1218.011
match: --full 2 rules
LSASS Memory T1003.001, Masquerading T1036
match: --install 2 rules
Command and Scripting Interpreter T1059, Indirect Command Execution T1202
match: --name 2 rules
LSASS Memory T1003.001, Masquerading T1036
match: -E 2 rules
Query Registry T1012
match: -EncodedCommand 2 rules
Obfuscated Files or Information T1027, PowerShell T1059.001, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087, Web Shell T1505.003
match: -Filter \* 2 rules
System Owner/User Discovery T1033
match: -LoadDLL 2 rules
System Binary Proxy Execution T1218
match: -NoP 2 rules
OS Credential Dumping T1003, Obfuscated Files or Information T1027, Access Token Manipulation T1134, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087
match: -P 2 rules
Masquerading T1036, Remote Services T1021
match: -W Hidden 2 rules
OS Credential Dumping T1003, Obfuscated Files or Information T1027, Access Token Manipulation T1134, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087
match: -af 2 rules
System Binary Proxy Execution T1218, Indirect Command Execution T1202
match: -clsid 2 rules
Kerberoasting T1558.003
match: -ec 2 rules
PowerShell T1059.001
match: -enco 2 rules
PowerShell T1059.001
match: -g 2 rules
Cached Domain Credentials T1003.005, Account Discovery T1087, Local Account T1087.001, Domain Account T1087.002
match: -i -s cmd 2 rules
Malware T1587.001
match: -i -s powershell 2 rules
Malware T1587.001
match: -i -s pwsh 2 rules
Malware T1587.001
match: -o 2 rules
Windows Management Instrumentation T1047, Scheduled Task/Job T1053, PowerShell T1059.001, Windows Command Shell T1059.003, Brute Force T1110, Password Policy Discovery T1201
match: -p 2 rules
Archive via Utility T1560.001, Cached Domain Credentials T1003.005
match: -powershell 2 rules
System Binary Proxy Execution T1218
match: -q 2 rules
File Deletion T1070.004, Kerberoasting T1558.003
match: -r 2 rules
Command and Scripting Interpreter T1059
match: -r 2 rules
Exfiltration Over Alternative Protocol T1048, Exfiltration to Cloud Storage T1567.002, Command and Scripting Interpreter T1059
match: -remediationScript 2 rules
System Binary Proxy Execution T1218
match: -s 2 rules
File Deletion T1070.004, Account Discovery T1087, Local Account T1087.001, Domain Account T1087.002
match: -s 2 rules
Ingress Tool Transfer T1105, System Binary Proxy Execution T1218, Credentials In Files T1552.001, NTFS File Attributes T1564.004, LSASS Memory T1003.001
match: -s -i cmd 2 rules
Malware T1587.001
match: -s -i powershell 2 rules
Malware T1587.001
match: -s -i pwsh 2 rules
Malware T1587.001
match: -s cmd 2 rules
Malware T1587.001
match: -s powershell 2 rules
Malware T1587.001
match: -s pwsh 2 rules
Malware T1587.001
match: -sc 2 rules
LSASS Memory T1003.001, Pass the Ticket T1550.003, Kerberoasting T1558.003
match: -u -p 2 rules
Regsvr32 T1218.010, LSASS Memory T1003.001
match: -ur 2 rules
Ingress Tool Transfer T1105, PowerShell T1059.001
match: /c 2 rules
Dynamic-link Library Injection T1055.001
match: /change 2 rules
Scheduled Task T1053.005, Rename Legitimate Utilities T1036.003
match: /d 2 rules
Dynamic-link Library Injection T1055.001, NTFS File Attributes T1564.004
match: /decode 2 rules
OS Credential Dumping T1003, Obfuscated Files or Information T1027, Access Token Manipulation T1134, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087
match: /delete 2 rules
Rename Legitimate Utilities T1036.003, Scheduled Task T1053.005, Service Stop T1489
match: /f 2 rules
Remote Desktop Protocol T1021.001, Modify Registry T1112, Service Stop T1489
match: /i 2 rules
Modify Registry T1112
match: /o 2 rules
LSASS Memory T1003.001, NTFS File Attributes T1564.004
match: /ticket: 2 rules
OS Credential Dumping T1003, Obfuscated Files or Information T1027, Access Token Manipulation T1134, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087
match: /y 2 rules
Security Account Manager T1003.002, NTDS T1003.003, NTFS File Attributes T1564.004
match: 0x 2 rules
match: > 2 rules
System Binary Proxy Execution T1218, Command and Scripting Interpreter T1059
match: C:\ 2 rules
Regsvr32 T1218.010, PowerShell T1059.001
match: C:\Windows\ 2 rules
System Binary Proxy Execution T1218, Regsvr32 T1218.010
match: Full 2 rules
LSASS Memory T1003.001, Masquerading T1036
match: IAB 2 rules
PowerShell T1059.001
match: JAB 2 rules
PowerShell T1059.001
match: Mini 2 rules
LSASS Memory T1003.001, Masquerading T1036
match: ONCE 2 rules
Scheduled Task T1053.005
match: ONIDLE 2 rules
Scheduled Task T1053.005
match: ONLOGON 2 rules
Scheduled Task T1053.005
match: ONSTART 2 rules
Scheduled Task T1053.005
match: SQBFAFgA 2 rules
PowerShell T1059.001
match: SUVYI 2 rules
PowerShell T1059.001
match: SYSTEM 2 rules
Scheduled Task T1053.005
match: SYSTEM 2 rules
Scheduled Task T1053.005, PowerShell T1059.001
match: WithHeap 2 rules
LSASS Memory T1003.001, Masquerading T1036
match: aQBlAHgA 2 rules
PowerShell T1059.001
match: aWV4I 2 rules
PowerShell T1059.001
match: administrator 2 rules
Local Account T1087.001, Domain Account T1087.002
match: administrators 2 rules
Account Manipulation T1098, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087, Web Shell T1505.003
match: exec 2 rules
Token Impersonation/Theft T1134.001, Make and Impersonate Token T1134.003, Service Execution T1569.002
match: export 2 rules
Security Account Manager T1003.002, LSA Secrets T1003.004, Cached Domain Credentials T1003.005, NTFS File Attributes T1564.004
match: firewall 2 rules
Disable or Modify System Firewall T1562.004
match: gp 2 rules
Scheduled Task T1053.005, PowerShell T1059.001
match: group 2 rules
Local Account T1087.001, Domain Account T1087.002, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087, Web Shell T1505.003
match: i 2 rules
Proxy T1090, NTDS T1003.003
match: irm 2 rules
Ingress Tool Transfer T1105, PowerShell T1059.001
match: list 2 rules
Token Impersonation/Theft T1134.001, Make and Impersonate Token T1134.003, Windows Management Instrumentation T1047, System Information Discovery T1082
match: localgroup 2 rules
Local Account T1087.001, Domain Account T1087.002, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087, Web Shell T1505.003
match: mi 2 rules
Credentials from Web Browsers T1555.003, SMB/Windows Admin Shares T1021.002, Data from Network Shared Drive T1039, Exfiltration Over Alternative Protocol T1048
match: msiexec 2 rules
Ingress Tool Transfer T1105, Msiexec T1218.007, Masquerade Task or Service T1036.004, Match Legitimate Resource Name or Location T1036.005, Scheduled Task T1053.005
match: mssql 2 rules
Windows Management Instrumentation T1047, Scheduled Task/Job T1053, PowerShell T1059.001, Windows Command Shell T1059.003, Brute Force T1110, Password Policy Discovery T1201
match: mv 2 rules
Credentials from Web Browsers T1555.003, SMB/Windows Admin Shares T1021.002, Data from Network Shared Drive T1039, Exfiltration Over Alternative Protocol T1048
match: oudmp 2 rules
Remote System Discovery T1018, Domain Groups T1069.002, Domain Account T1087.002, Domain Trust Discovery T1482
match: p 2 rules
Proxy T1090, Network Sniffing T1040
match: recovery 2 rules
Inhibit System Recovery T1490, NTDS T1003.003
match: relay 2 rules
Steal or Forge Authentication Certificates T1649, Pass the Ticket T1550.003, Kerberoasting T1558.003
match: run 2 rules
Proxy T1090, Web Service T1102, Protocol Tunneling T1572, Internal Proxy T1090.001
match: script 2 rules
Command and Scripting Interpreter T1059
match: smb 2 rules
Windows Management Instrumentation T1047, Scheduled Task/Job T1053, PowerShell T1059.001, Windows Command Shell T1059.003, Brute Force T1110, Password Policy Discovery T1201
match: start 2 rules
Service Execution T1569.002, Protocol Tunneling T1572
match: | Select 2 rules
System Owner/User Discovery T1033
match: %2e 2 rules
match: %COMSPEC% 2 rules
BITS Jobs T1197, Token Impersonation/Theft T1134.001, Create Process with Token T1134.002
match: %TEMP% 2 rules
Disable or Modify System Firewall T1562.004, Command and Scripting Interpreter T1059
match: %TMP% 2 rules
Disable or Modify System Firewall T1562.004, Command and Scripting Interpreter T1059
match: %localappdata% 2 rules
Scheduled Task T1053.005, Windows Management Instrumentation T1047
match: && 2 rules
Obfuscated Files or Information T1027, PowerShell T1059.001
match: &cd&echo 2 rules
Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087, Web Shell T1505.003
match: --load-extension= 2 rules
Browser Extensions T1176.001
match: --meshServiceName 2 rules
Remote Desktop Software T1219.002, Rename Legitimate Utilities T1036.003
match: -AclObject 2 rules
match: -AddInRoot: 2 rules
System Binary Proxy Execution T1218
match: -BinaryPathName 2 rules
Windows Service T1543.003
match: -ComObject 2 rules
PowerShell T1059.001, Command Obfuscation T1027.010, Msiexec T1218.007, Ingress Tool Transfer T1105, System Binary Proxy Execution T1218
match: -GetCACAPS 2 rules
Ingress Tool Transfer T1105
match: -PipelineRoot: 2 rules
System Binary Proxy Execution T1218
match: -SecurityDescriptorSddl 2 rules
Services Registry Permissions Weakness T1574.011, Windows Service T1543.003
match: -a 2 rules
Password Cracking T1110.002, System Binary Proxy Execution T1218
match: -c 2 rules
Disable or Modify Tools T1562.001, Archive Collected Data T1560, Archive via Utility T1560.001
match: -connector-id 2 rules
Proxy T1090, Web Service T1102, Protocol Tunneling T1572, Internal Proxy T1090.001
match: -credentials-contents 2 rules
Proxy T1090, Web Service T1102, Protocol Tunneling T1572, Internal Proxy T1090.001
match: -credentials-file 2 rules
Proxy T1090, Web Service T1102, Protocol Tunneling T1572, Internal Proxy T1090.001
match: -j 2 rules
Msiexec T1218.007
match: -m 2 rules
Command and Scripting Interpreter T1059, System Binary Proxy Execution T1218
match: -o 2 rules
Ingress Tool Transfer T1105, System Binary Proxy Execution T1218, Scheduled Task T1053.005
match: -p 2 rules
Windows Remote Management T1021.006, Brute Force T1110, Password Guessing T1110.001
match: -package 2 rules
Msiexec T1218.007
match: -path 2 rules
Domain Accounts T1078.002, Account Manipulation T1098, Hijack Execution Flow T1574
match: -q 2 rules
Msiexec T1218.007
match: -s 2 rules
OS Credential Dumping T1003, CMSTP T1218.003, Bypass User Account Control T1548.002
match: -sc u: 2 rules
Remote System Discovery T1018, Domain Groups T1069.002, Domain Account T1087.002, Domain Trust Discovery T1482
match: -sd 2 rules
Services Registry Permissions Weakness T1574.011, Windows Service T1543.003
match: -subnets -f 2 rules
Remote System Discovery T1018, Domain Groups T1069.002, Domain Account T1087.002, Domain Trust Discovery T1482
match: -token 2 rules
Proxy T1090, Web Service T1102, Protocol Tunneling T1572, Internal Proxy T1090.001
match: -url 2 rules
Internal Proxy T1090.001
match: .00x 2 rules
match: .0x 2 rules
match: .7z 2 rules
Rename Legitimate Utilities T1036.003, Ingress Tool Transfer T1105, BITS Jobs T1197, JavaScript T1059.007, Deobfuscate/Decode Files or Information T1140, Mshta T1218.005
match: .DownloadFile 2 rules
Scheduled Task T1053.005, Remote Access Tools T1219
match: .DownloadString 2 rules
Scheduled Task T1053.005, Remote Access Tools T1219
match: .bmp 2 rules
JavaScript T1059.007, Deobfuscate/Decode Files or Information T1140, Mshta T1218.005, Rundll32 T1218.011
match: .chm 2 rules
Rename Legitimate Utilities T1036.003, Ingress Tool Transfer T1105, BITS Jobs T1197, Compiled HTML File T1218.001
match: .csv 2 rules
JavaScript T1059.007, Deobfuscate/Decode Files or Information T1140, Mshta T1218.005, Visual Basic T1059.005
match: .dat 2 rules
Regsvcs/Regasm T1218.009, Visual Basic T1059.005, JavaScript T1059.007
match: .dll 2 rules
PowerShell T1059.001, Rundll32 T1218.011
match: .dll" 2 rules
Ingress Tool Transfer T1105, Rundll32 T1218.011
match: .dmp 2 rules
LSASS Memory T1003.001, Masquerading T1036
match: .exe tunnel 2 rules
Web Protocols T1071.001, Remote Access Tools T1219
match: .jar 2 rules
Windows Service T1543.003, Services Registry Permissions Weakness T1574.011, Command and Scripting Interpreter T1059, Exploitation for Defense Evasion T1211
match: .lnk 2 rules
JavaScript T1059.007, Deobfuscate/Decode Files or Information T1140, Mshta T1218.005, PowerShell T1059.001
match: .log 2 rules
Rename Legitimate Utilities T1036.003, Ingress Tool Transfer T1105, BITS Jobs T1197, JavaScript T1059.007, Deobfuscate/Decode Files or Information T1140, Mshta T1218.005
match: .mp3 2 rules
Obfuscated Files or Information T1027, JavaScript T1059.007, Deobfuscate/Decode Files or Information T1140, Mshta T1218.005
match: .pl 2 rules
Windows Service T1543.003, Services Registry Permissions Weakness T1574.011, Command and Scripting Interpreter T1059, Exploitation for Defense Evasion T1211
match: .rar 2 rules
Rename Legitimate Utilities T1036.003, Ingress Tool Transfer T1105, BITS Jobs T1197, JavaScript T1059.007, Deobfuscate/Decode Files or Information T1140, Mshta T1218.005
match: .rsp 2 rules
Odbcconf T1218.008
match: .rtf 2 rules
JavaScript T1059.007, Deobfuscate/Decode Files or Information T1140, Mshta T1218.005, Automated Collection T1119, Credentials In Files T1552.001
match: .sdb 2 rules
Application Shimming T1546.011
match: .sh 2 rules
Windows Service T1543.003, Services Registry Permissions Weakness T1574.011, Command and Scripting Interpreter T1059, Exploitation for Defense Evasion T1211
match: .wsf 2 rules
Rename Legitimate Utilities T1036.003, Ingress Tool Transfer T1105, BITS Jobs T1197, Visual Basic T1059.005, JavaScript T1059.007
match: .wsh 2 rules
Rename Legitimate Utilities T1036.003, Ingress Tool Transfer T1105, BITS Jobs T1197, Phishing T1566, Spearphishing Attachment T1566.001
match: .yml 2 rules
JavaScript T1059.007, Deobfuscate/Decode Files or Information T1140, Mshta T1218.005, Protocol Tunneling T1572
match: /../../ 2 rules
Windows Command Shell T1059.003
match: //0x 2 rules
match: /Create 2 rules
Scheduled Task T1053.005
match: /TN TVInstallRestore 2 rules
Scheduled Task T1053.005, PowerShell T1059.001
match: /c 2 rules
PowerShell T1059.001, Remote Desktop Software T1219.002
match: /d 2 rules
Disable or Modify Tools T1562.001, Screensaver T1546.002
match: /d /c 2 rules
Web Protocols T1071.001, Remote Access Tools T1219
match: /d 0 2 rules
Screensaver T1546.002, Hidden Users T1564.002
match: /d 1 2 rules
Modify Registry T1112, Internal Defacement T1491.001, Screensaver T1546.002
match: /disable 2 rules
Inhibit System Recovery T1490, Service Stop T1489
match: /f 2 rules
Data Encrypted for Impact T1486, Screensaver T1546.002
match: /f 2 rules
Credentials in Registry T1552.002, Windows File and Directory Permissions Modification T1222.001
match: /lng 2 rules
Network Service Discovery T1046, Network Share Discovery T1135
match: /pass: 2 rules
Indirect Command Execution T1202, System Binary Proxy Execution T1218
match: /portable 2 rules
Network Service Discovery T1046, Network Share Discovery T1135
match: /q 2 rules
File Deletion T1070.004, Windows Command Shell T1059.003, Visual Basic T1059.005, JavaScript T1059.007
match: /t 2 rules
Disable or Modify Tools T1562.001, Credentials in Registry T1552.002
match: /t REG_SZ 2 rules
Modify Registry T1112, Internal Defacement T1491.001, Screensaver T1546.002
match: /v 2 rules
Disable or Modify Tools T1562.001, System Information Discovery T1082
match: 127.0.0.1 2 rules
OS Credential Dumping T1003, Obfuscated Files or Information T1027, Access Token Manipulation T1134, Windows Management Instrumentation T1047
match: ://7- 2 rules
Rename Legitimate Utilities T1036.003, BITS Jobs T1197, Obfuscated Files or Information T1027, Ingress Tool Transfer T1105
match: ::FromBase64String 2 rules
PowerShell T1059.001, Deobfuscate/Decode Files or Information T1140
match: :\Tmp\ 2 rules
Scheduled Task T1053.005, Visual Basic T1059.005, JavaScript T1059.007
match: :\Windows\ 2 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, BITS Jobs T1197
match: :\Windows\Temp 2 rules
Windows Management Instrumentation T1047, Registry Run Keys / Startup Folder T1547.001, Scheduled Task T1053.005
match: :\Windows\Tracing\ 2 rules
Remote Desktop Software T1219.002, Odbcconf T1218.008
match: :\Windows\UUS\Packages\Preview\amd64\updatedeploy.dll /ClassId 2 rules
System Binary Proxy Execution T1218
match: :\Windows\UUS\amd64\UpdateDeploy.dll /ClassId 2 rules
System Binary Proxy Execution T1218
match: :\Windows\WinSxS\ 2 rules
System Binary Proxy Execution T1218
match: ; 2 rules
System Script Proxy Execution T1216, PowerShell T1059.001, System Binary Proxy Execution T1218
match: ;BA 2 rules
Windows Service T1543.003
match: ;IU 2 rules
Windows Service T1543.003
match: ;SU 2 rules
Windows Service T1543.003
match: ;SY 2 rules
Windows Service T1543.003
match: ;WD 2 rules
Windows Service T1543.003
match: Add-Content 2 rules
System Owner/User Discovery T1033
match: Add-PSSnapin 2 rules
PowerShell T1059.001, Email Collection T1114
match: Allow 2 rules
Disable or Modify Tools T1562.001
match: Antivirus 2 rules
Disable or Modify Tools T1562.001, Service Stop T1489
match: Bookmarks 2 rules
Data from Local System T1005, Steal Web Session Cookie T1539, Credentials from Web Browsers T1555.003, Browser Information Discovery T1217
match: Bypass 2 rules
PowerShell T1059.001
match: C:\ProgramData\Microsoft\WSL\wslg.rdp 2 rules
Remote Desktop Protocol T1021.001, Remote Desktop Software T1219.002
match: C:\Users\Public 2 rules
Windows Service T1543.003
match: Control_RunDLL 2 rules
Rundll32 T1218.011
match: Cookies 2 rules
Data from Local System T1005, Steal Web Session Cookie T1539, Credentials from Web Browsers T1555.003, Browser Information Discovery T1217
match: DCLCWPDTSD 2 rules
Services Registry Permissions Weakness T1574.011
match: DownloadFile 2 rules
Ingress Tool Transfer T1105, System Binary Proxy Execution T1218
match: EnableVirtualizationBasedSecurity 2 rules
Disable or Modify Tools T1562.001
match: Exchange Trusted Subsystem 2 rules
Local Account T1087.001, Domain Account T1087.002
match: FailureCommand 2 rules
Windows Service T1543.003, Services Registry Permissions Weakness T1574.011, Modify Registry T1112
match: Find-GPOLocation 2 rules
Domain Groups T1069.002, Domain Trust Discovery T1482, System Owner/User Discovery T1033, System Network Connections Discovery T1049, Network Share Discovery T1135, PowerShell T1059.001
match: Get-ChildItem 2 rules
Private Keys T1552.004
match: Get-Content 2 rules
NTFS File Attributes T1564.004, PowerShell T1059.001
match: Get-ItemProperty 2 rules
Scheduled Task T1053.005, PowerShell T1059.001
match: HIGHEST 2 rules
Scheduled Task T1053.005
match: HKCU: 2 rules
Scheduled Task T1053.005, PowerShell T1059.001
match: HKEY_ 2 rules
Scheduled Task T1053.005, PowerShell T1059.001
match: HKLM: 2 rules
Scheduled Task T1053.005, PowerShell T1059.001
match: History 2 rules
Data from Local System T1005, Steal Web Session Cookie T1539, Credentials from Web Browsers T1555.003, Browser Information Discovery T1217
match: INSTALLDRIVER 2 rules
Odbcconf T1218.008
match: IWR 2 rules
PowerShell T1059.001, Ingress Tool Transfer T1105, Remote Access Tools T1219
match: ImagePath 2 rules
Windows Service T1543.003, Services Registry Permissions Weakness T1574.011, Modify Registry T1112
match: Import-Module 2 rules
match: InstallProduct( 2 rules
PowerShell T1059.001, Command Obfuscation T1027.010, Msiexec T1218.007, Ingress Tool Transfer T1105, System Binary Proxy Execution T1218
match: Invoke-ACLScanner 2 rules
Domain Groups T1069.002, Domain Trust Discovery T1482, System Owner/User Discovery T1033, System Network Connections Discovery T1049, Network Share Discovery T1135, PowerShell T1059.001
match: Invoke-Command 2 rules
Rundll32 T1218.011, Indirect Command Execution T1202, System Binary Proxy Execution T1218
match: Invoke-Expression 2 rules
Command and Scripting Interpreter T1059, Rundll32 T1218.011
match: Invoke-Kerberoast 2 rules
Windows Command Shell T1059.003, System Owner/User Discovery T1033, System Network Connections Discovery T1049, Domain Groups T1069.002, Network Share Discovery T1135, Domain Trust Discovery T1482
match: Invoke-Nightmare 2 rules
Windows Command Shell T1059.003, PowerShell T1059.001, Permission Groups Discovery T1069, Local Groups T1069.001, Domain Groups T1069.002, Account Discovery T1087
match: Invoke-RestMethod 2 rules
PowerShell T1059.001, Ingress Tool Transfer T1105, Command and Scripting Interpreter T1059
match: Invoke-Tater 2 rules
LLMNR/NBT-NS Poisoning and SMB Relay T1557.001, PowerShell T1059.001, Permission Groups Discovery T1069, Local Groups T1069.001, Domain Groups T1069.002, Account Discovery T1087
match: Invoke-UserHunter 2 rules
Windows Command Shell T1059.003, PowerShell T1059.001, Permission Groups Discovery T1069, Local Groups T1069.001, Domain Groups T1069.002, Account Discovery T1087
match: LaunchApplication 2 rules
Rundll32 T1218.011
match: Login Data 2 rules
Data from Local System T1005, Steal Web Session Cookie T1539, Credentials from Web Browsers T1555.003, Browser Information Discovery T1217
match: New-Service 2 rules
Windows Service T1543.003
match: REGSVR 2 rules
Odbcconf T1218.008
match: Set-Acl 2 rules
match: Set-Content 2 rules
System Owner/User Discovery T1033
match: Set-Service 2 rules
Services Registry Permissions Weakness T1574.011, Windows Service T1543.003
match: Shell32.dll 2 rules
Rundll32 T1218.011
match: ShellExec_RunDLL 2 rules
Rundll32 T1218.011
match: Start-BitsTransfer 2 rules
Ingress Tool Transfer T1105, Stage Capabilities T1608, PowerShell T1059.001
match: Stop-Service 2 rules
Service Stop T1489, Disable or Modify Tools T1562.001
match: Unrestricted 2 rules
PowerShell T1059.001
match: WinDefend 2 rules
Disable or Modify Tools T1562.001, Service Stop T1489
match: \AppData\Roaming\Temp 2 rules
Command and Scripting Interpreter T1059
match: \Appdata\Local\Temp\ 2 rules
System Binary Proxy Execution T1218
match: \DavWWWRoot\ 2 rules
PowerShell T1059.001, User Execution T1204
match: \Music\ 2 rules
Rename Legitimate Utilities T1036.003, Ingress Tool Transfer T1105, BITS Jobs T1197, Hidden Window T1564.003
match: \PerfLogs\ 2 rules
Obfuscated Files or Information T1027, Regsvcs/Regasm T1218.009
match: \ProgramData\ 2 rules
Hidden Files and Directories T1564.001, System Binary Proxy Execution T1218
match: \SYSTEM\CurrentControlSet\Control\SafeBoot 2 rules
Disable or Modify Tools T1562.001
match: \Software\Aerofox\FoxmailPreview 2 rules
Credentials in Registry T1552.002
match: \Software\Aerofox\Foxmail\V3.1 2 rules
Credentials in Registry T1552.002
match: \Software\DownloadManager\Passwords 2 rules
Credentials in Registry T1552.002
match: \Software\FTPWare\COREFTP\Sites 2 rules
Credentials in Registry T1552.002
match: \Software\IncrediMail\Identities 2 rules
Credentials in Registry T1552.002
match: \Software\Martin Prikryl\WinSCP 2\Sessions 2 rules
Credentials in Registry T1552.002
match: \Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 2 rules
Registry Run Keys / Startup Folder T1547.001, Windows Management Instrumentation T1047
match: \Software\ORL\WinVNC3\Password 2 rules
Credentials in Registry T1552.002
match: \Software\OpenSSH\Agent\Keys 2 rules
Credentials in Registry T1552.002
match: \Software\OpenVPN-GUI\configs 2 rules
Credentials in Registry T1552.002
match: \Software\Qualcomm\Eudora\CommandLine 2 rules
Credentials in Registry T1552.002
match: \Software\RealVNC\WinVNC4 2 rules
Credentials in Registry T1552.002
match: \Software\RimArts\B2\Settings 2 rules
Credentials in Registry T1552.002
match: \Software\SimonTatham\PuTTY\Sessions 2 rules
Credentials in Registry T1552.002
match: \Software\Sota\FFFTP 2 rules
Credentials in Registry T1552.002
match: \Software\TightVNC\Server 2 rules
Credentials in Registry T1552.002
match: \Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 2 rules
Registry Run Keys / Startup Folder T1547.001, Windows Management Instrumentation T1047
match: \Software\WOW6432Node\Radmin\v3.0\Server\Parameters\Radmin 2 rules
Credentials in Registry T1552.002
match: \System\CurrentControlSet\Control\Lsa 2 rules
Modify Registry T1112
match: \UpdateDeploy.dll /ClassId 2 rules
System Binary Proxy Execution T1218
match: \Videos\ 2 rules
Rename Legitimate Utilities T1036.003, Ingress Tool Transfer T1105, BITS Jobs T1197, Hidden Window T1564.003
match: \WINDOWS\Temp\ 2 rules
System Binary Proxy Execution T1218, Scheduled Task T1053.005
match: \Windows\BitLocker 2 rules
Service Stop T1489
match: \Windows\ExploitGuard 2 rules
Service Stop T1489
match: \Windows\NTDS\NTDS.dit 2 rules
NTDS T1003.003
match: \Windows\SystemRestore\SR 2 rules
Service Stop T1489
match: \Windows\Temp 2 rules
Command and Scripting Interpreter T1059
match: \Windows\UpdateOrchestrator\ 2 rules
Service Stop T1489
match: \Windows\Windows Defender\ 2 rules
Service Stop T1489
match: \Windows\WindowsBackup\ 2 rules
Service Stop T1489
match: \Windows\WindowsUpdate\ 2 rules
Service Stop T1489
match: \\\\\?\\GLOBALROOT\\Device\\HarddiskVolumeShadowCopy 2 rules
Inhibit System Recovery T1490
match: \catalina_start.bat 2 rules
Process Discovery T1057, Process Injection T1055
match: \config\SAM 2 rules
NTDS T1003.003
match: \config\SECURITY 2 rules
NTDS T1003.003
match: \config\SYSTEM 2 rules
NTDS T1003.003
match: \dismhost.exe { 2 rules
Inhibit System Recovery T1490, Bypass User Account Control T1548.002
match: \servers\Stable- 2 rules
Web Protocols T1071.001, Remote Access Tools T1219
match: \software\ 2 rules
Software Discovery T1518
match: \windows\ntds\ntds.dit 2 rules
NTDS T1003.003, Security Account Manager T1003.002
match: \xampp\ 2 rules
Process Discovery T1057, Process Injection T1055
match: account 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: adinfo 2 rules
Remote System Discovery T1018, Domain Groups T1069.002, Domain Account T1087.002, Domain Trust Discovery T1482
match: anti-bot 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: botcheck 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: bypass 2 rules
match: captcha 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: cat 2 rules
PowerShell T1059.001
match: challenge 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: cleanup 2 rules
Proxy T1090, Web Service T1102, Protocol Tunneling T1572, Internal Proxy T1090.001
match: cmd 2 rules
Windows Service T1543.003
match: cmd.exe 2 rules
BITS Jobs T1197, Distributed Component Object Model T1021.003, Windows Management Instrumentation T1047
match: code-server.cmd 2 rules
Web Protocols T1071.001, Remote Access Tools T1219
match: collect 2 rules
System Binary Proxy Execution T1218
match: computer_pwdnotreqd 2 rules
Remote System Discovery T1018, Domain Groups T1069.002, Domain Account T1087.002, Domain Trust Discovery T1482
match: computers_active 2 rules
Remote System Discovery T1018, Domain Groups T1069.002, Domain Account T1087.002, Domain Trust Discovery T1482
match: computers_pwdnotreqd 2 rules
Remote System Discovery T1018, Domain Groups T1069.002, Domain Account T1087.002, Domain Trust Discovery T1482
match: comsvcs 2 rules
LSASS Memory T1003.001, Masquerading T1036, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087, Web Shell T1505.003
match: config 2 rules
System Network Configuration Discovery T1016, Windows Service T1543.003, Services Registry Permissions Weakness T1574.011
match: confirmation 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: cookies.sqlite 2 rules
Data from Local System T1005, Steal Web Session Cookie T1539, Browser Information Discovery T1217
match: dcmodes 2 rules
Remote System Discovery T1018, Domain Groups T1069.002, Domain Account T1087.002, Domain Trust Discovery T1482
match: diantz.exe 2 rules
NTFS File Attributes T1564.004, Ingress Tool Transfer T1105
match: disable 2 rules
Disable Windows Event Logging T1562.002, Disable or Modify System Firewall T1562.004
match: dllhost 2 rules
Windows Service T1543.003
match: domain admins 2 rules
Local Account T1087.001, Domain Account T1087.002
match: domainlist 2 rules
Remote System Discovery T1018, Domain Groups T1069.002, Domain Account T1087.002, Domain Trust Discovery T1482
match: domainncs 2 rules
Remote System Discovery T1018, Domain Groups T1069.002, Domain Account T1087.002, Domain Trust Discovery T1482
match: dompol 2 rules
Remote System Discovery T1018, Domain Groups T1069.002, Domain Account T1087.002, Domain Trust Discovery T1482
match: dpapi:: 2 rules
LSASS Memory T1003.001, Security Account Manager T1003.002, LSA Secrets T1003.004, Cached Domain Credentials T1003.005, DCSync T1003.006, OS Credential Dumping T1003
match: echo 2 rules
Remote Desktop Software T1219.002, DLL T1574.001
match: encodedcommand 2 rules
Scheduled Task T1053.005, PowerShell T1059.001
match: enterprise admins 2 rules
Local Account T1087.001, Domain Account T1087.002
match: export 2 rules
Credentials in Registry T1552.002
match: extrac32.exe 2 rules
Ingress Tool Transfer T1105, NTFS File Attributes T1564.004
match: failure 2 rules
Services Registry Permissions Weakness T1574.011, Windows Service T1543.003
match: file createnew 2 rules
Command and Scripting Interpreter T1059, Exploitation for Defense Evasion T1211, DLL T1574.001
match: finger 2 rules
Compromise Software Supply Chain T1195.002, Adversary-in-the-Middle T1557, Malicious Copy and Paste T1204.004
match: firewall 2 rules
Disable or Modify System Firewall T1562.004, System Network Configuration Discovery T1016
match: for 2 rules
Obfuscated Files or Information T1027, PowerShell T1059.001, Deobfuscate/Decode Files or Information T1140, Remote System Discovery T1018, Command and Scripting Interpreter T1059
match: forfiles 2 rules
Compromise Software Supply Chain T1195.002, Adversary-in-the-Middle T1557, Scheduled Task T1053.005
match: fraud 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: fspdmp 2 rules
Remote System Discovery T1018, Domain Groups T1069.002, Domain Account T1087.002, Domain Trust Discovery T1482
match: ftp 2 rules
Exfiltration to Cloud Storage T1567.002, Regsvr32 T1218.010
match: gatherNetworkInfo.vbs 2 rules
Visual Basic T1059.005, Group Policy Discovery T1615
match: gpodmp 2 rules
Remote System Discovery T1018, Domain Groups T1069.002, Domain Account T1087.002, Domain Trust Discovery T1482
match: http://% 2 rules
match: human 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: identification 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: identificator 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: identity 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: iex 2 rules
match: import 2 rules
Indicator Removal T1070, Bootkit T1542.003, Command Obfuscation T1027.010, Python T1059.006
match: interactive 2 rules
At T1053.002, Kerberoasting T1558.003
match: internal-run 2 rules
Web Protocols T1071.001, Remote Access Tools T1219
match: ipmo 2 rules
match: itemtype:File 2 rules
Inhibit System Recovery T1490, NTDS T1003.003
match: keepVersions:0 2 rules
Inhibit System Recovery T1490
match: kerberos:: 2 rules
LSASS Memory T1003.001, Security Account Manager T1003.002, LSA Secrets T1003.004, Cached Domain Credentials T1003.005, DCSync T1003.006, OS Credential Dumping T1003
match: lsadump:: 2 rules
LSASS Memory T1003.001, Security Account Manager T1003.002, LSA Secrets T1003.004, Cached Domain Credentials T1003.005, DCSync T1003.006, OS Credential Dumping T1003
match: mklink 2 rules
Accessibility Features T1546.008, Security Account Manager T1003.002, NTDS T1003.003
match: move 2 rules
Credentials from Web Browsers T1555.003, SMB/Windows Admin Shares T1021.002, Data from Network Shared Drive T1039, Exfiltration Over Alternative Protocol T1048
match: name="Domain Admins" 2 rules
Remote System Discovery T1018, Domain Groups T1069.002, Domain Account T1087.002, Domain Trust Discovery T1482
match: ni 2 rules
Modify Registry T1112, Disable Windows Event Logging T1562.002, Change Default File Association T1546.001, Bypass User Account Control T1548.002
match: nslookup 2 rules
System Information Discovery T1082, Account Discovery T1087, Remote System Discovery T1018, Command and Scripting Interpreter T1059
match: objectcategory= 2 rules
Remote System Discovery T1018, Domain Groups T1069.002, Domain Account T1087.002, Domain Trust Discovery T1482
match: osk.exe 2 rules
Accessibility Features T1546.008
match: paexec 2 rules
Malware T1587.001
match: passphrase 2 rules
match: path 2 rules
JavaScript T1059.007, Windows Management Instrumentation T1047, System Information Discovery T1082
match: places.sqlite 2 rules
Data from Local System T1005, Steal Web Session Cookie T1539, Browser Information Discovery T1217
match: powershell.exe 2 rules
Windows Command Shell T1059.003, PowerShell T1059.001
match: privilege:: 2 rules
LSASS Memory T1003.001, Security Account Manager T1003.002, LSA Secrets T1003.004, Cached Domain Credentials T1003.005, DCSync T1003.006, OS Credential Dumping T1003
match: process 2 rules
Windows Management Instrumentation T1047, Disable or Modify Tools T1562.001
match: pwsh.exe 2 rules
Windows Command Shell T1059.003, PowerShell T1059.001
match: recoveryTarget 2 rules
Inhibit System Recovery T1490, NTDS T1003.003
match: registry:: 2 rules
Scheduled Task T1053.005, PowerShell T1059.001
match: regsvr32.exe 2 rules
BITS Jobs T1197, Scheduled Task T1053.005
match: robot 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: root 2 rules
Install Root Certificate T1553.004
match: rpc:: 2 rules
LSASS Memory T1003.001, Security Account Manager T1003.002, LSA Secrets T1003.004, Cached Domain Credentials T1003.005, DCSync T1003.006, OS Credential Dumping T1003
match: rule 2 rules
Disable or Modify System Firewall T1562.004
match: save 2 rules
Credentials in Registry T1552.002
match: sekurlsa:: 2 rules
LSASS Memory T1003.001, Security Account Manager T1003.002, LSA Secrets T1003.004, Cached Domain Credentials T1003.005, DCSync T1003.006, OS Credential Dumping T1003
match: sethc.exe 2 rules
Accessibility Features T1546.008
match: shadow 2 rules
OS Credential Dumping T1003, Security Account Manager T1003.002, NTDS T1003.003, Indicator Removal T1070, Inhibit System Recovery T1490
match: shell32.dll 2 rules
Rundll32 T1218.011
match: sp 2 rules
Disable or Modify Tools T1562.001, Indicator Blocking T1562.006, Modify Registry T1112, Change Default File Association T1546.001, Bypass User Account Control T1548.002
match: start=disabled 2 rules
Disable or Modify Tools T1562.001, Service Stop T1489
match: subnetdmp 2 rules
Remote System Discovery T1018, Domain Groups T1069.002, Domain Account T1087.002, Domain Trust Discovery T1482
match: svchost 2 rules
Windows Service T1543.003
match: sysmon 2 rules
Indicator Removal T1070, Impair Defenses T1562, Disable Windows Event Logging T1562.002, Service Stop T1489, Disable or Modify Tools T1562.001
match: token:: 2 rules
LSASS Memory T1003.001, Security Account Manager T1003.002, LSA Secrets T1003.004, Cached Domain Credentials T1003.005, DCSync T1003.006, OS Credential Dumping T1003
match: trace 2 rules
Network Sniffing T1040, Indicator Removal T1070, Indicator Blocking T1562.006
match: trustdmp 2 rules
Remote System Discovery T1018, Domain Groups T1069.002, Domain Account T1087.002, Domain Trust Discovery T1482
match: tunnel 2 rules
Web Protocols T1071.001, Remote Access Tools T1219
match: tunnel-service.log 2 rules
Web Protocols T1071.001, Remote Access Tools T1219
match: type 2 rules
Windows Service T1543.003, Command and Scripting Interpreter T1059, Exploitation for Defense Evasion T1211
match: uninstall 2 rules
Windows Management Instrumentation T1047, Disable or Modify Tools T1562.001
match: unload 2 rules
Indicator Removal T1070, Impair Defenses T1562, Disable Windows Event Logging T1562.002
match: update 2 rules
Network Service Discovery T1046, Indicator Removal T1070, Indicator Blocking T1562.006
match: useraccount 2 rules
System Owner/User Discovery T1033, Local Account T1087.001, Windows Management Instrumentation T1047, Account Manipulation T1098
match: users_noexpire 2 rules
Remote System Discovery T1018, Domain Groups T1069.002, Domain Account T1087.002, Domain Trust Discovery T1482
match: utilman.exe 2 rules
Accessibility Features T1546.008
match: validation 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: vbscript 2 rules
JavaScript T1059.007, Deobfuscate/Decode Files or Information T1140, Mshta T1218.005, Scheduled Task T1053.005
match: verification 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: verify 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: wget 2 rules
Compromise Software Supply Chain T1195.002, Adversary-in-the-Middle T1557, Malicious Copy and Paste T1204.004
match: winrm 2 rules
System Script Proxy Execution T1216
match: wmic 2 rules
Scheduled Task T1053.005
match: wmic.exe 2 rules
Scheduled Task T1053.005
match: zzzzInvokeManagedCustomActionOutOfProc 2 rules
System Binary Proxy Execution T1218, Rundll32 T1218.011
match: ☂️ 2 rules
match: 2 rules
match: ❤️‍🔥 2 rules
match: ❤️‍🩹 2 rules
match: 😮‍💨 2 rules
match: 😵‍💫 2 rules
match: 😶‍🌫️ 2 rules
match: 🛝 2 rules
match: 🛞 2 rules
match: 🛟 2 rules
match: 🟰 2 rules
match: 🥹 2 rules
match: 🦴 2 rules
match: 🧌 2 rules
match: 🧔‍♀️ 2 rules
match: 🧔‍♂️ 2 rules
match: 🧔🏻‍♀️ 2 rules
match: 🧔🏻‍♂️ 2 rules
match: 🧔🏼‍♀️ 2 rules
match: 🧔🏼‍♂️ 2 rules
match: 🧔🏽‍♀️ 2 rules
match: 🧔🏽‍♂️ 2 rules
match: 🧔🏾‍♀️ 2 rules
match: 🧔🏾‍♂️ 2 rules
match: 🧔🏿‍♀️ 2 rules
match: 🧔🏿‍♂️ 2 rules
match: 🩰 2 rules
match: 🩸 2 rules
match: 🩻 2 rules
match: 🩼 2 rules
match: 🪩 2 rules
match: 🪪 2 rules
match: 🪫 2 rules
match: 🪬 2 rules
match: 🪷 2 rules
match: 🪸 2 rules
match: 🪹 2 rules
match: 🪺 2 rules
match: 🫃 2 rules
match: 🫃🏻 2 rules
match: 🫃🏼 2 rules
match: 🫃🏽 2 rules
match: 🫃🏾 2 rules
match: 🫃🏿 2 rules
match: 🫄 2 rules
match: 🫄🏻 2 rules
match: 🫄🏼 2 rules
match: 🫄🏽 2 rules
match: 🫄🏾 2 rules
match: 🫄🏿 2 rules
match: 🫅 2 rules
match: 🫅🏻 2 rules
match: 🫅🏼 2 rules
match: 🫅🏽 2 rules
match: 🫅🏾 2 rules
match: 🫅🏿 2 rules
match: 🫗 2 rules
match: 🫘 2 rules
match: 🫙 2 rules
match: 🫡 2 rules
match: 🫢 2 rules
match: 🫣 2 rules
match: 🫥 2 rules
match: 🫦 2 rules
match: 🫧 2 rules
match: 🫰 2 rules
match: 🫰🏻 2 rules
match: 🫰🏼 2 rules
match: 🫰🏽 2 rules
match: 🫰🏾 2 rules
match: 🫰🏿 2 rules
match: 🫱 2 rules
match: 🫱🏻 2 rules
match: 🫱🏼 2 rules
match: 🫱🏽 2 rules
match: 🫱🏾 2 rules
match: 🫱🏿 2 rules
match: 🫲 2 rules
match: 🫲🏻 2 rules
match: 🫲🏼 2 rules
match: 🫲🏽 2 rules
match: 🫲🏾 2 rules
match: 🫲🏿 2 rules
match: 🫳 2 rules
match: 🫳🏻 2 rules
match: 🫳🏼 2 rules
match: 🫳🏽 2 rules
match: 🫳🏾 2 rules
match: 🫳🏿 2 rules
match: 🫴 2 rules
match: 🫴🏻 2 rules
match: 🫴🏼 2 rules
match: 🫴🏽 2 rules
match: 🫴🏾 2 rules
match: 🫴🏿 2 rules
match: 🫵 2 rules
match: 🫵🏻 2 rules
match: 🫵🏼 2 rules
match: 🫵🏽 2 rules
match: 🫵🏾 2 rules
match: 🫵🏿 2 rules
match: 🫶 2 rules
match: 🫶🏻 2 rules
match: 🫶🏼 2 rules
match: 🫶🏽 2 rules
match: 🫶🏾 2 rules
match: 🫶🏿 2 rules
ne: unknown 2 rules
Break Process Trees T1036.009, Bootkit T1542.003
regex_match: [0-7]{7,13} 2 rules
regex_match: ://\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3} 2 rules
Exfiltration Over Unencrypted Non-C2 Protocol T1048.003, Command and Scripting Interpreter T1059
regex_match: :[^\\] 2 rules
NTFS File Attributes T1564.004
regex_match: https?://((25[0-5]|(2[0-4]|1\d|[1-9])?\d)(\.|\b)){4} 2 rules
regex_match: https?://(0[0-9]{1,11}\.){3}0[0-9]{1,11} 2 rules
regex_match: https?://0[0-9]{1,11} 2 rules
regex_match: https?://0[0-9]{3,11} 2 rules
regex_match: https?://[0-9]{1,3}\.0[0-9]{3,7} 2 rules
regex_match: https?://[0-9]{1,3}\.[0-9]{1,3}\.0[0-9]{3,4} 2 rules

Image 619 entries

ends_with: \powershell.exe 143 rules
PowerShell T1059.001, System Binary Proxy Execution T1218, Disable or Modify Tools T1562.001, Command and Scripting Interpreter T1059, Obfuscated Files or Information T1027, Windows Management Instrumentation T1047
ends_with: \pwsh.exe 140 rules
PowerShell T1059.001, System Binary Proxy Execution T1218, Command and Scripting Interpreter T1059, Disable or Modify Tools T1562.001, Obfuscated Files or Information T1027, Windows Management Instrumentation T1047
ends_with: \cmd.exe 92 rules
System Binary Proxy Execution T1218, Windows Command Shell T1059.003, Command and Scripting Interpreter T1059, Exploit Public-Facing Application T1190, PowerShell T1059.001, Web Shell T1505.003
ends_with: \rundll32.exe 76 rules
Rundll32 T1218.011, System Binary Proxy Execution T1218, Masquerading T1036, Regsvr32 T1218.010, Exploitation for Client Execution T1203, Windows Management Instrumentation T1047
ends_with: \cscript.exe 64 rules
System Binary Proxy Execution T1218, Visual Basic T1059.005, Command and Scripting Interpreter T1059, JavaScript T1059.007, Spearphishing Attachment T1566.001, Indirect Command Execution T1202
ends_with: \wscript.exe 64 rules
System Binary Proxy Execution T1218, Visual Basic T1059.005, Command and Scripting Interpreter T1059, JavaScript T1059.007, Spearphishing Attachment T1566.001, Indirect Command Execution T1202
ends_with: \mshta.exe 57 rules
System Binary Proxy Execution T1218, Command and Scripting Interpreter T1059, Mshta T1218.005, Process Injection T1055, Spearphishing Attachment T1566.001, Exploitation for Client Execution T1203
ends_with: \regsvr32.exe 57 rules
Regsvr32 T1218.010, System Binary Proxy Execution T1218, Rundll32 T1218.011, Windows Management Instrumentation T1047, Process Injection T1055, Spearphishing Attachment T1566.001
ends_with: \reg.exe 46 rules
Disable or Modify Tools T1562.001, Modify Registry T1112, Registry Run Keys / Startup Folder T1547.001, System Information Discovery T1082, Credentials in Registry T1552.002, Rename Legitimate Utilities T1036.003
ends_with: \schtasks.exe 45 rules
Scheduled Task T1053.005, PowerShell T1059.001, System Binary Proxy Execution T1218, Windows Management Instrumentation T1047, Regsvr32 T1218.010, Service Stop T1489
ends_with: \wmic.exe 37 rules
Windows Management Instrumentation T1047, XSL Script Processing T1220, Visual Basic T1059.005, JavaScript T1059.007, Process Injection T1055, Command and Scripting Interpreter T1059
ends_with: \certutil.exe 34 rules
Obfuscated Files or Information T1027, System Binary Proxy Execution T1218, Ingress Tool Transfer T1105, Phishing T1566, Spearphishing Attachment T1566.001, Command and Scripting Interpreter T1059
ends_with: \net.exe 27 rules
SMB/Windows Admin Shares T1021.002, Process Injection T1055, Local Account T1087.001, Service Stop T1489, Local Account T1136.001, Web Service T1102
ends_with: \powershell_ise.exe 27 rules
PowerShell T1059.001, System Binary Proxy Execution T1218, Ingress Tool Transfer T1105, Exploit Public-Facing Application T1190, Web Shell T1505.003, Disable or Modify Tools T1562.001
ends_with: \net1.exe 25 rules
SMB/Windows Admin Shares T1021.002, Local Account T1087.001, Service Stop T1489, Local Account T1136.001, Web Service T1102, Domain Account T1087.002
ends_with: \bitsadmin.exe 23 rules
BITS Jobs T1197, Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, System Binary Proxy Execution T1218, Exploit Public-Facing Application T1190, Web Shell T1505.003
ends_with: \msedge.exe 22 rules
Web Service T1102, Ingress Tool Transfer T1105, Remote Desktop Software T1219.002, Dead Drop Resolver T1102.001, Hidden Window T1564.003, Browser Extensions T1176.001
ends_with: \msiexec.exe 21 rules
Windows Management Instrumentation T1047, Msiexec T1218.007, Regsvr32 T1218.010, Malicious File T1204.002, Rundll32 T1218.011, Phishing T1566
ends_with: \opera.exe 21 rules
Web Service T1102, Ingress Tool Transfer T1105, Remote Desktop Software T1219.002, Dead Drop Resolver T1102.001, Hidden Window T1564.003, Browser Extensions T1176.001
ends_with: \brave.exe 20 rules
Web Service T1102, Ingress Tool Transfer T1105, Remote Desktop Software T1219.002, Dead Drop Resolver T1102.001, Hidden Window T1564.003, Browser Extensions T1176.001
ends_with: \svchost.exe 20 rules
Match Legitimate Resource Name or Location T1036.005, PowerShell T1059.001, Masquerading T1036, Remote Desktop Protocol T1021.001, Protocol Tunneling T1572, Malicious File T1204.002
ends_with: \curl.exe 19 rules
Phishing T1566, Spearphishing Attachment T1566.001, Ingress Tool Transfer T1105, Hijack Execution Flow T1574, DLL T1574.001, Web Service T1102
ends_with: \vivaldi.exe 19 rules
Web Service T1102, Ingress Tool Transfer T1105, Remote Desktop Software T1219.002, Dead Drop Resolver T1102.001, Hidden Window T1564.003, Browser Extensions T1176.001
ends_with: \whoami.exe 18 rules
System Owner/User Discovery T1033, Process Injection T1055, Web Service T1102, Exploitation for Privilege Escalation T1068, Exploitation for Client Execution T1203, Local Account T1087.001
ends_with: \bash.exe 17 rules
Exploit Public-Facing Application T1190, Web Shell T1505.003, Malicious File T1204.002, Process Injection T1055, Command and Scripting Interpreter T1059, Web Service T1102
ends_with: \sc.exe 17 rules
Windows Service T1543.003, Disable or Modify Tools T1562.001, Services Registry Permissions Weakness T1574.011, Service Stop T1489, OS Credential Dumping T1003, Exploitation for Privilege Escalation T1068
ends_with: \winword.exe 17 rules
Malicious File T1204.002, DLL T1574.001, Process Hollowing T1055.012, Visual Basic T1059.005, JavaScript T1059.007, Mshta T1218.005
ends_with: \excel.exe 16 rules
Malicious File T1204.002, Process Hollowing T1055.012, Visual Basic T1059.005, JavaScript T1059.007, Mshta T1218.005, Process Injection T1055
ends_with: \netsh.exe 16 rules
Disable or Modify System Firewall T1562.004, Network Sniffing T1040, Proxy T1090, System Network Configuration Discovery T1016, Netsh Helper DLL T1546.007, Rename Legitimate Utilities T1036.003
ends_with: \outlook.exe 16 rules
Malicious File T1204.002, Fallback Channels T1008, Office Application Startup T1137, Event Triggered Execution T1546, Process Injection T1055, Spearphishing Attachment T1566.001
starts_with: C:\Windows\SysWOW64\ 16 rules
DLL T1574.001, Inhibit System Recovery T1490, GUI Input Capture T1056.002, Regsvr32 T1218.010, Rundll32 T1218.011, Path Interception by Search Order Hijacking T1574.008
starts_with: C:\Windows\System32\ 16 rules
DLL T1574.001, Inhibit System Recovery T1490, GUI Input Capture T1056.002, Regsvr32 T1218.010, Rundll32 T1218.011, Path Interception by Search Order Hijacking T1574.008
ends_with: \msedgewebview2.exe 15 rules
Web Service T1102, Remote Desktop Software T1219.002, Dead Drop Resolver T1102.001, Ingress Tool Transfer T1105, Gather Victim Network Information T1590, Spearphishing Attachment T1566.001
starts_with: C:\Program Files\ 15 rules
Inhibit System Recovery T1490, Non-Standard Port T1571, Modify Registry T1112, Shortcut Modification T1547.009, GUI Input Capture T1056.002, DLL T1574.001
ends_with: \hh.exe 14 rules
System Binary Proxy Execution T1218, Compiled HTML File T1218.001, Windows Management Instrumentation T1047, Regsvr32 T1218.010, Phishing T1566, Spearphishing Attachment T1566.001
match: :\Users\Public\ 14 rules
System Binary Proxy Execution T1218, Disable or Modify Tools T1562.001, Ingress Tool Transfer T1105, Indirect Command Execution T1202, Command and Scripting Interpreter T1059, Data Encrypted for Impact T1486
starts_with: C:\Program Files (x86)\ 14 rules
Inhibit System Recovery T1490, Non-Standard Port T1571, Shortcut Modification T1547.009, GUI Input Capture T1056.002, DLL T1574.001, Software Packing T1027.002
ends_with: \MsMpEng.exe 13 rules
Remote Desktop Software T1219.002, Web Service T1102, Dead Drop Resolver T1102.001, Disable or Modify Tools T1562.001, Impair Defenses T1562, Domain Trust Discovery T1482
ends_with: \calc.exe 13 rules
System Binary Proxy Execution T1218, Indirect Command Execution T1202, Masquerading T1036, Trusted Developer Utilities Proxy Execution T1127, Visual Basic T1059.005, Web Service T1102
ends_with: \maxthon.exe 13 rules
Web Service T1102, Remote Desktop Software T1219.002, Dead Drop Resolver T1102.001, Gather Victim Network Information T1590, Spearphishing Attachment T1566.001, Malware T1587.001
ends_with: \powerpnt.exe 13 rules
Malicious File T1204.002, Process Injection T1055, Phishing T1566, Spearphishing Attachment T1566.001, Hijack Execution Flow T1574, DLL T1574.001
ends_with: \seamonkey.exe 13 rules
Web Service T1102, Remote Desktop Software T1219.002, Dead Drop Resolver T1102.001, Gather Victim Network Information T1590, Spearphishing Attachment T1566.001, Malware T1587.001
ends_with: \sh.exe 13 rules
Exploit Public-Facing Application T1190, Web Shell T1505.003, Malicious File T1204.002, Command and Scripting Interpreter T1059, Web Service T1102, Distributed Component Object Model T1021.003
starts_with: C:\Windows\WinSxS\ 13 rules
DLL T1574.001, Inhibit System Recovery T1490, Match Legitimate Resource Name or Location T1036.005, Masquerading T1036, Direct Volume Access T1006, Disable Windows Event Logging T1562.002
ends_with: \WMIC.exe 12 rules
Windows Management Instrumentation T1047, System Information Discovery T1082, Automated Collection T1119, Impair Defenses T1562
ends_with: \WindowsApps\MicrosoftEdge.exe 12 rules
Web Service T1102, Remote Desktop Software T1219.002, Dead Drop Resolver T1102.001, Gather Victim Network Information T1590, DLL T1574.001, System Network Configuration Discovery T1016
ends_with: \explorer.exe 12 rules
Process Injection T1055, Boot or Logon Autostart Execution T1547, LSASS Memory T1003.001, Network Share Discovery T1135, Bypass User Account Control T1548.002, Phishing T1566
ends_with: \safari.exe 12 rules
Web Service T1102, Remote Desktop Software T1219.002, Dead Drop Resolver T1102.001, Gather Victim Network Information T1590, Spearphishing Attachment T1566.001, Malware T1587.001
ends_with: \whale.exe 12 rules
Web Service T1102, Remote Desktop Software T1219.002, Dead Drop Resolver T1102.001, Gather Victim Network Information T1590, Spearphishing Attachment T1566.001, Malware T1587.001
eq: C:\Program Files\Google\Chrome\Application\chrome.exe 12 rules
Web Service T1102, Remote Desktop Software T1219.002, Dead Drop Resolver T1102.001, Gather Victim Network Information T1590, File Deletion T1070.004, System Network Configuration Discovery T1016
eq: C:\Program Files\Mozilla Firefox\firefox.exe 12 rules
Web Service T1102, Remote Desktop Software T1219.002, Dead Drop Resolver T1102.001, Gather Victim Network Information T1590, File Deletion T1070.004, System Network Configuration Discovery T1016
match: :\Temp\ 12 rules
System Binary Proxy Execution T1218, Disable or Modify Tools T1562.001, Ingress Tool Transfer T1105, Indirect Command Execution T1202, OS Credential Dumping T1003, LSASS Memory T1003.001
ends_with: \chrome.exe 11 rules
Ingress Tool Transfer T1105, Hidden Window T1564.003, Browser Extensions T1176.001, Domain Trust Discovery T1482, Spearphishing Attachment T1566.001, Malware T1587.001
ends_with: \findstr.exe 11 rules
Group Policy Preferences T1552.006, Security Software Discovery T1518.001, Process Injection T1055, Ingress Tool Transfer T1105, System Binary Proxy Execution T1218, Steganography T1027.003
ends_with: \forfiles.exe 11 rules
Command and Scripting Interpreter T1059, Malicious File T1204.002, Process Injection T1055, Web Service T1102, Phishing T1566, Spearphishing Attachment T1566.001
ends_with: \notepad.exe 11 rules
System Binary Proxy Execution T1218, Process Injection T1055, Trusted Developer Utilities Proxy Execution T1127, Visual Basic T1059.005, Indirect Command Execution T1202, Web Service T1102
ends_with: \odbcconf.exe 11 rules
Odbcconf T1218.008, Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010
eq: C:\Program Files (x86)\Google\Chrome\Application\chrome.exe 11 rules
Web Service T1102, Remote Desktop Software T1219.002, Dead Drop Resolver T1102.001, Gather Victim Network Information T1590, File Deletion T1070.004, System Network Configuration Discovery T1016
eq: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 11 rules
Web Service T1102, Remote Desktop Software T1219.002, Dead Drop Resolver T1102.001, Gather Victim Network Information T1590, File Deletion T1070.004, DLL T1574.001
eq: C:\Program Files (x86)\Mozilla Firefox\firefox.exe 11 rules
Web Service T1102, Remote Desktop Software T1219.002, Dead Drop Resolver T1102.001, Gather Victim Network Information T1590, File Deletion T1070.004, System Network Configuration Discovery T1016
eq: C:\Program Files\Internet Explorer\iexplore.exe 11 rules
Web Service T1102, Remote Desktop Software T1219.002, Dead Drop Resolver T1102.001, Process Injection T1055, Gather Victim Network Information T1590, DLL T1574.001
eq: C:\Program Files\Microsoft\Edge\Application\msedge.exe 11 rules
Web Service T1102, Remote Desktop Software T1219.002, Dead Drop Resolver T1102.001, Gather Victim Network Information T1590, File Deletion T1070.004, DLL T1574.001
starts_with: C:\Program Files (x86)\Microsoft\EdgeCore\ 11 rules
Web Service T1102, Remote Desktop Software T1219.002, Dead Drop Resolver T1102.001, Ingress Tool Transfer T1105, Gather Victim Network Information T1590, DLL T1574.001
starts_with: C:\Program Files\Microsoft\EdgeCore\ 11 rules
Web Service T1102, Remote Desktop Software T1219.002, Dead Drop Resolver T1102.001, Ingress Tool Transfer T1105, Gather Victim Network Information T1590, DLL T1574.001
ends_with: \OfficeClickToRun.exe 10 rules
Registry Run Keys / Startup Folder T1547.001, Modify Registry T1112, Malware T1587.001, Add-ins T1137.006, Component Object Model Hijacking T1546.015
ends_with: \certoc.exe 10 rules
System Binary Proxy Execution T1218, Ingress Tool Transfer T1105, Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Malicious File T1204.002
ends_with: \msdt.exe 10 rules
Indirect Command Execution T1202, System Binary Proxy Execution T1218, Malicious File T1204.002, Registry Run Keys / Startup Folder T1547.001, Masquerading T1036, Phishing T1566
eq: C:\Program Files (x86)\Internet Explorer\iexplore.exe 10 rules
Web Service T1102, Remote Desktop Software T1219.002, Dead Drop Resolver T1102.001, Gather Victim Network Information T1590, DLL T1574.001, System Network Configuration Discovery T1016
starts_with: C:\Program Files (x86)\Microsoft\EdgeWebView\Application\ 10 rules
Web Service T1102, Remote Desktop Software T1219.002, Dead Drop Resolver T1102.001, Gather Victim Network Information T1590, DLL T1574.001, System Network Configuration Discovery T1016
ends_with: \cmstp.exe 9 rules
CMSTP T1218.003, Process Injection T1055, Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Malicious File T1204.002
ends_with: \finger.exe 9 rules
System Binary Proxy Execution T1218, Windows Command Shell T1059.003, DNS T1071.004, Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003, Masquerading T1036
ends_with: \nltest.exe 9 rules
Exploit Public-Facing Application T1190, Web Shell T1505.003, System Network Configuration Discovery T1016, Domain Trust Discovery T1482, Remote System Discovery T1018, Regsvr32 T1218.010
ends_with: \systeminfo.exe 9 rules
Web Shell T1505.003, Web Service T1102, Exploit Public-Facing Application T1190, Exploitation for Privilege Escalation T1068, Exploitation for Client Execution T1203, System Binary Proxy Execution T1218
eq: C:\Windows\explorer.exe 9 rules
Inhibit System Recovery T1490, Process Injection T1055, File Deletion T1070.004, GUI Input Capture T1056.002, System Script Proxy Execution T1216, Scheduled Task/Job T1053
match: :\Windows\Temp\ 9 rules
Indirect Command Execution T1202, System Binary Proxy Execution T1218, Ingress Tool Transfer T1105, Service Execution T1569.002, Trusted Developer Utilities Proxy Execution T1127, Visual Basic T1059.005
match: \AppData\ 9 rules
NTDS T1003.003, Security Account Manager T1003.002, Scheduled Task/Job T1053, Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047
match: \AppData\Local\Temp\ 9 rules
DLL T1574.001, Service Execution T1569.002, Trusted Developer Utilities Proxy Execution T1127, Bypass User Account Control T1548.002, Indirect Command Execution T1202, System Binary Proxy Execution T1218
ends_with: \WerFault.exe 8 rules
Masquerading T1036, Windows Management Instrumentation T1047, LSASS Memory T1003.001, Rundll32 T1218.011, Abuse Elevation Control Mechanism T1548, Bypass User Account Control T1548.002
ends_with: \dllhost.exe 8 rules
Masquerading T1036, Inhibit System Recovery T1490, Process Injection T1055, Remote Desktop Software T1219.002, Windows Management Instrumentation T1047
ends_with: \esentutl.exe 8 rules
System Binary Proxy Execution T1218, Process Injection T1055, Ingress Tool Transfer T1105, Security Account Manager T1003.002, NTDS T1003.003, Data from Local System T1005
ends_with: \find.exe 8 rules
Group Policy Preferences T1552.006, Security Software Discovery T1518.001, Process Injection T1055, Steganography T1027.003, Masquerading T1036, Indirect Command Execution T1202
ends_with: \regedit.exe 8 rules
Query Registry T1012, Modify Registry T1112, NTFS File Attributes T1564.004, Abuse Elevation Control Mechanism T1548, Rename Legitimate Utilities T1036.003
ends_with: \scrcons.exe 8 rules
Windows Management Instrumentation T1047, Malicious File T1204.002, Windows Management Instrumentation Event Subscription T1546.003, Web Service T1102, Phishing T1566, Spearphishing Attachment T1566.001
ends_with: \scriptrunner.exe 8 rules
Malicious File T1204.002, Command and Scripting Interpreter T1059, Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Regsvr32 T1218.010
ends_with: \wsl.exe 8 rules
Exploit Public-Facing Application T1190, Security Account Manager T1003.002, NTDS T1003.003, Web Shell T1505.003, Masquerading T1036, Web Protocols T1071.001
eq: System 8 rules
SMB/Windows Admin Shares T1021.002, Distributed Component Object Model T1021.003, Web Shell T1505.003, Windows Management Instrumentation T1047, Direct Volume Access T1006, Scheduled Task/Job T1053
match: \Downloads\ 8 rules
DLL T1574.001, Service Execution T1569.002, LSASS Memory T1003.001, Disable or Modify Tools T1562.001, Python T1059.006, Indirect Command Execution T1202
match: \Users\Public\ 8 rules
DLL T1574.001, Trusted Developer Utilities Proxy Execution T1127, Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Malicious File T1204.002
starts_with: C:\Program Files\Common Files\Microsoft Shared\ClickToRun\ 8 rules
Registry Run Keys / Startup Folder T1547.001, Add-ins T1137.006, Modify Registry T1112, Component Object Model Hijacking T1546.015
ends_with: \TiWorker.exe 7 rules
Disable Windows Event Logging T1562.002, Screensaver T1546.002, Match Legitimate Resource Name or Location T1036.005, DLL T1574.001, Modify Registry T1112, Registry Run Keys / Startup Folder T1547.001
ends_with: \conhost.exe 7 rules
Masquerading T1036, PowerShell T1059.001, Windows Command Shell T1059.003, Hidden Window T1564.003, Command and Scripting Interpreter T1059, External Remote Services T1133
ends_with: \livekd.exe 7 rules
Tool T1588.002, Match Legitimate Resource Name or Location T1036.005, Indirect Command Execution T1202, System Binary Proxy Execution T1218
ends_with: \msbuild.exe 7 rules
Malicious File T1204.002, Windows Management Instrumentation T1047, Process Injection T1055, Command and Scripting Interpreter T1059, MSBuild T1127.001, Phishing T1566
ends_with: \mspub.exe 7 rules
Malicious File T1204.002, System Binary Proxy Execution T1218
ends_with: \msxsl.exe 7 rules
XSL Script Processing T1220, Process Injection T1055, Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Malicious File T1204.002
ends_with: \thor.exe 7 rules
Remote Desktop Protocol T1021.001, Internal Proxy T1090.001, External Proxy T1090.002, PowerShell T1059.001, Inhibit System Recovery T1490, DLL T1574.001
eq: C:\Windows\System32\poqexec.exe 7 rules
Registry Run Keys / Startup Folder T1547.001, Netsh Helper DLL T1546.007, OS Credential Dumping T1003, Windows Service T1543.003, SIP and Trust Provider Hijacking T1553.003
match: :\Perflogs\ 7 rules
Disable or Modify Tools T1562.001, Ingress Tool Transfer T1105, Command and Scripting Interpreter T1059, Data Encrypted for Impact T1486, OS Credential Dumping T1003, LSASS Memory T1003.001
match: :\Windows\SysWOW64\ 7 rules
Masquerading T1036, Disable Windows Event Logging T1562.002, LSASS Memory T1003.001, Native API T1106, Bypass User Account Control T1548.002
match: \Windows\Temp\ 7 rules
System Binary Proxy Execution T1218, Command and Scripting Interpreter T1059, LSASS Memory T1003.001, Disable or Modify Tools T1562.001, Phishing T1566, Spearphishing Attachment T1566.001
starts_with: C:\ProgramData\Microsoft\Windows Defender\Platform\ 7 rules
DLL T1574.001, Disable or Modify Tools T1562.001, Direct Volume Access T1006
starts_with: C:\Users\ 7 rules
Web Service T1102, Dead Drop Resolver T1102.001, Shortcut Modification T1547.009, GUI Input Capture T1056.002, Data Encrypted for Impact T1486, Disable or Modify Tools T1562.001
ends_with: \ADExplorer.exe 6 rules
Domain Groups T1069.002, Domain Account T1087.002, Domain Trust Discovery T1482, Tool T1588.002, Match Legitimate Resource Name or Location T1036.005, Indirect Command Execution T1202
ends_with: \ADExplorer64.exe 6 rules
Domain Groups T1069.002, Domain Account T1087.002, Domain Trust Discovery T1482, Tool T1588.002, Match Legitimate Resource Name or Location T1036.005, Indirect Command Execution T1202
ends_with: \AppVLP.exe 6 rules
Malicious File T1204.002, Web Service T1102, Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Regsvr32 T1218.010
ends_with: \firefox.exe 6 rules
Domain Trust Discovery T1482, Spearphishing Attachment T1566.001, Malware T1587.001, Browser Session Hijacking T1185, Malicious File T1204.002
ends_with: \mftrace.exe 6 rules
Malicious File T1204.002, Web Service T1102, Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Regsvr32 T1218.010
ends_with: \mmc.exe 6 rules
MMC T1218.014, Distributed Component Object Model T1021.003, Visual Basic T1059.005, PowerShell T1059.001, Group Policy Modification T1484.001, Right-to-Left Override T1036.002
ends_with: \onenote.exe 6 rules
Malicious File T1204.002
ends_with: \onenoteim.exe 6 rules
Malicious File T1204.002
ends_with: \ping.exe 6 rules
Obfuscated Files or Information T1027, Process Injection T1055, Exploit Public-Facing Application T1190, Web Shell T1505.003, Deobfuscate/Decode Files or Information T1140, OS Credential Dumping T1003
ends_with: \procdump.exe 6 rules
Tool T1588.002, Rename Legitimate Utilities T1036.003, LSASS Memory T1003.001, Masquerading T1036, Match Legitimate Resource Name or Location T1036.005, Indirect Command Execution T1202
ends_with: \procexp.exe 6 rules
Tool T1588.002, Exploitation for Privilege Escalation T1068, GUI Input Capture T1056.002, Match Legitimate Resource Name or Location T1036.005, Indirect Command Execution T1202, System Binary Proxy Execution T1218
ends_with: \procexp64.exe 6 rules
Tool T1588.002, Exploitation for Privilege Escalation T1068, GUI Input Capture T1056.002, Match Legitimate Resource Name or Location T1036.005, Indirect Command Execution T1202, System Binary Proxy Execution T1218
ends_with: \thor64.exe 6 rules
Remote Desktop Protocol T1021.001, Internal Proxy T1090.001, External Proxy T1090.002, PowerShell T1059.001, Inhibit System Recovery T1490, DLL T1574.001
ends_with: \w3wp.exe 6 rules
Web Shell T1505.003, Exploit Public-Facing Application T1190, Process Injection T1055, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087
ends_with: \wbadmin.exe 6 rules
Inhibit System Recovery T1490, NTDS T1003.003, Indicator Removal T1070
ends_with: \wevtutil.exe 6 rules
Account Discovery T1087, Remote Desktop Software T1219.002, Rename Legitimate Utilities T1036.003, Exploitation for Privilege Escalation T1068, Exploitation for Client Execution T1203, Clear Windows Event Logs T1070.001
ends_with: \wget.exe 6 rules
Exploitation for Privilege Escalation T1068, Exploitation for Client Execution T1203, PowerShell T1059.001, Ingress Tool Transfer T1105, Stage Capabilities T1608
ends_with: \wordview.exe 6 rules
System Binary Proxy Execution T1218, Ingress Tool Transfer T1105, Exploitation for Client Execution T1203
eq: C:\Program Files (x86)\Microsoft Office\root\integration\integrator.exe 6 rules
Registry Run Keys / Startup Folder T1547.001, Add-ins T1137.006, Component Object Model Hijacking T1546.015
eq: C:\Program Files\Microsoft Office\root\integration\integrator.exe 6 rules
Registry Run Keys / Startup Folder T1547.001, Add-ins T1137.006, Component Object Model Hijacking T1546.015
match: :\Program Files\ 6 rules
Domain Trust Discovery T1482, Protocol or Service Impersonation T1001.003, Disable Windows Event Logging T1562.002, LSASS Memory T1003.001, Native API T1106, Process Hollowing T1055.012
match: :\Windows\System32\ 6 rules
Masquerading T1036, Disable Windows Event Logging T1562.002, LSASS Memory T1003.001, Native API T1106
match: \Desktop\ 6 rules
DLL T1574.001, Service Execution T1569.002, LSASS Memory T1003.001, Disable or Modify Tools T1562.001, Indirect Command Execution T1202, System Binary Proxy Execution T1218
match: \Favorites\ 6 rules
Disable or Modify Tools T1562.001, Command and Scripting Interpreter T1059, Data Encrypted for Impact T1486, OS Credential Dumping T1003, Ingress Tool Transfer T1105, LSASS Memory T1003.001
ends_with: \AnyDesk.exe 5 rules
Remote Desktop Software T1219.002
ends_with: \CertReq.exe 5 rules
System Binary Proxy Execution T1218, Ingress Tool Transfer T1105, Windows Management Instrumentation T1047, PowerShell T1059.001, Windows Command Shell T1059.003, Visual Basic T1059.005
ends_with: \InstallUtil.exe 5 rules
Rundll32 T1218.011, Regsvr32 T1218.010, System Binary Proxy Execution T1218, Rename Legitimate Utilities T1036.003
ends_with: \MpCmdRun.exe 5 rules
DLL T1574.001, Ingress Tool Transfer T1105, System Binary Proxy Execution T1218, Disable or Modify Tools T1562.001, Native API T1106
ends_with: \MsSense.exe 5 rules
Remote Desktop Software T1219.002, Web Service T1102, Dead Drop Resolver T1102.001, Impair Defenses T1562
ends_with: \WINWORD.exe 5 rules
Indirect Command Execution T1202, Office Application Startup T1137, Rename Legitimate Utilities T1036.003
ends_with: \csc.exe 5 rules
Compile After Delivery T1027.004, Visual Basic T1059.005, JavaScript T1059.007, Mshta T1218.005, Exploit Public-Facing Application T1190
ends_with: \eqnedt32.exe 5 rules
System Binary Proxy Execution T1218, Ingress Tool Transfer T1105, Exploitation for Client Execution T1203
ends_with: \gpg.exe 5 rules
Data Encrypted for Impact T1486
ends_with: \gpg2.exe 5 rules
Data Encrypted for Impact T1486
ends_with: \handle.exe 5 rules
Tool T1588.002, LSASS Memory T1003.001, Match Legitimate Resource Name or Location T1036.005, Indirect Command Execution T1202, System Binary Proxy Execution T1218, Disable or Modify Tools T1562.001
ends_with: \handle64.exe 5 rules
Tool T1588.002, LSASS Memory T1003.001, Match Legitimate Resource Name or Location T1036.005, Indirect Command Execution T1202, System Binary Proxy Execution T1218, Disable or Modify Tools T1562.001
ends_with: \installutil.exe 5 rules
Windows Management Instrumentation T1047, Regsvr32 T1218.010, Phishing T1566, Spearphishing Attachment T1566.001, Process Injection T1055, PowerShell T1059.001
ends_with: \livekd64.exe 5 rules
Tool T1588.002, Match Legitimate Resource Name or Location T1036.005, Indirect Command Execution T1202, System Binary Proxy Execution T1218
ends_with: \lsass.exe 5 rules
Masquerading T1036, LSASS Memory T1003.001, Rename Legitimate Utilities T1036.003, Match Legitimate Resource Name or Location T1036.005, Local Account T1136.001
ends_with: \mstsc.exe 5 rules
Remote Desktop Software T1219.002, Remote Desktop Protocol T1021.001
ends_with: \netstat.exe 5 rules
Process Injection T1055, Web Shell T1505.003, Exploit Public-Facing Application T1190, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087
ends_with: \procdump64.exe 5 rules
Tool T1588.002, Rename Legitimate Utilities T1036.003, LSASS Memory T1003.001, Masquerading T1036, Match Legitimate Resource Name or Location T1036.005, Indirect Command Execution T1202
ends_with: \query.exe 5 rules
Web Service T1102, Exploitation for Privilege Escalation T1068, Exploitation for Client Execution T1203, Exploit Public-Facing Application T1190, Web Shell T1505.003
ends_with: \robocopy.exe 5 rules
Rename Legitimate Utilities T1036.003, Process Injection T1055, Credentials from Web Browsers T1555.003, SMB/Windows Admin Shares T1021.002, Data from Network Shared Drive T1039, Exfiltration Over Alternative Protocol T1048
ends_with: \vssadmin.exe 5 rules
Inhibit System Recovery T1490, Process Injection T1055, OS Credential Dumping T1003, Security Account Manager T1003.002, NTDS T1003.003, Indicator Removal T1070
ends_with: \winget.exe 5 rules
Command and Scripting Interpreter T1059
ends_with: \winlogon.exe 5 rules
Masquerading T1036, Process Injection T1055, Rundll32 T1218.011, Rename Legitimate Utilities T1036.003, Match Legitimate Resource Name or Location T1036.005
ends_with: \wordpad.exe 5 rules
System Binary Proxy Execution T1218, Ingress Tool Transfer T1105
ends_with: \xcopy.exe 5 rules
Rename Legitimate Utilities T1036.003, Windows Command Shell T1059.003, Credentials from Web Browsers T1555.003, SMB/Windows Admin Shares T1021.002, Data from Network Shared Drive T1039, Exfiltration Over Alternative Protocol T1048
eq: C:\Windows\system32\svchost.exe 5 rules
File Deletion T1070.004, Masquerading T1036, Modify Registry T1112, Registry Run Keys / Startup Folder T1547.001, Component Object Model Hijacking T1546.015
match: :\Windows\Tasks\ 5 rules
Ingress Tool Transfer T1105, Trusted Developer Utilities Proxy Execution T1127, Masquerading T1036
match: \AppData\Local\Programs\Opera\ 5 rules
Remote Desktop Software T1219.002, Web Service T1102, Dead Drop Resolver T1102.001, Process Hollowing T1055.012
match: \Contacts\ 5 rules
Disable or Modify Tools T1562.001, Command and Scripting Interpreter T1059, Data Encrypted for Impact T1486, OS Credential Dumping T1003, Ingress Tool Transfer T1105, LSASS Memory T1003.001
match: \Favourites\ 5 rules
Disable or Modify Tools T1562.001, Command and Scripting Interpreter T1059, Data Encrypted for Impact T1486, OS Credential Dumping T1003, Ingress Tool Transfer T1105, LSASS Memory T1003.001
match: \Pictures\ 5 rules
Disable or Modify Tools T1562.001, Command and Scripting Interpreter T1059, OS Credential Dumping T1003, Ingress Tool Transfer T1105, LSASS Memory T1003.001
match: \Temp\ 5 rules
NTDS T1003.003, Security Account Manager T1003.002, NTFS File Attributes T1564.004, Modify Registry T1112
starts_with: C:\Program Files (x86)\Windows Defender\ 5 rules
DLL T1574.001, Disable or Modify Tools T1562.001
starts_with: C:\Program Files\Common Files\Microsoft Shared\ClickToRun\Updates\ 5 rules
Registry Run Keys / Startup Folder T1547.001, Modify Registry T1112
starts_with: C:\Program Files\Windows Defender\ 5 rules
DLL T1574.001, Disable or Modify Tools T1562.001
ends_with: .exe 4 rules
Disable or Modify Tools T1562.001, Malicious File T1204.002
ends_with: \ADExplorer64a.exe 4 rules
Domain Groups T1069.002, Domain Account T1087.002, Domain Trust Discovery T1482, Match Legitimate Resource Name or Location T1036.005, Indirect Command Execution T1202, System Binary Proxy Execution T1218
ends_with: \AnyDeskMSI.exe 4 rules
Remote Desktop Software T1219.002
ends_with: \Desktopimgdownldr.exe 4 rules
System Binary Proxy Execution T1218, Ingress Tool Transfer T1105
ends_with: \Flock.exe 4 rules
Remote Desktop Software T1219.002, Web Service T1102, Dead Drop Resolver T1102.001
ends_with: \POWERPNT.EXE 4 rules
Indirect Command Execution T1202, Process Injection T1055, Rename Legitimate Utilities T1036.003
ends_with: \Phoebe.exe 4 rules
Remote Desktop Software T1219.002, Web Service T1102, Dead Drop Resolver T1102.001
ends_with: \RdrCEF.exe 4 rules
System Binary Proxy Execution T1218, Ingress Tool Transfer T1105
ends_with: \RuntimeBroker.exe 4 rules
Masquerading T1036, Spearphishing Attachment T1566.001
ends_with: \Teams.exe 4 rules
GUI Input Capture T1056.002, Malicious File T1204.002, Add-ins T1137.006
ends_with: \Waterfox.exe 4 rules
Remote Desktop Software T1219.002, Web Service T1102, Dead Drop Resolver T1102.001
ends_with: \addinutil.exe 4 rules
System Binary Proxy Execution T1218
ends_with: \appcmd.exe 4 rules
Disable Windows Event Logging T1562.002, OS Credential Dumping T1003, Web Shell T1505.003
ends_with: \avant.exe 4 rules
Remote Desktop Software T1219.002, Web Service T1102, Dead Drop Resolver T1102.001
ends_with: \bcdedit.exe 4 rules
Inhibit System Recovery T1490, Indicator Removal T1070, Bootkit T1542.003, Exploitation for Privilege Escalation T1068, Exploitation for Client Execution T1203, Masquerading T1036
ends_with: \dism.exe 4 rules
Bypass User Account Control T1548.002, DLL T1574.001, Masquerading T1036
ends_with: \falkon.exe 4 rules
Remote Desktop Software T1219.002, Web Service T1102, Dead Drop Resolver T1102.001
ends_with: \fsutil.exe 4 rules
Peripheral Device Discovery T1120, Indicator Removal T1070, Data Destruction T1485, Exploitation for Privilege Escalation T1068, Exploitation for Client Execution T1203, Remote System Discovery T1018
ends_with: \iexplore.exe 4 rules
Process Injection T1055, Spearphishing Attachment T1566.001, Malware T1587.001
ends_with: \nslookup.exe 4 rules
Process Injection T1055, PowerShell T1059.001, Visual Basic T1059.005, System Binary Proxy Execution T1218, Remote System Discovery T1018, System Owner/User Discovery T1033
ends_with: \ntdsutil.exe 4 rules
NTDS T1003.003, Web Shell T1505.003, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087, Exploit Public-Facing Application T1190
ends_with: \psloglist.exe 4 rules
Tool T1588.002, Account Discovery T1087, Local Account T1087.001, Domain Account T1087.002, Match Legitimate Resource Name or Location T1036.005, Indirect Command Execution T1202
ends_with: \psloglist64.exe 4 rules
Tool T1588.002, Account Discovery T1087, Local Account T1087.001, Domain Account T1087.002, Match Legitimate Resource Name or Location T1036.005, Indirect Command Execution T1202
ends_with: \rar.exe 4 rules
Archive via Utility T1560.001, Command and Scripting Interpreter T1059
ends_with: \regasm.exe 4 rules
Regsvcs/Regasm T1218.009, Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010
ends_with: \runonce.exe 4 rules
Process Injection T1055, Rundll32 T1218.011, Modify Registry T1112, Masquerading T1036
ends_with: \slimbrowser.exe 4 rules
Remote Desktop Software T1219.002, Web Service T1102, Dead Drop Resolver T1102.001
ends_with: \tasklist.exe 4 rules
Web Shell T1505.003, Exploit Public-Facing Application T1190, OS Credential Dumping T1003, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087
ends_with: \verclsid.exe 4 rules
Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010, Phishing T1566, Spearphishing Attachment T1566.001, System Binary Proxy Execution T1218
ends_with: \werfault.exe 4 rules
Regsvr32 T1218.010, Masquerading T1036, Bypass User Account Control T1548.002
ends_with: \wt.exe 4 rules
Inhibit System Recovery T1490, Security Account Manager T1003.002, NTDS T1003.003, Accessibility Features T1546.008
eq: C:\Program Files\PowerShell\7\pwsh.exe 4 rules
PowerShell T1059.001, File Deletion T1070.004, Distributed Component Object Model T1021.003
eq: C:\Windows\ImmersiveControlPanel\SystemSettings.exe 4 rules
Inhibit System Recovery T1490, GUI Input Capture T1056.002, Direct Volume Access T1006
eq: C:\Windows\SysWOW64\msiexec.exe 4 rules
Modify Registry T1112, Add-ins T1137.006, Component Object Model Hijacking T1546.015
eq: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 4 rules
PowerShell T1059.001, File Deletion T1070.004, Distributed Component Object Model T1021.003
eq: C:\Windows\System32\msiexec.exe 4 rules
Modify Registry T1112, Add-ins T1137.006, Scheduled Task/Job T1053, Scheduled Task T1053.005
eq: C:\Windows\System32\svchost.exe 4 rules
Match Legitimate Resource Name or Location T1036.005, Registry Run Keys / Startup Folder T1547.001, Disable Windows Event Logging T1562.002, Impair Defenses T1562, Service Execution T1569.002
match: :\PerfLogs\ 4 rules
System Binary Proxy Execution T1218, Visual Basic T1059.005, Indirect Command Execution T1202
match: :\Program Files (x86)\ 4 rules
Domain Trust Discovery T1482, Disable Windows Event Logging T1562.002, LSASS Memory T1003.001, Native API T1106
match: :\Program Files\Microsoft Office\ 4 rules
Malware T1587.001, Modify Registry T1112
match: :\Windows\System32\Tasks\ 4 rules
Ingress Tool Transfer T1105, Trusted Developer Utilities Proxy Execution T1127, Masquerading T1036
match: C:\Program Files\WindowsApps\Microsoft.PowerShellPreview 4 rules
PowerShell T1059.001, Masquerading T1036
match: \AppData\Local\Flock\ 4 rules
Remote Desktop Software T1219.002, Web Service T1102, Dead Drop Resolver T1102.001
match: \AppData\Local\Maxthon\ 4 rules
Remote Desktop Software T1219.002, Web Service T1102, Dead Drop Resolver T1102.001
match: \AppData\Local\Microsoft\OneDrive\ 4 rules
Shortcut Modification T1547.009, GUI Input Capture T1056.002, Web Service T1102, Dead Drop Resolver T1102.001, Phishing T1566, Spearphishing Attachment T1566.001
match: \AppData\Local\Microsoft\WindowsApps\Microsoft.PowerShellPreview 4 rules
PowerShell T1059.001, Masquerading T1036
match: \AppData\Local\Phoebe\ 4 rules
Remote Desktop Software T1219.002, Web Service T1102, Dead Drop Resolver T1102.001
match: \AppData\Local\Vivaldi\ 4 rules
Remote Desktop Software T1219.002, Web Service T1102, Dead Drop Resolver T1102.001
match: \Music\ 4 rules
Disable or Modify Tools T1562.001, OS Credential Dumping T1003, Ingress Tool Transfer T1105, LSASS Memory T1003.001
match: \Users\Default\ 4 rules
Disable or Modify Tools T1562.001, OS Credential Dumping T1003, LSASS Memory T1003.001, Indirect Command Execution T1202
match: \Videos\ 4 rules
Disable or Modify Tools T1562.001, OS Credential Dumping T1003, Ingress Tool Transfer T1105, LSASS Memory T1003.001
match: \Windows\System32\Tasks\ 4 rules
System Binary Proxy Execution T1218, Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010
match: \Windows\Tasks\ 4 rules
System Binary Proxy Execution T1218, Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010
match: \Windows\addins\ 4 rules
Ingress Tool Transfer T1105, Indirect Command Execution T1202
match: \config\systemprofile\ 4 rules
Ingress Tool Transfer T1105, Masquerading T1036, Indirect Command Execution T1202
starts_with: C:\Program Files (x86)\Avant Browser\ 4 rules
Remote Desktop Software T1219.002, Web Service T1102, Dead Drop Resolver T1102.001
starts_with: C:\Program Files (x86)\Falkon\ 4 rules
Remote Desktop Software T1219.002, Web Service T1102, Dead Drop Resolver T1102.001
starts_with: C:\Program Files (x86)\Naver\Naver Whale\ 4 rules
Remote Desktop Software T1219.002, Web Service T1102, Dead Drop Resolver T1102.001
starts_with: C:\Program Files (x86)\SeaMonkey\ 4 rules
Remote Desktop Software T1219.002, Web Service T1102, Dead Drop Resolver T1102.001
starts_with: C:\Program Files (x86)\SlimBrowser\ 4 rules
Remote Desktop Software T1219.002, Web Service T1102, Dead Drop Resolver T1102.001
starts_with: C:\Program Files (x86)\Waterfox\ 4 rules
Remote Desktop Software T1219.002, Web Service T1102, Dead Drop Resolver T1102.001
starts_with: C:\Program Files\Avant Browser\ 4 rules
Remote Desktop Software T1219.002, Web Service T1102, Dead Drop Resolver T1102.001
starts_with: C:\Program Files\BraveSoftware\ 4 rules
Remote Desktop Software T1219.002, Web Service T1102, Dead Drop Resolver T1102.001
starts_with: C:\Program Files\Falkon\ 4 rules
Remote Desktop Software T1219.002, Web Service T1102, Dead Drop Resolver T1102.001
starts_with: C:\Program Files\Naver\Naver Whale\ 4 rules
Remote Desktop Software T1219.002, Web Service T1102, Dead Drop Resolver T1102.001
starts_with: C:\Program Files\SeaMonkey\ 4 rules
Remote Desktop Software T1219.002, Web Service T1102, Dead Drop Resolver T1102.001
starts_with: C:\Program Files\SlimBrowser\ 4 rules
Remote Desktop Software T1219.002, Web Service T1102, Dead Drop Resolver T1102.001
starts_with: C:\Program Files\Waterfox\ 4 rules
Remote Desktop Software T1219.002, Web Service T1102, Dead Drop Resolver T1102.001
starts_with: C:\Windows\ 4 rules
Shortcut Modification T1547.009, Inhibit System Recovery T1490, Indicator Removal T1070, Scheduled Task/Job T1053, Scheduled Task T1053.005
ends_with: :\Windows\System32\mmc.exe 3 rules
Data from Local System T1005, Bypass User Account Control T1548.002, Masquerading T1036
ends_with: \7z.exe 3 rules
Archive via Utility T1560.001, Rename Legitimate Utilities T1036.003
ends_with: \7za.exe 3 rules
Archive via Utility T1560.001, Rename Legitimate Utilities T1036.003
ends_with: \ADExp.exe 3 rules
Domain Groups T1069.002, Domain Account T1087.002, Domain Trust Discovery T1482
ends_with: \AcroRd32.exe 3 rules
System Binary Proxy Execution T1218
ends_with: \Discord.exe 3 rules
Web Service T1102, Dead Drop Resolver T1102.001
ends_with: \MicrosoftEdge.exe 3 rules
Spearphishing Attachment T1566.001, Malware T1587.001, Ingress Tool Transfer T1105, Hidden Window T1564.003
ends_with: \Midori Next Generation.exe 3 rules
Remote Desktop Software T1219.002, Web Service T1102, Dead Drop Resolver T1102.001
ends_with: \ONENOTE.EXE 3 rules
Registry Run Keys / Startup Folder T1547.001, Rename Legitimate Utilities T1036.003
ends_with: \OUTLOOK.EXE 3 rules
Protocol or Service Impersonation T1001.003, Rename Legitimate Utilities T1036.003
ends_with: \PingCastle.exe 3 rules
Active Scanning T1595, Command and Scripting Interpreter T1059, Indirect Command Execution T1202
ends_with: \PsService.exe 3 rules
Service Stop T1489, Disable or Modify Tools T1562.001, Windows Service T1543.003, Tool T1588.002
ends_with: \PsService64.exe 3 rules
Service Stop T1489, Disable or Modify Tools T1562.001, Windows Service T1543.003, Tool T1588.002
ends_with: \RegAsm.exe 3 rules
Rundll32 T1218.011, Regsvr32 T1218.010, Regsvcs/Regasm T1218.009
ends_with: \Sysmon.exe 3 rules
Disable or Modify Tools T1562.001, Match Legitimate Resource Name or Location T1036.005, Indirect Command Execution T1202, System Binary Proxy Execution T1218
ends_with: \Sysmon64.exe 3 rules
Disable or Modify Tools T1562.001, Match Legitimate Resource Name or Location T1036.005, Indirect Command Execution T1202, System Binary Proxy Execution T1218
ends_with: \WmiPrvSE.exe 3 rules
Windows Management Instrumentation T1047, Inhibit System Recovery T1490, Malicious File T1204.002, Regsvr32 T1218.010
ends_with: \accesschk.exe 3 rules
Exploitation for Privilege Escalation T1068, Exploitation for Client Execution T1203, Local Groups T1069.001, Match Legitimate Resource Name or Location T1036.005, Indirect Command Execution T1202, System Binary Proxy Execution T1218
ends_with: \arp.exe 3 rules
Process Injection T1055, Exploit Public-Facing Application T1190, Web Shell T1505.003
ends_with: \aspnet_compiler.exe 3 rules
Trusted Developer Utilities Proxy Execution T1127
ends_with: \attrib.exe 3 rules
Hidden Files and Directories T1564.001, Windows Command Shell T1059.003
ends_with: \cloudflared.exe 3 rules
Internal Proxy T1090.001
ends_with: \cmdkey.exe 3 rules
Cached Domain Credentials T1003.005, System Owner/User Discovery T1033, Local Account T1087.001
ends_with: \code.exe 3 rules
Web Protocols T1071.001, Remote Access Tools T1219
ends_with: \control.exe 3 rules
Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010, System Binary Proxy Execution T1218
ends_with: \csrss.exe 3 rules
Masquerading T1036, Rename Legitimate Utilities T1036.003, Match Legitimate Resource Name or Location T1036.005
ends_with: \diskshadow.exe 3 rules
System Binary Proxy Execution T1218, Indicator Removal T1070, Inhibit System Recovery T1490
ends_with: \expand.exe 3 rules
System Binary Proxy Execution T1218, Process Injection T1055, Ingress Tool Transfer T1105
ends_with: \ftp.exe 3 rules
Command and Scripting Interpreter T1059, Indirect Command Execution T1202, Ingress Tool Transfer T1105, System Binary Proxy Execution T1218
ends_with: \gup.exe 3 rules
Compromise Software Supply Chain T1195.002, Adversary-in-the-Middle T1557, DLL T1574.001
ends_with: \ldifde.exe 3 rules
Ingress Tool Transfer T1105, System Binary Proxy Execution T1218, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087, Web Shell T1505.003
ends_with: \msteams.exe 3 rules
ends_with: \ngen.exe 3 rules
Process Injection T1055, Registry Run Keys / Startup Folder T1547.001, Scheduled Task/Job T1053, Scheduled Task T1053.005
ends_with: \node.exe 3 rules
JavaScript T1059.007, Trusted Developer Utilities Proxy Execution T1127
ends_with: \pcalua.exe 3 rules
Command and Scripting Interpreter T1059, Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010
ends_with: \pspasswd.exe 3 rules
Tool T1588.002, Match Legitimate Resource Name or Location T1036.005, Indirect Command Execution T1202, System Binary Proxy Execution T1218
ends_with: \pspasswd64.exe 3 rules
Tool T1588.002, Match Legitimate Resource Name or Location T1036.005, Indirect Command Execution T1202, System Binary Proxy Execution T1218
ends_with: \pssuspend.exe 3 rules
Windows Service T1543.003, Disable or Modify Tools T1562.001, Match Legitimate Resource Name or Location T1036.005, Indirect Command Execution T1202, System Binary Proxy Execution T1218
ends_with: \pssuspend64.exe 3 rules
Windows Service T1543.003, Disable or Modify Tools T1562.001, Match Legitimate Resource Name or Location T1036.005, Indirect Command Execution T1202, System Binary Proxy Execution T1218
ends_with: \python.exe 3 rules
Process Injection T1055, Security Account Manager T1003.002, Remote System Discovery T1018
ends_with: \regsvcs.exe 3 rules
Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010, Rundll32 T1218.011
ends_with: \sdelete.exe 3 rules
Data Destruction T1485, Match Legitimate Resource Name or Location T1036.005, Indirect Command Execution T1202, System Binary Proxy Execution T1218, Tool T1588.002
ends_with: \services.exe 3 rules
Abuse Elevation Control Mechanism T1548, Rename Legitimate Utilities T1036.003, Match Legitimate Resource Name or Location T1036.005, Masquerading T1036
ends_with: \ssh.exe 3 rules
Protocol Tunneling T1572, Remote Desktop Protocol T1021.001, SSH T1021.004, System Binary Proxy Execution T1218
ends_with: \visio.exe 3 rules
Malicious File T1204.002, System Binary Proxy Execution T1218, Add-ins T1137.006
ends_with: \vmmap.exe 3 rules
DLL T1574.001, Match Legitimate Resource Name or Location T1036.005, Indirect Command Execution T1202, System Binary Proxy Execution T1218
ends_with: \vmmap64.exe 3 rules
DLL T1574.001, Match Legitimate Resource Name or Location T1036.005, Indirect Command Execution T1202, System Binary Proxy Execution T1218
ends_with: \wermgr.exe 3 rules
Rename Legitimate Utilities T1036.003, Masquerading T1036
ends_with: \wininit.exe 3 rules
Masquerading T1036, Rename Legitimate Utilities T1036.003, Match Legitimate Resource Name or Location T1036.005
ends_with: \wsmprovhost.exe 3 rules
Inhibit System Recovery T1490, Masquerading T1036, Windows Remote Management T1021.006, PowerShell T1059.001
ends_with: \wusa.exe 3 rules
Exploit Public-Facing Application T1190, Web Shell T1505.003
ends_with: reg.exe 3 rules
Disable or Modify Tools T1562.001, Credentials in Registry T1552.002
eq: C:\Program Files\AVG\Antivirus\RegSvr.exe 3 rules
Registry Run Keys / Startup Folder T1547.001, Add-ins T1137.006
eq: C:\Program Files\Avast Software\Avast\RegSvr.exe 3 rules
Registry Run Keys / Startup Folder T1547.001, Add-ins T1137.006
eq: C:\Program Files\PowerShell\7-preview\pwsh.exe 3 rules
File Deletion T1070.004, PowerShell T1059.001
eq: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe 3 rules
File Deletion T1070.004, PowerShell T1059.001
eq: C:\Windows\SysWOW64\svchost.exe 3 rules
Masquerading T1036, Match Legitimate Resource Name or Location T1036.005, Impair Defenses T1562, Service Execution T1569.002
eq: C:\Windows\System32\ServerManager.exe 3 rules
PowerShell T1059.001, Distributed Component Object Model T1021.003
eq: C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe 3 rules
PowerShell T1059.001, Distributed Component Object Model T1021.003
eq: C:\Windows\System32\cmd.exe 3 rules
Exploit Public-Facing Application T1190, Web Shell T1505.003, PowerShell T1059.001, Bypass User Account Control T1548.002
eq: C:\Windows\System32\wuauclt.exe 3 rules
Match Legitimate Resource Name or Location T1036.005, Registry Run Keys / Startup Folder T1547.001
eq: C:\Windows\servicing\TrustedInstaller.exe 3 rules
Disable Windows Event Logging T1562.002, Modify Registry T1112, Registry Run Keys / Startup Folder T1547.001
eq: Registry 3 rules
Direct Volume Access T1006
in: "*\\ProgramData\\*" 3 rules
Exploitation for Privilege Escalation T1068, Access Token Manipulation T1134, Abuse Elevation Control Mechanism T1548, Ingress Tool Transfer T1105
in: "*\\Temp\\*" 3 rules
Exploitation for Privilege Escalation T1068, Access Token Manipulation T1134, Abuse Elevation Control Mechanism T1548, Ingress Tool Transfer T1105
match: :\ProgramData\ 3 rules
match: :\Users\ 3 rules
Command and Scripting Interpreter T1059, Data Encrypted for Impact T1486, Disable or Modify Tools T1562.001, Indirect Command Execution T1202
match: :\Users\Default\ 3 rules
Ingress Tool Transfer T1105, Masquerading T1036
match: :\Windows\Fonts\ 3 rules
Ingress Tool Transfer T1105, Masquerading T1036
match: :\Windows\IME\ 3 rules
Ingress Tool Transfer T1105, Masquerading T1036
match: :\Windows\Microsoft.NET\Framework64\ 3 rules
Trusted Developer Utilities Proxy Execution T1127, System Binary Proxy Execution T1218
match: :\Windows\Microsoft.NET\FrameworkArm64\ 3 rules
Trusted Developer Utilities Proxy Execution T1127, System Binary Proxy Execution T1218
match: :\Windows\Microsoft.NET\FrameworkArm\ 3 rules
Trusted Developer Utilities Proxy Execution T1127, System Binary Proxy Execution T1218
match: :\Windows\Microsoft.NET\Framework\ 3 rules
Trusted Developer Utilities Proxy Execution T1127, System Binary Proxy Execution T1218
match: :\Windows\WinSxS\ 3 rules
Native API T1106, System Binary Proxy Execution T1218, Masquerading T1036
match: \AppData\Local\Programs\midori-ng\ 3 rules
Remote Desktop Software T1219.002, Web Service T1102, Dead Drop Resolver T1102.001
match: \AppData\Temp\ 3 rules
System Binary Proxy Execution T1218, Ingress Tool Transfer T1105
match: \PerfLogs\ 3 rules
NTDS T1003.003, DLL T1574.001, Security Account Manager T1003.002
match: \ntlmrelayx 3 rules
LLMNR/NBT-NS Poisoning and SMB Relay T1557.001, LSASS Memory T1003.001
match: \smbrelayx 3 rules
LLMNR/NBT-NS Poisoning and SMB Relay T1557.001, LSASS Memory T1003.001
starts_with: C:\Program Files (x86)\Microsoft Office\ 3 rules
Process Injection T1055, DLL T1574.001, Registry Run Keys / Startup Folder T1547.001
starts_with: C:\Program Files\Microsoft Office\ 3 rules
Process Injection T1055, DLL T1574.001, Registry Run Keys / Startup Folder T1547.001
starts_with: C:\Program Files\Microsoft\Exchange Server\ 3 rules
Exfiltration Over Unencrypted Non-C2 Protocol T1048.003, PowerShell T1059.001, Windows Management Instrumentation Event Subscription T1546.003
starts_with: C:\Windows\Installer\MSI 3 rules
Modify Registry T1112, System Binary Proxy Execution T1218, Boot or Logon Autostart Execution T1547, Registry Run Keys / Startup Folder T1547.001
starts_with: C:\Windows\Temp\asgard2-agent\ 3 rules
PowerShell T1059.001, Distributed Component Object Model T1021.003, Direct Volume Access T1006
ends_with: .tmp 2 rules
Data Encrypted for Impact T1486, Disable or Modify Tools T1562.001
ends_with: :\Windows\SysWOW64\bash.exe 2 rules
Indirect Command Execution T1202
ends_with: :\Windows\System32\bash.exe 2 rules
Indirect Command Execution T1202
ends_with: :\Windows\System32\conhost.exe 2 rules
System Binary Proxy Execution T1218, Indirect Command Execution T1202
ends_with: :\windows\system32\svchost.exe 2 rules
File Deletion T1070.004, Protocol or Service Impersonation T1001.003
ends_with: C:\Program Files (x86)\PRTG Network Monitor\PRTG Probe.exe 2 rules
Web Service T1102, Dead Drop Resolver T1102.001
ends_with: C:\Program Files\PRTG Network Monitor\PRTG Probe.exe 2 rules
Web Service T1102, Dead Drop Resolver T1102.001
ends_with: \7zr.exe 2 rules
Archive via Utility T1560.001
ends_with: \AdFind.exe 2 rules
Domain Account T1087.002, Remote System Discovery T1018, Domain Groups T1069.002, Domain Trust Discovery T1482
ends_with: \Akagi.exe 2 rules
LSASS Memory T1003.001, Bypass User Account Control T1548.002
ends_with: \Akagi64.exe 2 rules
LSASS Memory T1003.001, Bypass User Account Control T1548.002
ends_with: \AppData\Local\Google\Chrome\Application\chrome.exe 2 rules
Web Service T1102, Dead Drop Resolver T1102.001
ends_with: \AppData\Local\Microsoft\Teams\current\Teams.exe 2 rules
Native API T1106, Phishing T1566, Spearphishing Attachment T1566.001
ends_with: \AppData\Local\Mozilla Firefox\firefox.exe 2 rules
Web Service T1102, Dead Drop Resolver T1102.001
ends_with: \AppData\Local\Programs\Microsoft VS Code\Code.exe 2 rules
LSASS Memory T1003.001, Native API T1106
ends_with: \AppData\Local\WebEx\WebexHost.exe 2 rules
LSASS Memory T1003.001, Registry Run Keys / Startup Folder T1547.001
ends_with: \AppData\Roaming\Spotify\Spotify.exe 2 rules
Registry Run Keys / Startup Folder T1547.001
ends_with: \Certify.exe 2 rules
LSASS Memory T1003.001, Steal or Forge Authentication Certificates T1649
ends_with: \Certipy.exe 2 rules
LSASS Memory T1003.001, Steal or Forge Authentication Certificates T1649
ends_with: \CoercedPotato.exe 2 rules
LSASS Memory T1003.001, Process Injection T1055
ends_with: \CreateMiniDump.exe 2 rules
LSASS Memory T1003.001
ends_with: \Dbgview.exe 2 rules
Tool T1588.002, Match Legitimate Resource Name or Location T1036.005, Indirect Command Execution T1202, System Binary Proxy Execution T1218
ends_with: \DismHost.exe 2 rules
Disable or Modify Tools T1562.001, Bypass User Account Control T1548.002
ends_with: \Dropbox.exe 2 rules
Web Service T1102, Dead Drop Resolver T1102.001, Modify Registry T1112
ends_with: \DumpMinitool.arm64.exe 2 rules
LSASS Memory T1003.001, Masquerading T1036
ends_with: \DumpMinitool.exe 2 rules
LSASS Memory T1003.001, Masquerading T1036
ends_with: \DumpMinitool.x86.exe 2 rules
LSASS Memory T1003.001, Masquerading T1036
ends_with: \EXCEL.EXE 2 rules
Indirect Command Execution T1202
ends_with: \EXCEL.exe 2 rules
Office Application Startup T1137, Rename Legitimate Utilities T1036.003
ends_with: \GUP.exe 2 rules
Ingress Tool Transfer T1105, DLL T1574.001
ends_with: \GetADUsers_windows.exe 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
ends_with: \GetNPUsers_windows.exe 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
ends_with: \GetUserSPNs_windows.exe 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
ends_with: \IMEWDBLD.exe 2 rules
Ingress Tool Transfer T1105, System Binary Proxy Execution T1218
ends_with: \Inveigh.exe 2 rules
LSASS Memory T1003.001
ends_with: \LocalPotato.exe 2 rules
LSASS Memory T1003.001
ends_with: \MBAMInstallerService.exe 2 rules
LSASS Memory T1003.001, Hidden Files and Directories T1564.001
ends_with: \MSPUB.EXE 2 rules
Phishing T1566, Spearphishing Attachment T1566.001, Hijack Execution Flow T1574, DLL T1574.001, Rename Legitimate Utilities T1036.003
ends_with: \Microsoft.Workflow.Compiler.exe 2 rules
Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010
ends_with: \Microsoft\Teams\current\Teams.exe 2 rules
Steal Application Access Token T1528, Registry Run Keys / Startup Folder T1547.001
ends_with: \NisSrv.exe 2 rules
DLL T1574.001
ends_with: \PowerTool.exe 2 rules
LSASS Memory T1003.001, Disable or Modify Tools T1562.001
ends_with: \PowerTool64.exe 2 rules
LSASS Memory T1003.001, Disable or Modify Tools T1562.001
ends_with: \PsExec.exe 2 rules
Tool T1588.002
ends_with: \PsExec64.exe 2 rules
Tool T1588.002
ends_with: \QtWeb.exe 2 rules
Web Service T1102, Dead Drop Resolver T1102.001
ends_with: \QuarksPwDump.exe 2 rules
LSASS Memory T1003.001, Security Account Manager T1003.002
ends_with: \QuickAssist.exe 2 rules
Web Protocols T1071.001, Exploitation of Remote Services T1210, Remote Desktop Software T1219.002
ends_with: \RDCMan.exe 2 rules
Remote Desktop Protocol T1021.001, Match Legitimate Resource Name or Location T1036.005, Indirect Command Execution T1202, System Binary Proxy Execution T1218
ends_with: \RegSvcs.exe 2 rules
Rundll32 T1218.011, Regsvr32 T1218.010
ends_with: \Regasm.exe 2 rules
Regsvcs/Regasm T1218.009
ends_with: \Regsvcs.exe 2 rules
Regsvcs/Regasm T1218.009
ends_with: \Rubeus.exe 2 rules
LSASS Memory T1003.001, OS Credential Dumping T1003, Pass the Ticket T1550.003, Kerberoasting T1558.003
ends_with: \SafetyKatz.exe 2 rules
LSASS Memory T1003.001
ends_with: \SelectMyParent.exe 2 rules
LSASS Memory T1003.001, Parent PID Spoofing T1134.004
ends_with: \SharPersist.exe 2 rules
LSASS Memory T1003.001, Scheduled Task/Job T1053
ends_with: \SharpChisel.exe 2 rules
LSASS Memory T1003.001, Internal Proxy T1090.001
ends_with: \SharpEvtMute.exe 2 rules
LSASS Memory T1003.001, Disable Windows Event Logging T1562.002
ends_with: \SharpImpersonation.exe 2 rules
LSASS Memory T1003.001, Token Impersonation/Theft T1134.001, Make and Impersonate Token T1134.003
ends_with: \SharpLDAPmonitor.exe 2 rules
LSASS Memory T1003.001
ends_with: \SharpLdapWhoami.exe 2 rules
LSASS Memory T1003.001, System Owner/User Discovery T1033
ends_with: \SharpUp.exe 2 rules
LSASS Memory T1003.001, Service Execution T1569.002, Executable Installer File Permissions Weakness T1574.005, Group Policy Discovery T1615
ends_with: \SharpView.exe 2 rules
LSASS Memory T1003.001, System Owner/User Discovery T1033, System Network Connections Discovery T1049, Domain Groups T1069.002, Network Share Discovery T1135, Domain Trust Discovery T1482
ends_with: \Stracciatella.exe 2 rules
LSASS Memory T1003.001, Command and Scripting Interpreter T1059, Disable or Modify Tools T1562.001
ends_with: \SysmonEOP.exe 2 rules
LSASS Memory T1003.001, Exploitation for Privilege Escalation T1068
ends_with: \Tools\Binn\SQLPS.exe 2 rules
PowerShell T1059.001
ends_with: \TrolleyExpress.exe 2 rules
LSASS Memory T1003.001, Rundll32 T1218.011
ends_with: \TruffleSnout.exe 2 rules
LSASS Memory T1003.001, Domain Trust Discovery T1482
ends_with: \VMwareToolBoxCmd.exe 2 rules
Command and Scripting Interpreter T1059
ends_with: \VMwareXferlogs.exe 2 rules
DLL T1574.001
ends_with: \WerFaultSecure.exe 2 rules
Disable or Modify Tools T1562.001, LSASS Memory T1003.001
ends_with: \WinRAR.exe 2 rules
Registry Run Keys / Startup Folder T1547.001, Rename Legitimate Utilities T1036.003
ends_with: \Windows\System32\lsass.exe 2 rules
Kerberoasting T1558.003, OS Credential Dumping T1003, LSASS Memory T1003.001
ends_with: \accesschk64.exe 2 rules
Local Groups T1069.001, Match Legitimate Resource Name or Location T1036.005, Indirect Command Execution T1202, System Binary Proxy Execution T1218
ends_with: \at.exe 2 rules
At T1053.002, Exploit Public-Facing Application T1190, Web Shell T1505.003
ends_with: \atexec_windows.exe 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
ends_with: \aurora-agent-64.exe 2 rules
LSASS Memory T1003.001, Registry Run Keys / Startup Folder T1547.001
ends_with: \aurora-agent.exe 2 rules
LSASS Memory T1003.001, Registry Run Keys / Startup Folder T1547.001
ends_with: \certreq.exe 2 rules
Ingress Tool Transfer T1105, Masquerading T1036
ends_with: \chcp.com 2 rules
System Language Discovery T1614.001, Masquerading T1036
ends_with: \cipher.exe 2 rules
Data Destruction T1485, Exploitation for Privilege Escalation T1068, Exploitation for Client Execution T1203
ends_with: \client32.exe 2 rules
ends_with: \cloudflared-windows-386.exe 2 rules
Internal Proxy T1090.001
ends_with: \cloudflared-windows-amd64.exe 2 rules
Internal Proxy T1090.001
ends_with: \cmdl32.exe 2 rules
System Binary Proxy Execution T1218, Ingress Tool Transfer T1105, Indirect Command Execution T1202
ends_with: \code-tunnel.exe 2 rules
Web Protocols T1071.001, Remote Access Tools T1219
ends_with: \crackmapexec.exe 2 rules
LSASS Memory T1003.001, Windows Management Instrumentation T1047, Scheduled Task/Job T1053, PowerShell T1059.001, Windows Command Shell T1059.003, Brute Force T1110
ends_with: \createdump.exe 2 rules
LSASS Memory T1003.001, Masquerading T1036
ends_with: \csi.exe 2 rules
Software Deployment Tools T1072, System Binary Proxy Execution T1218, Trusted Developer Utilities Proxy Execution T1127
ends_with: \cvtres.exe 2 rules
Process Injection T1055, Compile After Delivery T1027.004
ends_with: \dcomexec_windows.exe 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
ends_with: \dctask64.exe 2 rules
Dynamic-link Library Injection T1055.001, Masquerading T1036, Indirect Command Execution T1202, System Binary Proxy Execution T1218
ends_with: \defrag.exe 2 rules
Process Injection T1055, Masquerading T1036
ends_with: \dns.exe 2 rules
External Remote Services T1133
ends_with: \dnscmd.exe 2 rules
Modify Registry T1112, DLL T1574.001
ends_with: \dnx.exe 2 rules
Process Injection T1055, Compile After Delivery T1027.004, System Binary Proxy Execution T1218
ends_with: \dotnet.exe 2 rules
Exploit Public-Facing Application T1190, Web Shell T1505.003, System Binary Proxy Execution T1218
ends_with: \dpapi_windows.exe 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
ends_with: \dsacls.exe 2 rules
System Binary Proxy Execution T1218
ends_with: \dsquery.exe 2 rules
Domain Trust Discovery T1482, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087, Web Shell T1505.003
ends_with: \dump64.exe 2 rules
LSASS Memory T1003.001
ends_with: \extrac32.exe 2 rules
Ingress Tool Transfer T1105, System Binary Proxy Execution T1218
ends_with: \findDelegation_windows.exe 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
ends_with: \fltMC.exe 2 rules
Indicator Removal T1070, Impair Defenses T1562, Disable Windows Event Logging T1562.002
ends_with: \getPac_windows.exe 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
ends_with: \getST_windows.exe 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
ends_with: \getTGT_windows.exe 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
ends_with: \gmer.exe 2 rules
LSASS Memory T1003.001
ends_with: \gpupdate.exe 2 rules
Process Injection T1055, Exploitation for Privilege Escalation T1068, Exploitation for Client Execution T1203
ends_with: \hashcat.exe 2 rules
LSASS Memory T1003.001, Password Cracking T1110.002
ends_with: \htran.exe 2 rules
LSASS Memory T1003.001, Proxy T1090
ends_with: \ie4uinit.exe 2 rules
System Binary Proxy Execution T1218, Rename Legitimate Utilities T1036.003
ends_with: \ieexec.exe 2 rules
Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010
ends_with: \ifmap_windows.exe 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
ends_with: \ipconfig.exe 2 rules
Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087, Web Shell T1505.003, Masquerading T1036, Process Injection T1055
ends_with: \javaw.exe 2 rules
Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010
ends_with: \ksetup.exe 2 rules
ends_with: \livek64.exe 2 rules
ends_with: \lsm.exe 2 rules
Rename Legitimate Utilities T1036.003, Match Legitimate Resource Name or Location T1036.005, Masquerading T1036
ends_with: \mimikatz_windows.exe 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
ends_with: \mobsync.exe 2 rules
Process Injection T1055, System Binary Proxy Execution T1218
ends_with: \msaccess.exe 2 rules
Malicious File T1204.002, System Binary Proxy Execution T1218
ends_with: \mscorsvw.exe 2 rules
PowerShell T1059.001, Distributed Component Object Model T1021.003
ends_with: \msedge_proxy.exe 2 rules
System Binary Proxy Execution T1218
ends_with: \msidb.exe 2 rules
Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010
ends_with: \netview_windows.exe 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
ends_with: \nmapAnswerMachine_windows.exe 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
ends_with: \opdump_windows.exe 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
ends_with: \plink.exe 2 rules
Protocol Tunneling T1572, Masquerading T1036
ends_with: \presentationhost.exe 2 rules
System Binary Proxy Execution T1218
ends_with: \procmon.exe 2 rules
Exploitation for Privilege Escalation T1068, Disable or Modify Tools T1562.001
ends_with: \procmon64.exe 2 rules
Exploitation for Privilege Escalation T1068, Disable or Modify Tools T1562.001
ends_with: \psexec.exe 2 rules
Rename Legitimate Utilities T1036.003, Remote Services T1021, System Services T1569
ends_with: \psexec_windows.exe 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
ends_with: \pypykatz.exe 2 rules
LSASS Memory T1003.001, Security Account Manager T1003.002
ends_with: \quser.exe 2 rules
System Owner/User Discovery T1033, Local Account T1087.001, Remote System Discovery T1018, Account Discovery T1087, Web Shell T1505.003
ends_with: \qwinsta.exe 2 rules
System Owner/User Discovery T1033, Local Account T1087.001, Exploit Public-Facing Application T1190, Web Shell T1505.003
ends_with: \rdp_check_windows.exe 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
ends_with: \regini.exe 2 rules
Modify Registry T1112
ends_with: \replace.exe 2 rules
Ingress Tool Transfer T1105, System Binary Proxy Execution T1218
ends_with: \rfusclient.exe 2 rules
ends_with: \ruby.exe 2 rules
Windows Remote Management T1021.006, Command and Scripting Interpreter T1059
ends_with: \rutserv.exe 2 rules
ends_with: \sambaPipe_windows.exe 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
ends_with: \sdbinst.exe 2 rules
Application Shimming T1546.011
ends_with: \sdelete64.exe 2 rules
Data Destruction T1485, Match Legitimate Resource Name or Location T1036.005, Indirect Command Execution T1202, System Binary Proxy Execution T1218
ends_with: \shutdown.exe 2 rules
System Shutdown/Reboot T1529
ends_with: \sihost.exe 2 rules
Masquerading T1036
ends_with: \smartscreen.exe 2 rules
Process Injection T1055, Masquerading T1036
ends_with: \smbclient_windows.exe 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
ends_with: \smbserver_windows.exe 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
ends_with: \smss.exe 2 rules
Masquerading T1036
ends_with: \sniff_windows.exe 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
ends_with: \sniffer_windows.exe 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
ends_with: \split_windows.exe 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
ends_with: \spoolsv.exe 2 rules
Process Injection T1055, Masquerading T1036
ends_with: \sqlcmd.exe 2 rules
Data from Local System T1005
ends_with: \sqlite.exe 2 rules
Data from Local System T1005, Steal Web Session Cookie T1539, Credentials from Web Browsers T1555.003
ends_with: \sqlite3.exe 2 rules
Data from Local System T1005, Steal Web Session Cookie T1539, Credentials from Web Browsers T1555.003
ends_with: \squirrel.exe 2 rules
System Binary Proxy Execution T1218
ends_with: \tar.exe 2 rules
Archive Collected Data T1560, Archive via Utility T1560.001
ends_with: \taskhost.exe 2 rules
Rename Legitimate Utilities T1036.003, Match Legitimate Resource Name or Location T1036.005, Masquerading T1036
ends_with: \taskhostw.exe 2 rules
Inhibit System Recovery T1490, Masquerading T1036
ends_with: \taskkill.exe 2 rules
Masquerading T1036, System Binary Proxy Execution T1218, Exploitation for Privilege Escalation T1068, Exploitation for Client Execution T1203
ends_with: \taskmgr.exe 2 rules
Exploitation for Privilege Escalation T1068, Exploitation for Client Execution T1203, Masquerading T1036
ends_with: \teams.exe 2 rules
ends_with: \thunderbird.exe 2 rules
Spearphishing Attachment T1566.001, Exfiltration Over Unencrypted Non-C2 Protocol T1048.003
ends_with: \ticketer_windows.exe 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
ends_with: \tomcat\bin\tomcat8.exe 2 rules
Kerberoasting T1558.003, Pass the Ticket T1550.003, Steal or Forge Kerberos Tickets T1558
ends_with: \tscon.exe 2 rules
Remote Desktop Software T1219.002
ends_with: \update.exe 2 rules
System Binary Proxy Execution T1218
ends_with: \userinit.exe 2 rules
Process Injection T1055, Masquerading T1036
ends_with: \vssvc.exe 2 rules
Process Injection T1055, Inhibit System Recovery T1490
ends_with: \w32tm.exe 2 rules
System Time Discovery T1124
ends_with: \wab.exe 2 rules
ends_with: \wabmig.exe 2 rules
ends_with: \winPEASany.exe 2 rules
LSASS Memory T1003.001, Network Service Discovery T1046, System Information Discovery T1082, Account Discovery T1087
ends_with: \winPEASany_ofs.exe 2 rules
LSASS Memory T1003.001, Network Service Discovery T1046, System Information Discovery T1082, Account Discovery T1087
ends_with: \winPEASx64.exe 2 rules
LSASS Memory T1003.001, Network Service Discovery T1046, System Information Discovery T1082, Account Discovery T1087
ends_with: \winPEASx64_ofs.exe 2 rules
LSASS Memory T1003.001, Network Service Discovery T1046, System Information Discovery T1082, Account Discovery T1087
ends_with: \winPEASx86.exe 2 rules
LSASS Memory T1003.001, Network Service Discovery T1046, System Information Discovery T1082, Account Discovery T1087
ends_with: \winPEASx86_ofs.exe 2 rules
LSASS Memory T1003.001, Network Service Discovery T1046, System Information Discovery T1082, Account Discovery T1087
ends_with: \winrar.exe 2 rules
Archive via Utility T1560.001
ends_with: \workfolders.exe 2 rules
Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010
ends_with: \wuauclt.exe 2 rules
Exploitation for Privilege Escalation T1068, Exploitation for Client Execution T1203, System Binary Proxy Execution T1218
ends_with: \wuaucltcore.exe 2 rules
Match Legitimate Resource Name or Location T1036.005, DLL T1574.001
ends_with: \xordump.exe 2 rules
LSASS Memory T1003.001, Masquerading T1036
ends_with: driverquery.exe 2 rules
ends_with: findstr.exe 2 rules
Ingress Tool Transfer T1105, System Binary Proxy Execution T1218, Credentials In Files T1552.001, NTFS File Attributes T1564.004
ends_with: python.exe 2 rules
Command and Scripting Interpreter T1059
ends_with: python2.exe 2 rules
Command and Scripting Interpreter T1059
ends_with: python3.exe 2 rules
Command and Scripting Interpreter T1059
eq: "*\\appdata\\Roaming\\*" 2 rules
Screen Capture T1113
eq: "*\\cmd.exe" 2 rules
Indicator Removal T1070, PowerShell T1059.001, Malicious File T1204.002
eq: "*\\rundll32.exe" 2 rules
Process Injection T1055
eq: "*\\spoolsv.exe" 2 rules
Print Processors T1547.012, Exploitation for Privilege Escalation T1068
eq: "*\\wermgr.exe" 2 rules
Application Layer Protocol T1071, Dynamic-link Library Injection T1055.001
eq: - 2 rules
eq: <unknown process> 2 rules
Domain Trust Discovery T1482, Remote Desktop Protocol T1021.001
eq: C:\Program Files\AVG\Antivirus\x86\RegSvr.exe 2 rules
Registry Run Keys / Startup Folder T1547.001
eq: C:\Program Files\Avast Software\Avast\x86\RegSvr.exe 2 rules
Registry Run Keys / Startup Folder T1547.001
eq: C:\Program Files\Windows Defender\MsMpEng.exe 2 rules
Registry Run Keys / Startup Folder T1547.001, Disable or Modify Tools T1562.001
eq: C:\WINDOWS\system32\msiexec.exe 2 rules
Hidden Files and Directories T1564.001, Registry Run Keys / Startup Folder T1547.001
eq: C:\WINDOWS\system32\svchost.exe 2 rules
Component Object Model Hijacking T1546.015, Scheduled Task/Job T1053, Scheduled Task T1053.005
eq: C:\WINDOWS\system32\wbem\scrcons.exe 2 rules
Windows Management Instrumentation Event Subscription T1546.003
eq: C:\Windows\PSEXESVC.exe 2 rules
eq: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe 2 rules
PowerShell T1059.001
eq: C:\Windows\SysWOW64\explorer.exe 2 rules
File Deletion T1070.004
eq: C:\Windows\SysWOW64\regsvr32.exe 2 rules
Regsvr32 T1218.010, Rundll32 T1218.011, Add-ins T1137.006
eq: C:\Windows\SysWOW64\schtasks.exe 2 rules
Process Injection T1055, Scheduled Task T1053.005
eq: C:\Windows\System32\OpenWith.exe 2 rules
Thread Execution Hijacking T1055.003, Modify Registry T1112
eq: C:\Windows\System32\RuntimeBroker.exe 2 rules
Registry Run Keys / Startup Folder T1547.001, Scheduled Task/Job T1053, Scheduled Task T1053.005
eq: C:\Windows\System32\conhost.exe 2 rules
Windows Remote Management T1021.006, Windows Management Instrumentation Event Subscription T1546.003
eq: C:\Windows\System32\dsac.exe 2 rules
PowerShell T1059.001
eq: C:\Windows\System32\regsvr32.exe 2 rules
Regsvr32 T1218.010, Rundll32 T1218.011, Add-ins T1137.006
eq: C:\Windows\System32\schtasks.exe 2 rules
Process Injection T1055, Scheduled Task T1053.005
eq: C:\Windows\System32\sdiagnhost.exe 2 rules
Distributed Component Object Model T1021.003, PowerShell T1059.001
eq: C:\Windows\System32\spoolsv.exe 2 rules
Port Monitors T1547.010, Registry Run Keys / Startup Folder T1547.001
eq: C:\Windows\System32\wsmprovhost.exe 2 rules
PowerShell T1059.001
eq: C:\Windows\UUS\arm64\wuaucltcore.exe 2 rules
Match Legitimate Resource Name or Location T1036.005
eq: C:\Windows\system32\lsass.exe 2 rules
LSASS Driver T1547.008, Windows Service T1543.003
eq: C:\Windows\system32\msiexec.exe 2 rules
Security Support Provider T1547.005, Component Object Model Hijacking T1546.015
eq: C:\Windows\system32\wevtutil.exe 2 rules
Disable Windows Event Logging T1562.002
eq: C:\Windows\syswow64\MsiExec.exe 2 rules
Security Support Provider T1547.005, Registry Run Keys / Startup Folder T1547.001
eq: MemCompression 2 rules
eq: vmmem 2 rules
in: "*\\Users\\*" 2 rules
Exploitation for Privilege Escalation T1068, Access Token Manipulation T1134, Abuse Elevation Control Mechanism T1548
in: "*\\Windows\\Tasks\\*" 2 rules
Ingress Tool Transfer T1105, Visual Basic T1059.005
in: "*\\\\*" 2 rules
Exploitation for Privilege Escalation T1068, Access Token Manipulation T1134, Abuse Elevation Control Mechanism T1548
in: "*\\cscript.exe" 2 rules
JavaScript T1059.007
in: "*\\program files*" 2 rules
CMSTP T1218.003
in: "*\\temp\\*" 2 rules
Scheduled Task/Job T1053, Visual Basic T1059.005
in: "*\\users\\public\\*" 2 rules
Scheduled Task/Job T1053, Visual Basic T1059.005
in: "*\\windows\\*" 2 rules
CMSTP T1218.003
in: "*\\wscript.exe" 2 rules
JavaScript T1059.007
match: :\$Recycle.bin 2 rules
Ingress Tool Transfer T1105
match: :\Program Files (x86)\Microsoft Office\ 2 rules
Malware T1587.001, Modify Registry T1112
match: :\Program Files\Common Files\Microsoft Shared\ClickToRun\ 2 rules
Malware T1587.001, Modify Registry T1112
match: :\ProgramData\Microsoft\Windows Defender\Platform\ 2 rules
Domain Trust Discovery T1482, Disable Windows Event Logging T1562.002
match: C:\Program Files (x86)\Safari\ 2 rules
Web Service T1102, Dead Drop Resolver T1102.001
match: C:\Program Files\Safari\ 2 rules
Web Service T1102, Dead Drop Resolver T1102.001
match: C:\Program Files\Windows Defender Advanced Threat Protection\ 2 rules
Web Service T1102, Dead Drop Resolver T1102.001
match: C:\Program Files\Windows Defender\ 2 rules
Web Service T1102, Dead Drop Resolver T1102.001
match: C:\ProgramData\Microsoft\Windows Defender\Platform\ 2 rules
Web Service T1102, Dead Drop Resolver T1102.001
match: C:\Users\Public\ 2 rules
Indirect Command Execution T1202, System Binary Proxy Execution T1218
match: HotPotato 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
match: Juicy Potato 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
match: JuicyPotato 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
match: PetitPotam 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
match: RECYCLER.BIN\ 2 rules
match: RECYCLERS.BIN\ 2 rules
match: RottenPotato 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
match: \$Recycle.Bin\ 2 rules
Disable or Modify Tools T1562.001, OS Credential Dumping T1003, LSASS Memory T1003.001
match: \$Recycle.bin 2 rules
Indirect Command Execution T1202
match: \AppData\Local\Discord\ 2 rules
Web Service T1102, Dead Drop Resolver T1102.001
match: \AppData\Local\Microsoft\WindowsApps\ 2 rules
Ingress Tool Transfer T1105, Hidden Window T1564.003, Masquerading T1036
match: \AppData\Roaming\ 2 rules
LSASS Memory T1003.001, Disable or Modify Tools T1562.001, Visual Basic T1059.005, Indirect Command Execution T1202, System Binary Proxy Execution T1218
match: \Documents\ 2 rules
Disable or Modify Tools T1562.001, OS Credential Dumping T1003, LSASS Memory T1003.001
match: \LocalPotato 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
match: \Microsoft Visual Studio\ 2 rules
LSASS Memory T1003.001, Masquerading T1036
match: \ProgramData\ 2 rules
Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010
match: \Public\ 2 rules
NTDS T1003.003, Security Account Manager T1003.002
match: \Start Menu\Programs\Startup\ 2 rules
Disable or Modify Tools T1562.001, OS Credential Dumping T1003, LSASS Memory T1003.001
match: \Temporary Internet 2 rules
Command and Scripting Interpreter T1059, Data Encrypted for Impact T1486, Disable or Modify Tools T1562.001
match: \Temporary Internet Files\Content.Outlook\ 2 rules
Spearphishing Attachment T1566.001, Registry Run Keys / Startup Folder T1547.001
match: \Tor Browser\ 2 rules
Remote Desktop Software T1219.002
match: \Users\Contacts\ 2 rules
Indirect Command Execution T1202
match: \Users\Searches\ 2 rules
Indirect Command Execution T1202
match: \Windows\Fonts\ 2 rules
Indirect Command Execution T1202
match: \Windows\IME\ 2 rules
Indirect Command Execution T1202
match: \avira_system_speedup.tmp 2 rules
Inhibit System Recovery T1490
match: \goldenPac 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
match: \inetpub\wwwroot\ 2 rules
Disable or Modify Tools T1562.001, OS Credential Dumping T1003, LSASS Memory T1003.001
match: \just_dce_ 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
match: \karmaSMB 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
match: \kintercept 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
match: \pwsh.exe 2 rules
PowerShell T1059.001, SMB/Windows Admin Shares T1021.002, Data from Network Shared Drive T1039, Exfiltration Over Alternative Protocol T1048
match: \python 2 rules
Network Service Discovery T1046, Command Obfuscation T1027.010, Python T1059.006
match: \rpcdump 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
match: \samrdump 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
match: \secretsdump 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
match: \setup.exe 2 rules
Modify Registry T1112, Registry Run Keys / Startup Folder T1547.001
match: \smbexec 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
match: \temp\is- 2 rules
Inhibit System Recovery T1490
match: \wmiexec 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
match: \wmipersist 2 rules
LSASS Memory T1003.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
starts_with: C:\$WINDOWS.~BT\ 2 rules
Masquerading T1036, Direct Volume Access T1006
starts_with: C:\$WinREAgent\Scratch\ 2 rules
Inhibit System Recovery T1490, Direct Volume Access T1006
starts_with: C:\Program Files (x86)\CCleaner\ 2 rules
DLL T1574.001
starts_with: C:\Program Files (x86)\Microsoft Visual Studio\ 2 rules
DLL T1574.001, PowerShell T1059.001
starts_with: C:\Program Files (x86)\Microsoft\EdgeWebView\ 2 rules
Ingress Tool Transfer T1105, Hidden Window T1564.003, Registry Run Keys / Startup Folder T1547.001
starts_with: C:\Program Files (x86)\QtWeb\ 2 rules
Web Service T1102, Dead Drop Resolver T1102.001
starts_with: C:\Program Files\CCleaner\ 2 rules
DLL T1574.001
starts_with: C:\Program Files\Citrix\ 2 rules
PowerShell T1059.001, Distributed Component Object Model T1021.003
starts_with: C:\Program Files\Microsoft Security Client\ 2 rules
DLL T1574.001
starts_with: C:\Program Files\Microsoft Visual Studio\ 2 rules
DLL T1574.001, PowerShell T1059.001
starts_with: C:\Program Files\QtWeb\ 2 rules
Web Service T1102, Dead Drop Resolver T1102.001
starts_with: C:\Users\' 2 rules
Data Encrypted for Impact T1486, Disable or Modify Tools T1562.001, Masquerading T1036
starts_with: C:\Windows\Microsoft.NET\Framework 2 rules
Registry Run Keys / Startup Folder T1547.001, Scheduled Task/Job T1053, Scheduled Task T1053.005
starts_with: C:\Windows\SoftwareDistribution\ 2 rules
Masquerading T1036, Direct Volume Access T1006
starts_with: C:\Windows\SystemApps\ 2 rules
GUI Input Capture T1056.002, Direct Volume Access T1006
starts_with: C:\Windows\Temp\ 2 rules
Direct Volume Access T1006, Registry Run Keys / Startup Folder T1547.001
starts_with: C:\Windows\Temp\{ 2 rules
Inhibit System Recovery T1490
starts_with: C:\Windows\uus\ 2 rules
Masquerading T1036, Direct Volume Access T1006

TargetFilename 169 entries

ends_with: .dll 21 rules
Ingress Tool Transfer T1105, DLL T1574.001, Malicious File T1204.002, System Binary Proxy Execution T1218, Remote Desktop Software T1219.002, Trusted Developer Utilities Proxy Execution T1127
ends_with: .exe 18 rules
Ingress Tool Transfer T1105, System Binary Proxy Execution T1218, Remote Desktop Software T1219.002, Trusted Developer Utilities Proxy Execution T1127, External Remote Services T1133, Remote Access Tools T1219
ends_with: .vbs 16 rules
Ingress Tool Transfer T1105, Exploit Public-Facing Application T1190, Web Shell T1505.003, Malicious File T1204.002, Trusted Developer Utilities Proxy Execution T1127, External Remote Services T1133
ends_with: .bat 15 rules
Ingress Tool Transfer T1105, Exploit Public-Facing Application T1190, Web Shell T1505.003, Malicious File T1204.002, Trusted Developer Utilities Proxy Execution T1127, External Remote Services T1133
ends_with: .ps1 15 rules
Ingress Tool Transfer T1105, Exploit Public-Facing Application T1190, Web Shell T1505.003, Malicious File T1204.002, Trusted Developer Utilities Proxy Execution T1127, External Remote Services T1133
ends_with: .vbe 13 rules
Ingress Tool Transfer T1105, Malicious File T1204.002, Trusted Developer Utilities Proxy Execution T1127, External Remote Services T1133, Remote Access Tools T1219, Lateral Tool Transfer T1570
ends_with: .hta 12 rules
Ingress Tool Transfer T1105, Malicious File T1204.002, Trusted Developer Utilities Proxy Execution T1127, External Remote Services T1133, Remote Access Tools T1219, Lateral Tool Transfer T1570
starts_with: C:\Users\ 12 rules
Bypass User Account Control T1548.002, Visual Basic T1059.005, JavaScript T1059.007, Compromise Software Supply Chain T1195.002, Adversary-in-the-Middle T1557
match: \AppData\Local\Temp\ 11 rules
Compromise Software Supply Chain T1195.002, Adversary-in-the-Middle T1557, Spearphishing Attachment T1566.001, System Binary Proxy Execution T1218, Disable or Modify Tools T1562.001, LSASS Memory T1003.001
ends_with: .cmd 8 rules
Ingress Tool Transfer T1105, Malicious File T1204.002, Trusted Developer Utilities Proxy Execution T1127, External Remote Services T1133, Remote Access Tools T1219, Lateral Tool Transfer T1570
ends_with: .js 8 rules
Ingress Tool Transfer T1105, Trusted Developer Utilities Proxy Execution T1127, External Remote Services T1133, Remote Access Tools T1219, Lateral Tool Transfer T1570, Visual Basic T1059.005
ends_with: .scr 8 rules
Malicious File T1204.002, Ingress Tool Transfer T1105, Remote Access Tools T1219, Lateral Tool Transfer T1570, Screensaver T1546.002, Rundll32 T1218.011
ends_with: .sys 6 rules
Exploitation for Privilege Escalation T1068, Malicious File T1204.002, Command and Scripting Interpreter T1059
ends_with: .wsf 6 rules
Malicious File T1204.002, Ingress Tool Transfer T1105, Trusted Developer Utilities Proxy Execution T1127, External Remote Services T1133, System Binary Proxy Execution T1218, Registry Run Keys / Startup Folder T1547.001
ends_with: .aspx 5 rules
Web Shell T1505.003, Exploit Public-Facing Application T1190, Ingress Tool Transfer T1105, Trusted Developer Utilities Proxy Execution T1127, External Remote Services T1133
ends_with: .docm 5 rules
Spearphishing Attachment T1566.001, Office Application Startup T1137, Malware T1587.001
ends_with: .dotm 5 rules
Spearphishing Attachment T1566.001, Office Application Startup T1137, Malware T1587.001
ends_with: .iso 5 rules
Spearphishing Attachment T1566.001, Masquerading T1036, Double File Extension T1036.007
ends_with: .lnk 5 rules
Command and Scripting Interpreter T1059, Registry Run Keys / Startup Folder T1547.001, Double File Extension T1036.007
ends_with: .xlsm 5 rules
Spearphishing Attachment T1566.001, Office Application Startup T1137, Malware T1587.001
ends_with: .xltm 5 rules
Spearphishing Attachment T1566.001, Office Application Startup T1137, Malware T1587.001
ends_with: .asp 4 rules
Web Shell T1505.003, Exploit Public-Facing Application T1190
ends_with: .psm1 4 rules
Command and Scripting Interpreter T1059, Malicious File T1204.002, Registry Run Keys / Startup Folder T1547.001
ends_with: .zip 4 rules
Ingress Tool Transfer T1105, Remote Access Tools T1219, Lateral Tool Transfer T1570, Command and Scripting Interpreter T1059, Double File Extension T1036.007, System Binary Proxy Execution T1218
eq: "*\\temp\\*" 4 rules
Credentials from Web Browsers T1555.003, Data from Local System T1005, Screen Capture T1113
starts_with: C:\Windows\Temp\ 4 rules
Match Legitimate Resource Name or Location T1036.005, LSASS Memory T1003.001
ends_with: .7z 3 rules
Ingress Tool Transfer T1105, Remote Access Tools T1219, Lateral Tool Transfer T1570, Command and Scripting Interpreter T1059, System Binary Proxy Execution T1218
ends_with: .ashx 3 rules
Web Shell T1505.003, Exploit Public-Facing Application T1190
ends_with: .chm 3 rules
Command and Scripting Interpreter T1059
ends_with: .com 3 rules
Ingress Tool Transfer T1105, Remote Access Tools T1219, Lateral Tool Transfer T1570, Malicious File T1204.002
ends_with: .dmp 3 rules
LSASS Memory T1003.001
ends_with: .ocx 3 rules
Malicious File T1204.002, System Binary Proxy Execution T1218
ends_with: .potm 3 rules
Spearphishing Attachment T1566.001
ends_with: .pptm 3 rules
Spearphishing Attachment T1566.001
ends_with: .rar 3 rules
Ingress Tool Transfer T1105, Remote Access Tools T1219, Lateral Tool Transfer T1570, Double File Extension T1036.007, System Binary Proxy Execution T1218
ends_with: .vba 3 rules
Visual Basic T1059.005, JavaScript T1059.007, Spearphishing Attachment T1566.001, Malicious File T1204.002, Registry Run Keys / Startup Folder T1547.001
ends_with: :Zone.Identifier 3 rules
File Deletion T1070.004
in: "*\\Windows\\Temp\\*" 3 rules
Mshta T1218.005, Archive Collected Data T1560
in: "*\\Windows\\servicing\\*" 3 rules
Masquerading T1036, Data Destruction T1485, AppDomainManager T1574.014
match: .bat:Zone 3 rules
NTFS File Attributes T1564.004
match: .dll:Zone 3 rules
NTFS File Attributes T1564.004
match: .exe 3 rules
Compromise Software Supply Chain T1195.002, Adversary-in-the-Middle T1557, Visual Basic T1059.005, JavaScript T1059.007
match: .exe:Zone 3 rules
NTFS File Attributes T1564.004
match: .hta:Zone 3 rules
NTFS File Attributes T1564.004
match: .ps1:Zone 3 rules
NTFS File Attributes T1564.004
match: .vbe:Zone 3 rules
NTFS File Attributes T1564.004
match: .vbs:Zone 3 rules
NTFS File Attributes T1564.004
match: .xll:Zone 3 rules
NTFS File Attributes T1564.004
match: :\Temp\ 3 rules
System Binary Proxy Execution T1218, Ingress Tool Transfer T1105
match: :\Users\ 3 rules
JavaScript T1059.007, Ingress Tool Transfer T1105, User Execution T1204, Exfiltration to Cloud Storage T1567.002, Masquerading T1036
match: \AppData\ 3 rules
JavaScript T1059.007, Ingress Tool Transfer T1105, User Execution T1204, Phishing T1566, Spearphishing Attachment T1566.001, Hijack Execution Flow T1574
match: \Desktop\ 3 rules
Registry Run Keys / Startup Folder T1547.001, Data Encrypted for Impact T1486, Ingress Tool Transfer T1105, System Binary Proxy Execution T1218
match: \Start Menu\Programs\Startup\ 3 rules
Registry Run Keys / Startup Folder T1547.001, Ingress Tool Transfer T1105, System Binary Proxy Execution T1218
match: \WindowsPowerShell\Modules\ 3 rules
match: \Windows\Temp\ 3 rules
Web Shell T1505.003
match: \lsass 3 rules
LSASS Memory T1003.001
starts_with: C:\Windows\System32\ 3 rules
Bypass User Account Control T1548.002, DLL T1574.001, System Script Proxy Execution T1216
ends_with: .cer 2 rules
Private Keys T1552.004, Credentials from Password Stores T1555, Exploit Public-Facing Application T1190, Web Shell T1505.003
ends_with: .cpl 2 rules
Spearphishing Attachment T1566.001
ends_with: .dat 2 rules
Domain Groups T1069.002, Domain Account T1087.002, Domain Trust Discovery T1482
ends_with: .diagcab 2 rules
System Binary Proxy Execution T1218
ends_with: .docx 2 rules
Office Application Startup T1137, Malware T1587.001
ends_with: .evtx 2 rules
Indicator Removal T1070, Disable Windows Event Logging T1562.002
ends_with: .jar 2 rules
Malicious File T1204.002, Registry Run Keys / Startup Folder T1547.001
ends_with: .jse 2 rules
Visual Basic T1059.005, JavaScript T1059.007, Malicious File T1204.002, Registry Run Keys / Startup Folder T1547.001
ends_with: .jsp 2 rules
Exploit Public-Facing Application T1190, Web Shell T1505.003
ends_with: .key 2 rules
Private Keys T1552.004, Credentials from Password Stores T1555, Domain Account T1136.002, Windows Service T1543.003, Lateral Tool Transfer T1570
ends_with: .log 2 rules
Indicator Removal T1070, File Deletion T1070.004
ends_with: .msi 2 rules
Malicious File T1204.002, Registry Run Keys / Startup Folder T1547.001
ends_with: .pdf 2 rules
Malware T1587.001
ends_with: .py 2 rules
Ingress Tool Transfer T1105, Trusted Developer Utilities Proxy Execution T1127, External Remote Services T1133, Command and Scripting Interpreter T1059
ends_with: .rdp 2 rules
Spearphishing Attachment T1566.001
ends_with: .scf 2 rules
Malicious File T1204.002, System Binary Proxy Execution T1218
ends_with: .sed 2 rules
System Binary Proxy Execution T1218
ends_with: .svg 2 rules
Spearphishing Attachment T1566.001, Double File Extension T1036.007
ends_with: .txt 2 rules
Masquerading T1036, Data Encrypted for Impact T1486
ends_with: .wll 2 rules
Add-ins T1137.006, Malware T1587.001
ends_with: .wsh 2 rules
Malicious File T1204.002, System Binary Proxy Execution T1218
ends_with: .xll 2 rules
Add-ins T1137.006, Malware T1587.001
ends_with: .xls 2 rules
Office Application Startup T1137, Malware T1587.001
ends_with: .xlsx 2 rules
Office Application Startup T1137, Malware T1587.001
ends_with: .xlt 2 rules
Office Application Startup T1137, Malware T1587.001
ends_with: \Microsoft\Outlook\VbaProject.OTM 2 rules
Fallback Channels T1008, Office Application Startup T1137, Event Triggered Execution T1546
ends_with: \WerFault.exe 2 rules
Match Legitimate Resource Name or Location T1036.005, DLL T1574.001
ends_with: \comctl32.dll 2 rules
Bypass User Account Control T1548.002
ends_with: \dns.log 2 rules
External Remote Services T1133
ends_with: \ntds.dit 2 rules
NTDS T1003.003, Security Account Manager T1003.002
eq: "*:Zone.Identifier" 2 rules
Ingress Tool Transfer T1105, Mark-of-the-Web Bypass T1553.005
eq: "*\\appdata\\Roaming\\*" 2 rules
Screen Capture T1113
eq: "*\\spool\\drivers\\x64\\*" 2 rules
Print Processors T1547.012
eq: C:\Windows\System32\drivers\LiveKdD.SYS 2 rules
in: "*.dll" 2 rules
Rundll32 T1218.011, Data Destruction T1485
in: "*.exe" 2 rules
Rundll32 T1218.011, Data Destruction T1485
in: "*:\\Temp\\*" 2 rules
Masquerading T1036, Spearphishing Link T1566.002
in: "*:\\Windows\\Temp\\*" 2 rules
Masquerading T1036, Spearphishing Link T1566.002
in: "*Recycle.bin*" 2 rules
Masquerading T1036, AppDomainManager T1574.014
in: "*\\AppData\\Local\\Temp\\*" 2 rules
Masquerading T1036, Archive Collected Data T1560
in: "*\\HttpProxy\\OAB\\*" 2 rules
External Remote Services T1133, Exploit Public-Facing Application T1190, Web Shell T1505.003
in: "*\\HttpProxy\\owa\\auth\\*" 2 rules
External Remote Services T1133, Exploit Public-Facing Application T1190, Web Shell T1505.003
in: "*\\PerfLogs\\*" 2 rules
Masquerading T1036, AppDomainManager T1574.014
in: "*\\ScreenConnect\\App_Extensions\\*" 2 rules
Exploit Public-Facing Application T1190
in: "*\\Terminal Server Client\\Cache\\*.bmc" 2 rules
Remote Desktop Protocol T1021.001, File Deletion T1070.004
in: "*\\Terminal Server Client\\Cache\\cache*.bin" 2 rules
Remote Desktop Protocol T1021.001, File Deletion T1070.004
in: "*\\Users\\Administrator\\Music\\*" 2 rules
Masquerading T1036, AppDomainManager T1574.014
in: "*\\Users\\Default\\*" 2 rules
Masquerading T1036, AppDomainManager T1574.014
in: "*\\Windows\\Media\\*" 2 rules
Masquerading T1036, AppDomainManager T1574.014
in: "*\\Windows\\PLA\\Reports\\*" 2 rules
Mshta T1218.005
in: "*\\Windows\\PLA\\Rules\\*" 2 rules
Mshta T1218.005
in: "*\\Windows\\PLA\\Templates\\*" 2 rules
Mshta T1218.005
in: "*\\Windows\\Registration\\CRMLog\\*" 2 rules
Mshta T1218.005
in: "*\\Windows\\SysWOW64\\Com\\dmp\\*" 2 rules
Mshta T1218.005
in: "*\\Windows\\SysWOW64\\Tasks\\*" 2 rules
Mshta T1218.005
in: "*\\Windows\\System32\\Com\\dmp\\*" 2 rules
Mshta T1218.005
in: "*\\Windows\\System32\\LogFiles\\WMI\\*" 2 rules
Mshta T1218.005
in: "*\\Windows\\System32\\Microsoft\\Crypto\\RSA\\MachineKeys\\*" 2 rules
Mshta T1218.005
in: "*\\Windows\\System32\\Tasks\\*" 2 rules
Mshta T1218.005
in: "*\\Windows\\System32\\spool\\PRINTERS\\*" 2 rules
Mshta T1218.005
in: "*\\Windows\\System32\\spool\\SERVERS\\*" 2 rules
Mshta T1218.005
in: "*\\Windows\\System32\\spool\\drivers\\color\\*" 2 rules
Mshta T1218.005
in: "*\\Windows\\Tasks\\*" 2 rules
Mshta T1218.005
in: "*\\Windows\\repair\\*" 2 rules
Masquerading T1036, AppDomainManager T1574.014
in: "*\\Windows\\tracing\\*" 2 rules
Mshta T1218.005
in: "*\\inetpub\\wwwroot\\aspnet_client\\*" 2 rules
External Remote Services T1133, Exploit Public-Facing Application T1190, Web Shell T1505.003
match: .cmd:Zone 2 rules
NTFS File Attributes T1564.004
match: .dmp 2 rules
Security Account Manager T1003.002, LSASS Memory T1003.001
match: .doc. 2 rules
Double File Extension T1036.007
match: .docm:Zone 2 rules
Spearphishing Attachment T1566.001
match: .docx. 2 rules
Double File Extension T1036.007
match: .jpg. 2 rules
Double File Extension T1036.007
match: .lnk:Zone 2 rules
NTFS File Attributes T1564.004
match: .one:Zone 2 rules
NTFS File Attributes T1564.004
match: .pdf. 2 rules
Double File Extension T1036.007
match: .ppt. 2 rules
Double File Extension T1036.007
match: .pptm:Zone 2 rules
Spearphishing Attachment T1566.001
match: .pptx. 2 rules
Double File Extension T1036.007
match: .xls. 2 rules
Double File Extension T1036.007
match: .xlsm:Zone 2 rules
Spearphishing Attachment T1566.001
match: .xlsx. 2 rules
Double File Extension T1036.007
match: :\ProgramData\ 2 rules
System Binary Proxy Execution T1218, Ingress Tool Transfer T1105
match: :\Users\Public\ 2 rules
Ingress Tool Transfer T1105, System Binary Proxy Execution T1218, User Execution T1204
match: C:\$WINDOWS.~BT\ 2 rules
Match Legitimate Resource Name or Location T1036.005
match: C:\$WinREAgent\ 2 rules
Match Legitimate Resource Name or Location T1036.005
match: C:\PerfLogs\ 2 rules
Registry Run Keys / Startup Folder T1547.001, Command and Scripting Interpreter T1059
match: C:\Users\Public\ 2 rules
Registry Run Keys / Startup Folder T1547.001, Command and Scripting Interpreter T1059
match: C:\Windows\SoftwareDistribution\ 2 rules
Match Legitimate Resource Name or Location T1036.005
match: C:\Windows\SysWOW64\ 2 rules
Match Legitimate Resource Name or Location T1036.005
match: C:\Windows\System32\ 2 rules
Match Legitimate Resource Name or Location T1036.005
match: C:\Windows\WinSxS\ 2 rules
Match Legitimate Resource Name or Location T1036.005
match: C:\Windows\uus\ 2 rules
Match Legitimate Resource Name or Location T1036.005
match: \AppData\Local\ 2 rules
Ingress Tool Transfer T1105, System Binary Proxy Execution T1218
match: \AppData\Roaming\ 2 rules
Ingress Tool Transfer T1105, System Binary Proxy Execution T1218
match: \Microsoft\Excel\XLSTART 2 rules
Office Application Startup T1137, Malware T1587.001
match: \Microsoft\Word\STARTUP 2 rules
Office Application Startup T1137, Malware T1587.001
match: \Office 2 rules
Office Application Startup T1137, Malware T1587.001
match: \PowerShell\7\Modules\ 2 rules
match: \Program Files 2 rules
Office Application Startup T1137, Malware T1587.001
match: \STARTUP 2 rules
Office Application Startup T1137, Malware T1587.001
match: \Users\ 2 rules
Phishing T1566, Spearphishing Attachment T1566.001, Hijack Execution Flow T1574, DLL T1574.001, Data Encrypted for Impact T1486
match: \Users\Public\ 2 rules
match: \XLSTART 2 rules
Office Application Startup T1137, Malware T1587.001
match: \hive_sam_ 2 rules
Credentials In Files T1552.001, Security Account Manager T1003.002
match: \inetpub\wwwroot\ 2 rules
Ingress Tool Transfer T1105, System Binary Proxy Execution T1218, Web Shell T1505.003
match: __PSScriptPolicyTest_ 2 rules
regex_match: "(?<!\/)\b\w+(\.\w+)?:\w+(\.\w+)?$" 2 rules
NTFS File Attributes T1564.004
starts_with: C:\$WINDOWS.~BT\NewOS\ 2 rules
Shortcut Modification T1547.009, Registry Run Keys / Startup Folder T1547.001
starts_with: C:\PerfLogs\ 2 rules
Command and Scripting Interpreter T1059
starts_with: C:\Windows\SysWOW64\ 2 rules
DLL T1574.001, System Script Proxy Execution T1216
starts_with: C:\Windows\System32\winevt\Logs\ 2 rules
Indicator Removal T1070, Disable Windows Event Logging T1562.002
starts_with: C:\Windows\WinSxS\ 2 rules
DLL T1574.001

Hashes 142 entries

match: IMPHASH=0E2216679CA6E1094D63322E3412D650 3 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002, LSASS Memory T1003.001
match: IMPHASH=14C4E4C72BA075E9069EE67F39188AD8 3 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002, Bypass User Account Control T1548.002
match: IMPHASH=330768A4F172E10ACB6287B87289D83B 3 rules
NTFS File Attributes T1564.004, Disable Windows Event Logging T1562.002, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=38D9E015591BBFD4929E0D0F47FA0055 3 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002, LSASS Memory T1003.001
match: IMPHASH=3C782813D4AFCE07BBFC5A9772ACDBDC 3 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002, Bypass User Account Control T1548.002
match: IMPHASH=3DE09703C8E79ED2CA3F01074719906B 3 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002, Bypass User Account Control T1548.002
match: IMPHASH=41923EA1F824FE63EA5BEB84DB7A3E74 3 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002, Bypass User Account Control T1548.002
match: IMPHASH=5834ED4291BDEB928270428EBBAF7604 3 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002, Bypass User Account Control T1548.002
match: IMPHASH=5A8A8A43F25485E7EE1B201EDCBC7A38 3 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002, Bypass User Account Control T1548.002
match: IMPHASH=6F33F4A5FC42B8CEC7314947BD13F30F 3 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002, Bypass User Account Control T1548.002
match: IMPHASH=767637C23BB42CD5D7397CF58B0BE688 3 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002, Bypass User Account Control T1548.002
match: IMPHASH=7D010C6BB6A3726F327F7E239166D127 3 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002, Bypass User Account Control T1548.002
match: IMPHASH=89159BA4DD04E4CE5559F132A9964EB3 3 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002, Bypass User Account Control T1548.002
match: IMPHASH=A53A02B997935FD8EEDCB5F7ABAB9B9F 3 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002, LSASS Memory T1003.001
match: IMPHASH=DC7D30B90B2D8ABF664FBED2B1B59894 3 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002, Bypass User Account Control T1548.002
match: IMPHASH=E96A73C7BF33A464C510EDE582318BF2 3 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002, LSASS Memory T1003.001
match: IMPHASH=021BCCA20BA3381B11BDDE26B4E62F20 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=03866661686829d806989e2fc5a72606 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=0588081AB0E63BA785938467E1B10CCA 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=07A2D4DCBD6CB2C6A45E6B101F0B6D51 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=09D278F9DE118EF09163C6140255C690 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=0C477898BBF137BBD6F2A54E3B805FF4 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=0CA9F02B537BCEA20D4EA5EB1A9FE338 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=0CF479628D7CC1EA25EC7998A92F5051 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=0D9EC08BAC6C07D9987DFD0F1506587C 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=11083E75553BAAE21DC89CE8F9A195E4 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=12ce1c0f3f5837ecc18a3782408fa975 2 rules
Domain Account T1087.002, Remote System Discovery T1018, Domain Groups T1069.002, Domain Trust Discovery T1482
match: IMPHASH=13F08707F759AF6003837A150A371BA1 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=16A48C3CABF98A9DC1BF02C07FE1EA00 2 rules
Windows Management Instrumentation T1047, Visual Basic T1059.005, JavaScript T1059.007, XSL Script Processing T1220
match: IMPHASH=17244E8B6B8227E57FE709CCAD421420 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=1781F06048A7E58B323F0B9259BE798B 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=17B461A082950FC6332228572138B80C 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=19584675D94829987952432E018D5056 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=1B1A3F43BF37B5BFE60751F2EE2F326E 2 rules
Windows Management Instrumentation T1047, Visual Basic T1059.005, JavaScript T1059.007, XSL Script Processing T1220
match: IMPHASH=1BB6F93B129F398C7C4A76BB97450BBA 2 rules
Dynamic-link Library Injection T1055.001, Masquerading T1036, Indirect Command Execution T1202, System Binary Proxy Execution T1218
match: IMPHASH=21aa085d54992511b9f115355e468782 2 rules
Domain Account T1087.002, Remote System Discovery T1018, Domain Groups T1069.002, Domain Trust Discovery T1482
match: IMPHASH=22A22BC9E4E0D2F189F1EA01748816AC 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=233F85F2D4BC9D6521A6CAAE11A1E7F5 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=23867A89C2B8FC733BE6CF5EF902F2D1 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=24AF2584CBF4D60BBE5C6D1B31B3BE6D 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=25CE42B079282632708FC846129E98A5 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=28dc68bb6d6bf4f6b2db8dd7588b2511 2 rules
Exploitation for Privilege Escalation T1068, Windows Service T1543.003
match: IMPHASH=2A1BC4913CD5ECB0434DF07CB675B798 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=32089B8851BBF8BC2D014E9F37288C83 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=37777A96245A3C74EB217308F3546F4C 2 rules
Windows Management Instrumentation T1047, Visual Basic T1059.005, JavaScript T1059.007, XSL Script Processing T1220
match: IMPHASH=3A19059BD7688CB88E70005F18EFC439 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=3AB3655E5A14D4EEFC547F4781BF7F9E 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=3AD59991CCF1D67339B319B15A41B35D 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=40445337761D80CF465136FAFB1F63E6 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=45bfe170e0cd654bc1e2ae3fca3ac3f4 2 rules
Exploitation for Privilege Escalation T1068, Windows Service T1543.003
match: IMPHASH=49b639b4acbecc49d72a01f357aa4930 2 rules
Domain Account T1087.002, Remote System Discovery T1018, Domain Groups T1069.002, Domain Trust Discovery T1482
match: IMPHASH=4A07F944A83E8A7C2525EFA35DD30E2F 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=4DA924CF622D039D58BCE71CDF05D242 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=4fbf3f084fbbb2470b80b2013134df35 2 rules
Domain Account T1087.002, Remote System Discovery T1018, Domain Groups T1069.002, Domain Trust Discovery T1482
match: IMPHASH=51791678F351C03A0EB4E2A7B05C6E17 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=563233BFA169ACC7892451F71AD5850A 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=59223B5F52D8799D38E0754855CBDF42 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=5B76DA3ACDEDC8A5CDF23A798B5936B4 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=6118619783FC175BC7EBECFF0769B46E 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=632969DDF6DBF4E0F53424B75E4B91F2 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=680dad9e300346e05a85023965867201 2 rules
Domain Account T1087.002, Remote System Discovery T1018, Domain Groups T1069.002, Domain Trust Discovery T1482
match: IMPHASH=6834B1B94E49701D77CCB3C0895E1AFD 2 rules
Dynamic-link Library Injection T1055.001, Masquerading T1036, Indirect Command Execution T1202, System Binary Proxy Execution T1218
match: IMPHASH=713C29B396B907ED71A72482759ED757 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=730073214094CD328547BF1F72289752 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=749A7BB1F0B4C4455949C0B2BF7F9E9F 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=7E6CF3FF4576581271AC8A313B2AAB46 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=7FA30E6BB7E8E8A69155636E50BF1B28 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=819B19D53CA6736448F9325A85736792 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=81E75D8F1D276C156653D3D8813E4A43 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=829DA329CE140D873B4A8BDE2CBFAA7E 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=84B763C45C0E4A3E7CA5548C710DB4EE 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=8628B2608957A6B0C6330AC3DE28CE2E 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=87575CB7A0E0700EB37F2E3668671A08 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=885C99CCFBE77D1CBFCB9C4E7C1A3313 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=8A790F401B29FA87BC1E56F7272B3AA6 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=8B114550386E31895DFAB371E741123D 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=94CB940A1A6B65BED4D5A8F849CE9793 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=959A83047E80AB68B368FDB3F4C6E4EA 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=96DF3A3731912449521F6F8D183279B1 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=9A9DBEC5C62F0380B4FA5FD31DEFFEDF 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=9D68781980370E00E0BD939EE5E6C141 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=9D87C9D67CE724033C0B40CC4CA1B206 2 rules
Windows Management Instrumentation T1047, Visual Basic T1059.005, JavaScript T1059.007, XSL Script Processing T1220
match: IMPHASH=A23D29C9E566F2FA8FFBB79267F5DF80 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=A37FF327F8D48E8A4D2F757E1B6E70BC 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=ADA161BF41B8E5E9132858CB54CAB5FB 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=AF8A3976AD71E5D5FDFB67DDB8DADFCE 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=B12619881D79C3ACADF45E752A58554A 2 rules
Windows Management Instrumentation T1047, Visual Basic T1059.005, JavaScript T1059.007, XSL Script Processing T1220
match: IMPHASH=B18A1401FF8F444056D29450FBC0A6CE 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=BC129092B71C89B4D4C8CDF8EA590B29 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=BCCA3C247B619DCD13C8CDFF5F123932 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=C547F2E66061A8DFFB6F5A3FF63C0A74 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=CB2B65BB77D995CC1C0E5DF1C860133C 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=CB567F9498452721D77A451374955F5F 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=D6D0F80386E1380D05CB78E871BC72B1 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=DC25EE78E2EF4D36FAA0BADF1E7461C9 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=E6F9D5152DA699934B30DAAB206471F6 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=E7A3A5C377E2D29324093377D7DB1C66 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=F1039CED4B91572AB7847D26032E6BBF 2 rules
Dynamic-link Library Injection T1055.001, Masquerading T1036, Indirect Command Execution T1202, System Binary Proxy Execution T1218
match: IMPHASH=F9A28C458284584A93B14216308D31BD 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=FAA2AC19875FADE461C8D89DCF2710A3 2 rules
Dynamic-link Library Injection T1055.001, Masquerading T1036, Indirect Command Execution T1202, System Binary Proxy Execution T1218
match: IMPHASH=FFDD59E0318B85A3E480874D9796D872 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=bf6223a49e45d99094406777eb6004ba 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: IMPHASH=d144de8117df2beceaba2201ad304764 2 rules
Domain Account T1087.002, Remote System Discovery T1018, Domain Groups T1069.002, Domain Trust Discovery T1482
match: IMPHASH=e57401fbdadcd4571ff385ab82bd5d6d 2 rules
NTFS File Attributes T1564.004, OS Credential Dumping T1003, Tool T1588.002
match: SHA256=0409c9b12f9d0eda86e461ed9bdabeefb00172b26322079681a0bdf48e68dc28 2 rules
Internal Proxy T1090.001
match: SHA256=083150724b49604c8765c1ba19541fa260b133be0acb0647fcd936d81f054499 2 rules
Internal Proxy T1090.001
match: SHA256=1293525a19cfe3bc8296b62fbfe19f083632ed644a1c18c10b045a1d3030d81a 2 rules
Internal Proxy T1090.001
match: SHA256=19074674c6fbdaa573b3081745e5e26144fdf7a086d14e0e220d1814f1f13078 2 rules
Internal Proxy T1090.001
match: SHA256=1fbd8362b2d2d2e6a5750ae3db69cd1815e6c1d31da48a98b796450971a8e039 2 rules
Internal Proxy T1090.001
match: SHA256=2fb6c04c4f95fb8d158af94c137f90ac820716deaf88d8ebec956254e046cb29 2 rules
Internal Proxy T1090.001
match: SHA256=2fbbfc8299537ff80cadf9d0e27c223fe0ccb9052bf9d8763ad717bbfa521c77 2 rules
Internal Proxy T1090.001
match: SHA256=3153d2baa462978dd22ab33d1c2274ecc88c200225d6a3327f98d5b752d08f5c 2 rules
Internal Proxy T1090.001
match: SHA256=39ddceb56a15798826a5fc4892fa2b474c444bb4d7a8bf2fa95e41cab10fa7a1 2 rules
Internal Proxy T1090.001
match: SHA256=44303d6572956f28a0f2e4b188934fb9874f2584f5c81fa431a463cfbf28083b 2 rules
Internal Proxy T1090.001
match: SHA256=53f8adbd76c0eb16f5e43cadde422474d8a06f9c8f959389c1930042ad8beaa5 2 rules
Internal Proxy T1090.001
match: SHA256=5b3c2d846ab162dc6bc595cce3a49de5731afde5d6060be7066d21b013a28373 2 rules
Internal Proxy T1090.001
match: SHA256=5d38c46032a58e28ae5f7d174d8761ec3d64d186677f3ec53af5f51afb9bfd2f 2 rules
Internal Proxy T1090.001
match: SHA256=648c8d2f8001c113d2986dd00b7bbd181593d462bef73522cee212c4f71f95b3 2 rules
Internal Proxy T1090.001
match: SHA256=7cfb411d04bac42ef93d1f0c93c0a481e38c6f4612b97ae89d4702595988edc7 2 rules
Internal Proxy T1090.001
match: SHA256=9ec7e6c8e1bfd883663d8d9d62c9e4f9ae373b731407181e32491b27a7218a2c 2 rules
Internal Proxy T1090.001
match: SHA256=ae047e2095e46c3f9c518b2be67ec753f4f0aad23b261a361fcb6144dcdb63b4 2 rules
Internal Proxy T1090.001
match: SHA256=af2b9161cfcb654b16408cd6b098afe9d1fb61a037d18d7090a119d4c0c8e0f0 2 rules
Internal Proxy T1090.001
match: SHA256=b34b3c3a91e3165d1481f0b3ec23eab93a1cfba94345a6cbfe5b18ddbd48eac7 2 rules
Internal Proxy T1090.001
match: SHA256=b3d21940a10fdef5e415ad70331ce257c24fe3bcf7722262302e0421791f87e8 2 rules
Internal Proxy T1090.001
match: SHA256=b3f9c06151e30ee43d39e788a79cd918a314f24e04fe87f3de8272a2057b624f 2 rules
Internal Proxy T1090.001
match: SHA256=b6e5c5d2567ae8c69cc012ebcae30e6c9b5359d64a58d17ba75ec89f8bce71ac 2 rules
Internal Proxy T1090.001
match: SHA256=b6fc9493778cbe3bfc062d73f5cc604bc0ff058bc5e5dc6aac87f3a4008b54b6 2 rules
Internal Proxy T1090.001
match: SHA256=bb67c7623ba92fe64ffd9816b8d5b3b1ea3013960a30bd4cf6e295b3eb5b1bad 2 rules
Internal Proxy T1090.001
match: SHA256=c01356092a365b84f84f0e66870bd1a05ba3feb53cafd973fa5fea2534bee234 2 rules
Internal Proxy T1090.001
match: SHA256=c2cfd23fdc6c0e1b1ffa0e545cbe556f18d11b362b4a89ba0713f6ab01c4827f 2 rules
Internal Proxy T1090.001
match: SHA256=ccd11f2328023a0e7929e845d5b6e7bc783fb4650d65faef3ae090239d4bbce2 2 rules
Internal Proxy T1090.001
match: SHA256=cd81b2792f0739f473c31c9cb7cf2313154bfa28b839975802b90e8790bb5058 2 rules
Internal Proxy T1090.001
match: SHA256=ce95df7f69664c3df19b76028e115931919a71517b776da7b42d353e2ff4a670 2 rules
Internal Proxy T1090.001
match: SHA256=d14c52d9220b606f428a8fe9f7c108b0d6f14cf71e7384749e98e6a95962e68f 2 rules
Internal Proxy T1090.001
match: SHA256=d2513e58bb03ccc83affde685c6ef987924c37ce6707d8e9857e2524b0d7e90f 2 rules
Internal Proxy T1090.001
match: SHA256=d3a0e1a79158f3985cd49607ebe0cdfcc49cb9af96b8f43aefd0cdfe2f22e663 2 rules
Internal Proxy T1090.001
match: SHA256=e1e70fa42059911bc6685fafef957f9a73fc66f214d0704a9b932683a5204032 2 rules
Internal Proxy T1090.001
match: SHA256=f49cde976e628012c9db73e1c8d76081944ecf2297cdafeb78bb13290da274c4 2 rules
Internal Proxy T1090.001
match: SHA256=f5c5e962577e2293c4ad10603816dce7cc273585969615fbf4e4bfa9eaff1688 2 rules
Internal Proxy T1090.001
match: SHA256=f7848034e010d55f15e474ca998f96391e320ff29b00cfcc4c5e536529703e75 2 rules
Internal Proxy T1090.001
match: SHA256=f813484ea441404f18caad96f28138e8aaf0cb256163c09c2ab8a3acab87f69f 2 rules
Internal Proxy T1090.001
match: SHA256=fc4a0802ab9c7409b892ca00636bec61e2acfc911bccfdeb9978b8ab5a2f828d 2 rules
Internal Proxy T1090.001

OriginalFileName 130 entries

eq: pwsh.dll 72 rules
PowerShell T1059.001, Disable or Modify Tools T1562.001, Obfuscated Files or Information T1027, Modify Registry T1112, Command and Scripting Interpreter T1059, Ingress Tool Transfer T1105
eq: PowerShell.EXE 64 rules
PowerShell T1059.001, Disable or Modify Tools T1562.001, Obfuscated Files or Information T1027, Command and Scripting Interpreter T1059, Windows Management Instrumentation T1047, Ingress Tool Transfer T1105
eq: wmic.exe 33 rules
Windows Management Instrumentation T1047, System Information Discovery T1082, Malicious File T1204.002, Regsvr32 T1218.010, Account Discovery T1087, Visual Basic T1059.005
eq: Cmd.Exe 32 rules
Windows Command Shell T1059.003, File Deletion T1070.004, Command and Scripting Interpreter T1059, Change Default File Association T1546.001, Exploitation for Client Execution T1203, Malicious File T1204.002
eq: reg.exe 29 rules
Disable or Modify Tools T1562.001, Modify Registry T1112, Registry Run Keys / Startup Folder T1547.001, Indicator Blocking T1562.006, Control Panel T1218.002, Event Triggered Execution T1546
eq: RUNDLL32.EXE 28 rules
Rundll32 T1218.011, Exploitation for Client Execution T1203, Exfiltration Over Unencrypted Non-C2 Protocol T1048.003, DLL T1574.001, NTFS File Attributes T1564.004, Windows Credential Manager T1555.004
eq: net.exe 16 rules
SMB/Windows Admin Shares T1021.002, Service Stop T1489, Local Account T1136.001, Remote System Discovery T1018, Local Account T1087.001, Domain Account T1087.002
eq: net1.exe 16 rules
SMB/Windows Admin Shares T1021.002, Service Stop T1489, Local Account T1136.001, Remote System Discovery T1018, Local Account T1087.001, Domain Account T1087.002
eq: cscript.exe 15 rules
System Binary Proxy Execution T1218, Exploitation for Client Execution T1203, Visual Basic T1059.005, Command and Scripting Interpreter T1059, Indirect Command Execution T1202, DLL T1574.001
eq: wscript.exe 15 rules
System Binary Proxy Execution T1218, Exploitation for Client Execution T1203, Visual Basic T1059.005, Command and Scripting Interpreter T1059, Indirect Command Execution T1202, DLL T1574.001
eq: netsh.exe 14 rules
Disable or Modify System Firewall T1562.004, Network Sniffing T1040, Proxy T1090, System Network Configuration Discovery T1016, Netsh Helper DLL T1546.007, Rename Legitimate Utilities T1036.003
eq: schtasks.exe 14 rules
Scheduled Task T1053.005, PowerShell T1059.001, Match Legitimate Resource Name or Location T1036.005, Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047
eq: CertUtil.exe 13 rules
Obfuscated Files or Information T1027, Ingress Tool Transfer T1105, Install Root Certificate T1553.004, System Binary Proxy Execution T1218, Phishing T1566, Spearphishing Attachment T1566.001
eq: curl.exe 11 rules
Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010, Command and Scripting Interpreter T1059
eq: FINDSTR.EXE 10 rules
Credentials In Files T1552.001, Group Policy Preferences T1552.006, Ingress Tool Transfer T1105, System Binary Proxy Execution T1218, NTFS File Attributes T1564.004, Security Software Discovery T1518.001
eq: REGSVR32.EXE 10 rules
Regsvr32 T1218.010, Mshta T1218.005, Hijack Execution Flow T1574, Rundll32 T1218.011, Command and Scripting Interpreter T1059
eq: sc.exe 10 rules
Disable or Modify Tools T1562.001, Windows Service T1543.003, Services Registry Permissions Weakness T1574.011, Service Stop T1489, OS Credential Dumping T1003, Automated Collection T1119
eq: bitsadmin.exe 9 rules
BITS Jobs T1197, Rename Legitimate Utilities T1036.003, Ingress Tool Transfer T1105, Mshta T1218.005, Phishing T1566, Spearphishing Attachment T1566.001
eq: odbcconf.exe 9 rules
Odbcconf T1218.008, Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010
eq: whoami.exe 9 rules
System Owner/User Discovery T1033, Local Account T1087.001, Remote System Discovery T1018, Account Discovery T1087, Web Shell T1505.003
eq: powershell_ise.EXE 8 rules
Ingress Tool Transfer T1105, PowerShell T1059.001, Disable or Modify Tools T1562.001, Command and Scripting Interpreter T1059, Malicious File T1204.002, Rename Legitimate Utilities T1036.003
eq: powershell.exe 8 rules
Modify Registry T1112, Indirect Command Execution T1202, System Binary Proxy Execution T1218, Domain Accounts T1078.002, Account Manipulation T1098, Indicator Removal T1070
eq: MSHTA.EXE 7 rules
Mshta T1218.005, Native API T1106, Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Malicious File T1204.002
eq: CertOC.exe 6 rules
Ingress Tool Transfer T1105, System Binary Proxy Execution T1218, Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Malicious File T1204.002
eq: FIND.EXE 6 rules
Group Policy Preferences T1552.006, Security Software Discovery T1518.001, Steganography T1027.003, Masquerading T1036, Indirect Command Execution T1202
eq: PowerShell_ISE.EXE 6 rules
PowerShell T1059.001, Disable or Modify Tools T1562.001, Command Obfuscation T1027.010, Msiexec T1218.007, Ingress Tool Transfer T1105, System Binary Proxy Execution T1218
eq: RegAsm.exe 6 rules
Regsvcs/Regasm T1218.009, Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010
eq: WBADMIN.EXE 6 rules
Inhibit System Recovery T1490, NTDS T1003.003, Indicator Removal T1070
eq: msdt.exe 6 rules
Indirect Command Execution T1202, Masquerading T1036, System Binary Proxy Execution T1218, Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047
eq: mshta.exe 6 rules
Exploitation for Client Execution T1203, Indirect Command Execution T1202, System Binary Proxy Execution T1218, DLL T1574.001, JavaScript T1059.007, Deobfuscate/Decode Files or Information T1140
eq: powershell_ise.exe 6 rules
Indirect Command Execution T1202, System Binary Proxy Execution T1218, Domain Accounts T1078.002, Account Manipulation T1098, Indicator Removal T1070, PowerShell T1059.001
eq: HH.exe 5 rules
Compiled HTML File T1218.001, Windows Management Instrumentation T1047, Regsvr32 T1218.010, Phishing T1566, Spearphishing Attachment T1566.001, PowerShell T1059.001
eq: InstallUtil.exe 5 rules
System Binary Proxy Execution T1218, Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010
eq: RegSvcs.exe 5 rules
Regsvcs/Regasm T1218.009, Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010
eq: msiexec.exe 5 rules
Msiexec T1218.007, Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010
eq: CMSTP.EXE 4 rules
Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010, CMSTP T1218.003
eq: REGEDIT.EXE 4 rules
Query Registry T1012, Modify Registry T1112
eq: WinWord.exe 4 rules
Indirect Command Execution T1202, Rename Legitimate Utilities T1036.003
eq: XCOPY.EXE 4 rules
Rename Legitimate Utilities T1036.003, Credentials from Web Browsers T1555.003, SMB/Windows Admin Shares T1021.002, Data from Network Shared Drive T1039, Exfiltration Over Alternative Protocol T1048
eq: appcmd.exe 4 rules
Disable Windows Event Logging T1562.002, OS Credential Dumping T1003, Web Shell T1505.003
eq: mstsc.exe 4 rules
Remote Desktop Software T1219.002, Remote Desktop Protocol T1021.001
eq: regsvr32.exe 4 rules
Exploitation for Client Execution T1203, Indirect Command Execution T1202, System Binary Proxy Execution T1218, DLL T1574.001, Rename Legitimate Utilities T1036.003
eq: robocopy.exe 4 rules
Rename Legitimate Utilities T1036.003, Credentials from Web Browsers T1555.003, SMB/Windows Admin Shares T1021.002, Data from Network Shared Drive T1039, Exfiltration Over Alternative Protocol T1048
eq: wevtutil.exe 4 rules
Account Discovery T1087, Rename Legitimate Utilities T1036.003, Clear Windows Event Logs T1070.001, Disable Windows Event Logging T1562.002, Unsecured Credentials T1552, Remote System Discovery T1018
eq: winget.exe 4 rules
Command and Scripting Interpreter T1059
eq: 7z.exe 3 rules
Archive via Utility T1560.001, Rename Legitimate Utilities T1036.003
eq: 7za.exe 3 rules
Archive via Utility T1560.001, Rename Legitimate Utilities T1036.003
eq: AddInUtil.exe 3 rules
System Binary Proxy Execution T1218
eq: Bash.exe 3 rules
Indirect Command Execution T1202, Mshta T1218.005
eq: CONHOST.EXE 3 rules
PowerShell T1059.001, Windows Command Shell T1059.003, Hidden Window T1564.003, Rename Legitimate Utilities T1036.003, Bypass User Account Control T1548.002
eq: Excel.exe 3 rules
Indirect Command Execution T1202, Rename Legitimate Utilities T1036.003
eq: IEExec.exe 3 rules
Ingress Tool Transfer T1105, Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010
eq: POWERPNT.EXE 3 rules
Indirect Command Execution T1202, Rename Legitimate Utilities T1036.003
eq: PingCastle.exe 3 rules
Active Scanning T1595, Command and Scripting Interpreter T1059, Indirect Command Execution T1202
eq: RUNDLL32.exe 3 rules
Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010, Rundll32 T1218.011
eq: ScriptRunner.exe 3 rules
System Binary Proxy Execution T1218, Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010
eq: VSSADMIN.EXE 3 rules
OS Credential Dumping T1003, Security Account Manager T1003.002, NTDS T1003.003, Indicator Removal T1070, Inhibit System Recovery T1490, Remote System Discovery T1018
eq: WerFault.exe 3 rules
Bypass User Account Control T1548.002, LSASS Memory T1003.001, Masquerading T1036
eq: cmd.exe 3 rules
Windows Command Shell T1059.003, Indirect Command Execution T1202, System Binary Proxy Execution T1218, Indicator Removal T1070
eq: diskshadow.exe 3 rules
System Binary Proxy Execution T1218, Indicator Removal T1070, Inhibit System Recovery T1490
eq: psexesvc.exe 3 rules
Rename Legitimate Utilities T1036.003
eq: wget.exe 3 rules
eq: ATTRIB.EXE 2 rules
Hidden Files and Directories T1564.001
eq: AdExp 2 rules
Domain Groups T1069.002, Domain Account T1087.002, Domain Trust Discovery T1482
eq: AdFind.exe 2 rules
Domain Account T1087.002, Remote System Discovery T1018, Domain Groups T1069.002, Domain Trust Discovery T1482
eq: AgentExecutor.exe 2 rules
System Binary Proxy Execution T1218
eq: Cmd.EXE 2 rules
PowerShell T1059.001, Obfuscated Files or Information T1027
eq: DSACLS.EXE 2 rules
System Binary Proxy Execution T1218
eq: DumpMinitool.arm64.exe 2 rules
LSASS Memory T1003.001, Masquerading T1036
eq: DumpMinitool.exe 2 rules
LSASS Memory T1003.001, Masquerading T1036
eq: DumpMinitool.x86.exe 2 rules
LSASS Memory T1003.001, Masquerading T1036
eq: FX_VER_INTERNALNAME_STR 2 rules
LSASS Memory T1003.001, Masquerading T1036
eq: IE4UINIT.EXE 2 rules
System Binary Proxy Execution T1218, Rename Legitimate Utilities T1036.003
eq: MMC.exe 2 rules
Group Policy Modification T1484.001, Right-to-Left Override T1036.002, Malicious File T1204.002, MMC T1218.014
eq: Microsoft.Workflow.Compiler.exe 2 rules
Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010
eq: MpCmdRun.exe 2 rules
Ingress Tool Transfer T1105, System Binary Proxy Execution T1218, Disable or Modify Tools T1562.001
eq: Msxsl.exe 2 rules
Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010
eq: NirCmd.exe 2 rules
Service Execution T1569.002, Command and Scripting Interpreter T1059, Indirect Command Execution T1202
eq: PowerShell.Exe 2 rules
PowerShell T1059.001
eq: PresentationHost.exe 2 rules
System Binary Proxy Execution T1218
eq: REGINI.EXE 2 rules
Modify Registry T1112
eq: REGSVR32.exe 2 rules
Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010
eq: RstrtMgr.dll 2 rules
Data Encrypted for Impact T1486, Disable or Modify Tools T1562.001
eq: WorkFolders.exe 2 rules
Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010
eq: \msiexec.exe 2 rules
Msiexec T1218.007, Match Legitimate Resource Name or Location T1036.005
eq: bcdedit.exe 2 rules
Inhibit System Recovery T1490, Indicator Removal T1070, Bootkit T1542.003
eq: bsdtar 2 rules
Archive Collected Data T1560, Archive via Utility T1560.001
eq: cmdkey.exe 2 rules
Cached Domain Credentials T1003.005
eq: csi.exe 2 rules
Software Deployment Tools T1072, System Binary Proxy Execution T1218, Trusted Developer Utilities Proxy Execution T1127
eq: drvqry.exe 2 rules
eq: dsquery.exe 2 rules
Domain Trust Discovery T1482, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087, Web Shell T1505.003
eq: esentutl.exe 2 rules
Data from Local System T1005, Credentials from Web Browsers T1555.003
eq: finger.exe 2 rules
Ingress Tool Transfer T1105, Rename Legitimate Utilities T1036.003
eq: fltMC.exe 2 rules
Indicator Removal T1070, Impair Defenses T1562, Disable Windows Event Logging T1562.002
eq: fsutil.exe 2 rules
Peripheral Device Discovery T1120, Indicator Removal T1070, Data Destruction T1485
eq: ftp.exe 2 rules
Command and Scripting Interpreter T1059, Indirect Command Execution T1202
eq: gpg.exe 2 rules
Data Encrypted for Impact T1486
eq: javaw.exe 2 rules
Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010
eq: ksetup.exe 2 rules
eq: ldifde.exe 2 rules
Ingress Tool Transfer T1105, System Binary Proxy Execution T1218
eq: livekd.exe 2 rules
eq: msedge_proxy.exe 2 rules
System Binary Proxy Execution T1218
eq: msteams.exe 2 rules
eq: nltestrk.exe 2 rules
System Network Configuration Discovery T1016, Domain Trust Discovery T1482, Remote System Discovery T1018
eq: node.exe 2 rules
JavaScript T1059.007
eq: pcalua.exe 2 rules
Phishing T1566, Spearphishing Attachment T1566.001, Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010
eq: procdump 2 rules
LSASS Memory T1003.001, Rename Legitimate Utilities T1036.003
eq: psexec.c 2 rules
Rename Legitimate Utilities T1036.003, Remote Services T1021, System Services T1569
eq: psservice.exe 2 rules
Service Stop T1489, Disable or Modify Tools T1562.001, Windows Service T1543.003
eq: pssuspend.exe 2 rules
Windows Service T1543.003, Disable or Modify Tools T1562.001
eq: quser.exe 2 rules
System Owner/User Discovery T1033, Local Account T1087.001, Remote System Discovery T1018, Account Discovery T1087, Web Shell T1505.003
eq: sdbinst.exe 2 rules
Application Shimming T1546.011
eq: sdelete.exe 2 rules
Data Destruction T1485
eq: sysinfo.exe 2 rules
System Information Discovery T1082, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087, Web Shell T1505.003
eq: tasklist.exe 2 rules
OS Credential Dumping T1003, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087, Web Shell T1505.003
eq: toolbox-cmd.exe 2 rules
Command and Scripting Interpreter T1059
in: "EQNEDT32.EXE" 2 rules
Spearphishing Attachment T1566.001
in: "Excel.exe" 2 rules
Spearphishing Attachment T1566.001
in: "Graph.exe" 2 rules
Spearphishing Attachment T1566.001
in: "MSACCESS.EXE" 2 rules
Spearphishing Attachment T1566.001
in: "MSPUB.EXE" 2 rules
Spearphishing Attachment T1566.001
in: "OUTLOOK.EXE" 2 rules
Spearphishing Attachment T1566.001
in: "OneNote.exe" 2 rules
Spearphishing Attachment T1566.001
in: "OneNoteIm.exe" 2 rules
Spearphishing Attachment T1566.001
in: "OneNoteM.exe" 2 rules
Spearphishing Attachment T1566.001
in: "POWERPNT.EXE" 2 rules
Spearphishing Attachment T1566.001
in: "VISIO.EXE" 2 rules
Spearphishing Attachment T1566.001
in: "WinProj.exe" 2 rules
Spearphishing Attachment T1566.001
in: "WinWord.exe" 2 rules
Spearphishing Attachment T1566.001
match: client32.exe 2 rules

ParentImage 113 entries

ends_with: \powershell.exe 16 rules
PowerShell T1059.001, System Binary Proxy Execution T1218, Visual Basic T1059.005, System Script Proxy Execution T1216, NTDS T1003.003, Browser Extensions T1176.001
ends_with: \pwsh.exe 16 rules
PowerShell T1059.001, System Binary Proxy Execution T1218, Visual Basic T1059.005, System Script Proxy Execution T1216, NTDS T1003.003, Browser Extensions T1176.001
ends_with: \cscript.exe 14 rules
System Binary Proxy Execution T1218, Visual Basic T1059.005, PowerShell T1059.001, NTDS T1003.003, Spearphishing Attachment T1566.001, Browser Extensions T1176.001
ends_with: \wscript.exe 14 rules
System Binary Proxy Execution T1218, Visual Basic T1059.005, PowerShell T1059.001, NTDS T1003.003, Spearphishing Attachment T1566.001, Browser Extensions T1176.001
ends_with: \cmd.exe 13 rules
Windows Command Shell T1059.003, System Binary Proxy Execution T1218, Hidden Files and Directories T1564.001, Browser Extensions T1176.001, System Language Discovery T1614.001, Network Share Discovery T1135
ends_with: \rundll32.exe 12 rules
System Binary Proxy Execution T1218, PowerShell T1059.001, Rundll32 T1218.011, Spearphishing Attachment T1566.001, Browser Extensions T1176.001, Command and Scripting Interpreter T1059
ends_with: \explorer.exe 11 rules
Malicious Copy and Paste T1204.004, Command and Scripting Interpreter T1059, Distributed Component Object Model T1021.003, Windows Management Instrumentation T1047, File and Directory Discovery T1083, Indirect Command Execution T1202
ends_with: \regsvr32.exe 11 rules
Command and Scripting Interpreter T1059, System Binary Proxy Execution T1218, PowerShell T1059.001, Spearphishing Attachment T1566.001, Browser Extensions T1176.001, Masquerading T1036
ends_with: \mshta.exe 10 rules
Visual Basic T1059.005, Mshta T1218.005, System Binary Proxy Execution T1218, PowerShell T1059.001, Spearphishing Attachment T1566.001, Browser Extensions T1176.001
ends_with: \svchost.exe 8 rules
Exfiltration Over Unencrypted Non-C2 Protocol T1048.003, Command and Scripting Interpreter T1059, Distributed Component Object Model T1021.003, Mshta T1218.005, Indirect Command Execution T1202
ends_with: \w3wp.exe 8 rules
Web Shell T1505.003, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087, NTDS T1003.003, IIS Components T1505.004
ends_with: \java.exe 7 rules
Web Shell T1505.003, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087, Exploitation of Remote Services T1210, Exploit Public-Facing Application T1190
ends_with: \services.exe 7 rules
Command and Scripting Interpreter T1059, Distributed Component Object Model T1021.003, Windows Management Instrumentation T1047, Token Impersonation/Theft T1134.001, Create Process with Token T1134.002, PowerShell T1059.001
ends_with: \httpd.exe 6 rules
Web Shell T1505.003, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087, NTDS T1003.003, PowerShell T1059.001
ends_with: \nginx.exe 6 rules
Web Shell T1505.003, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087, NTDS T1003.003, PowerShell T1059.001
ends_with: \php-cgi.exe 6 rules
Web Shell T1505.003, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087, NTDS T1003.003, PowerShell T1059.001
match: \tomcat 6 rules
Web Shell T1505.003, NTDS T1003.003, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087, Exploit Public-Facing Application T1190
ends_with: \dllhost.exe 5 rules
Command and Scripting Interpreter T1059, Bypass User Account Control T1548.002
ends_with: \javaw.exe 5 rules
Web Shell T1505.003, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087, Exploitation of Remote Services T1210, Exploit Public-Facing Application T1190
eq: - 5 rules
Match Legitimate Resource Name or Location T1036.005, Command and Scripting Interpreter T1059, Rename Legitimate Utilities T1036.003, System Owner/User Discovery T1033, System Binary Proxy Execution T1218
ends_with: \caddy.exe 4 rules
Web Shell T1505.003, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087, Exploit Public-Facing Application T1190
ends_with: \chrome.exe 4 rules
PowerShell T1059.001, Malicious Copy and Paste T1204.004
ends_with: \outlook.exe 4 rules
Compile After Delivery T1027.004, Visual Basic T1059.005, JavaScript T1059.007, Mshta T1218.005, Command and Scripting Interpreter T1059, Indirect Command Execution T1202
ends_with: \spoolsv.exe 4 rules
Command and Scripting Interpreter T1059, Exploitation for Privilege Escalation T1068, Exploitation for Client Execution T1203, Abuse Elevation Control Mechanism T1548
ends_with: \wsl.exe 4 rules
System Binary Proxy Execution T1218, Indirect Command Execution T1202, Masquerading T1036
match: -tomcat- 4 rules
Web Shell T1505.003, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087, Exploit Public-Facing Application T1190
match: :\Windows\Temp\ 4 rules
Indicator Removal T1070, Impair Defenses T1562, Disable Windows Event Logging T1562.002, Command and Scripting Interpreter T1059
match: \AppData\Local\Temp\ 4 rules
Indicator Removal T1070, Impair Defenses T1562, Disable Windows Event Logging T1562.002, Msiexec T1218.007, Scheduled Task T1053.005, PowerShell T1059.001
ends_with: \EXCEL.EXE 3 rules
Malicious File T1204.002, Windows Management Instrumentation T1047, Regsvr32 T1218.010
ends_with: \MSPUB.exe 3 rules
Malicious File T1204.002, Windows Management Instrumentation T1047, Regsvr32 T1218.010
ends_with: \MsMpEng.exe 3 rules
Match Legitimate Resource Name or Location T1036.005, Rename Legitimate Utilities T1036.003, Process Injection T1055, Process Hollowing T1055.012
ends_with: \POWERPNT.exe 3 rules
Malicious File T1204.002, Windows Management Instrumentation T1047, Regsvr32 T1218.010
ends_with: \VISIO.exe 3 rules
Malicious File T1204.002, Windows Management Instrumentation T1047, Regsvr32 T1218.010
ends_with: \WINWORD.EXE 3 rules
Malicious File T1204.002, Windows Management Instrumentation T1047, Regsvr32 T1218.010
ends_with: \WebEx\WebexHost.exe 3 rules
NTFS File Attributes T1564.004
ends_with: \WindowsTerminal.exe 3 rules
PowerShell T1059.001
ends_with: \WmiPrvSE.exe 3 rules
Windows Management Instrumentation T1047, PowerShell T1059.001
ends_with: \csrss.exe 3 rules
Command and Scripting Interpreter T1059, Abuse Elevation Control Mechanism T1548, Masquerading T1036
ends_with: \firefox.exe 3 rules
PowerShell T1059.001, Malicious Copy and Paste T1204.004
ends_with: \lsass.exe 3 rules
Command and Scripting Interpreter T1059, Abuse Elevation Control Mechanism T1548
ends_with: \mmc.exe 3 rules
Distributed Component Object Model T1021.003, Windows Management Instrumentation T1047, Abuse Elevation Control Mechanism T1548
ends_with: \msedge.exe 3 rules
Malicious Copy and Paste T1204.004
ends_with: \onenote.exe 3 rules
Compile After Delivery T1027.004, Visual Basic T1059.005, JavaScript T1059.007, Mshta T1218.005, Compiled HTML File T1218.001, Phishing T1566
ends_with: \powershell_ise.exe 3 rules
Trusted Developer Utilities Proxy Execution T1127, Regsvr32 T1218.010, System Owner/User Discovery T1033
ends_with: \smss.exe 3 rules
Command and Scripting Interpreter T1059, PowerShell T1059.001, Trusted Developer Utilities Proxy Execution T1127, Abuse Elevation Control Mechanism T1548
ends_with: \sqlservr.exe 3 rules
Exploit Public-Facing Application T1190, Web Shell T1505.003, PowerShell T1059.001
ends_with: \thor\thor64.exe 3 rules
NTFS File Attributes T1564.004
ends_with: \userinit.exe 3 rules
Command and Scripting Interpreter T1059, Process Injection T1055, Logon Script (Windows) T1037.001
ends_with: \winlogon.exe 3 rules
Accessibility Features T1546.008, Command and Scripting Interpreter T1059, Abuse Elevation Control Mechanism T1548
ends_with: \wmiprvse.exe 3 rules
Windows Management Instrumentation T1047, Registry Run Keys / Startup Folder T1547.001, Distributed Component Object Model T1021.003, PowerShell T1059.001, Visual Basic T1059.005, System Binary Proxy Execution T1218
ends_with: \ws_tomcatservice.exe 3 rules
Web Shell T1505.003, Remote System Discovery T1018, System Owner/User Discovery T1033, Account Discovery T1087
eq: C:\Windows\System32\msiexec.exe 3 rules
PowerShell T1059.001, Email Collection T1114, Clear Windows Event Logs T1070.001, Disable Windows Event Logging T1562.002
eq: C:\Windows\System32\svchost.exe 3 rules
Rundll32 T1218.011, Bypass User Account Control T1548.002, Windows Management Instrumentation Event Subscription T1546.003
match: \AppData\Local\ 3 rules
Indirect Command Execution T1202
ends_with: \AppData\Local\Programs\Microsoft VS Code\Code.exe 2 rules
PowerShell T1059.001, Command and Scripting Interpreter T1059
ends_with: \DllHost.exe 2 rules
Bypass User Account Control T1548.002, CMSTP T1218.003
ends_with: \Dropbox.exe 2 rules
Disable or Modify System Firewall T1562.004, Windows Service T1543.003
ends_with: \EQNEDT32.EXE 2 rules
Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010
ends_with: \GoogleUpdate.exe 2 rules
Command and Scripting Interpreter T1059
ends_with: \MSACCESS.EXE 2 rules
Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010
ends_with: \Microsoft.Management.Services.IntuneWindowsAgent.exe 2 rules
System Binary Proxy Execution T1218
ends_with: \ONENOTE.EXE 2 rules
Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010
ends_with: \bginfo.exe 2 rules
Visual Basic T1059.005, Indirect Command Execution T1202, System Binary Proxy Execution T1218
ends_with: \bginfo64.exe 2 rules
Visual Basic T1059.005, Indirect Command Execution T1202, System Binary Proxy Execution T1218
ends_with: \brave.exe 2 rules
Malicious Copy and Paste T1204.004
ends_with: \code.exe 2 rules
Indirect Command Execution T1202, System Binary Proxy Execution T1218, Web Protocols T1071.001, Remote Access Tools T1219
ends_with: \conhost.exe 2 rules
Indirect Command Execution T1202, System Binary Proxy Execution T1218
ends_with: \eventvwr.exe 2 rules
Bypass User Account Control T1548.002, Masquerading T1036
ends_with: \excel.exe 2 rules
Compile After Delivery T1027.004, Visual Basic T1059.005, JavaScript T1059.007, Mshta T1218.005, Distributed Component Object Model T1021.003
ends_with: \gup.exe 2 rules
Compromise Software Supply Chain T1195.002, Adversary-in-the-Middle T1557
ends_with: \iexplore.exe 2 rules
PowerShell T1059.001
ends_with: \microsoftedge.exe 2 rules
PowerShell T1059.001
ends_with: \msiexec.exe 2 rules
Rundll32 T1218.011, Application Shimming T1546.011
ends_with: \ngen.exe 2 rules
Match Legitimate Resource Name or Location T1036.005, Rename Legitimate Utilities T1036.003
ends_with: \pcwrun.exe 2 rules
System Binary Proxy Execution T1218
ends_with: \provlaunch.exe 2 rules
System Binary Proxy Execution T1218
ends_with: \python.exe 2 rules
Command and Scripting Interpreter T1059
ends_with: \rpcnet.exe 2 rules
Process Injection T1055, Match Legitimate Resource Name or Location T1036.005
ends_with: \slui.exe 2 rules
Command and Scripting Interpreter T1059, Bypass User Account Control T1548.002
ends_with: \sqlagent.exe 2 rules
PowerShell T1059.001, Trusted Developer Utilities Proxy Execution T1127
ends_with: \vivaldi.exe 2 rules
PowerShell T1059.001
ends_with: \wermgr.exe 2 rules
Command and Scripting Interpreter T1059, Masquerading T1036, Process Injection T1055
ends_with: \wininit.exe 2 rules
Command and Scripting Interpreter T1059, Abuse Elevation Control Mechanism T1548
ends_with: \wordpad.exe 2 rules
Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010
ends_with: \wordview.exe 2 rules
Windows Management Instrumentation T1047, Malicious File T1204.002, Regsvr32 T1218.010
ends_with: \wslhost.exe 2 rules
Indirect Command Execution T1202, System Binary Proxy Execution T1218
ends_with: \wsmprovhost.exe 2 rules
Windows Remote Management T1021.006, PowerShell T1059.001, Exploit Public-Facing Application T1190
eq: "*\\explorer.exe" 2 rules
PowerShell T1059.001, Malicious File T1204.002
eq: C:\ProgramData\chocolatey\choco.exe 2 rules
Compile After Delivery T1027.004, Visual Basic T1059.005, JavaScript T1059.007, Mshta T1218.005
eq: C:\Windows\SysWOW64\msiexec.exe 2 rules
PowerShell T1059.001, Clear Windows Event Logs T1070.001, Disable Windows Event Logging T1562.002
eq: C:\Windows\System32\inetsrv\w3wp.exe 2 rules
Compile After Delivery T1027.004, Visual Basic T1059.005, JavaScript T1059.007, Mshta T1218.005
eq: C:\Windows\System32\lxss\wslhost.exe 2 rules
Remote Desktop Protocol T1021.001, Remote Desktop Software T1219.002
eq: C:\Windows\System32\sdiagnhost.exe 2 rules
Compile After Delivery T1027.004, Visual Basic T1059.005, JavaScript T1059.007, Mshta T1218.005
eq: C:\Windows\System32\services.exe 2 rules
Bypass User Account Control T1548.002
eq: C:\Windows\explorer.exe 2 rules
PowerShell T1059.001, NTFS File Attributes T1564.004
in: "*\\ProgramData\\*" 2 rules
Exploitation for Privilege Escalation T1068, Access Token Manipulation T1134, Abuse Elevation Control Mechanism T1548
in: "*\\Temp\\*" 2 rules
Exploitation for Privilege Escalation T1068, Access Token Manipulation T1134, Abuse Elevation Control Mechanism T1548
in: "*\\Users\\*" 2 rules
Exploitation for Privilege Escalation T1068, Access Token Manipulation T1134, Abuse Elevation Control Mechanism T1548
in: "*\\\\*" 2 rules
Exploitation for Privilege Escalation T1068, Access Token Manipulation T1134, Abuse Elevation Control Mechanism T1548
match: :\Users\Public\ 2 rules
Command and Scripting Interpreter T1059, Hide Artifacts T1564
match: :\Windows\SysWOW64\ 2 rules
Masquerading T1036, Command and Scripting Interpreter T1059
match: :\Windows\System32\ 2 rules
Masquerading T1036, Command and Scripting Interpreter T1059
match: C:\Packages\Plugins\Microsoft.GuestConfiguration.ConfigurationforWindows\ 2 rules
PowerShell T1059.001
match: \AppData\ 2 rules
NTDS T1003.003
match: \PerfLogs\ 2 rules
NTDS T1003.003
match: \Public\ 2 rules
NTDS T1003.003
match: \Temp\ 2 rules
NTDS T1003.003
match: \Users\Public\ 2 rules
match: \Windows\Temp\ 2 rules
match: \apache 2 rules
NTDS T1003.003
match: \gc_worker.exe 2 rules
PowerShell T1059.001
starts_with: C:\Program Files (x86)\ 2 rules
Compile After Delivery T1027.004, Visual Basic T1059.005, JavaScript T1059.007, Mshta T1218.005
starts_with: C:\Program Files\ 2 rules
Compile After Delivery T1027.004, Visual Basic T1059.005, JavaScript T1059.007, Mshta T1218.005

Details 96 entries

eq: "0x00000001" 42 rules
Modify Registry T1112, Disable or Modify Tools T1562.001, Office Application Startup T1137, Hidden Files and Directories T1564.001, Bypass User Account Control T1548.002, Inhibit System Recovery T1490
eq: DWORD (0x00000000) 38 rules
Disable or Modify Tools T1562.001, Modify Registry T1112, Impair Defenses T1562, Disable or Modify System Firewall T1562.004, Hidden Files and Directories T1564.001, Bypass User Account Control T1548.002
eq: DWORD (0x00000001) 37 rules
Modify Registry T1112, Disable or Modify Tools T1562.001, Office Application Startup T1137, Registry Run Keys / Startup Folder T1547.001, Internal Defacement T1491.001, Inhibit System Recovery T1490
eq: "0x00000000" 27 rules
Disable or Modify Tools T1562.001, Modify Registry T1112, Abuse Elevation Control Mechanism T1548, Hidden Files and Directories T1564.001, Bypass User Account Control T1548.002, Data Destruction T1485
eq: (Empty) 24 rules
Registry Run Keys / Startup Folder T1547.001, Modify Registry T1112, Bypass User Account Control T1548.002, AppInit DLLs T1546.010, Change Default File Association T1546.001, System Binary Proxy Execution T1218
eq: 0x00000001 12 rules
Modify Registry T1112, Disable or Modify Tools T1562.001, OS Credential Dumping T1003, Browser Session Hijacking T1185, Service Stop T1489
eq: DWORD (0x00000002) 9 rules
Modify Registry T1112, Disable or Modify Tools T1562.001, Office Application Startup T1137, LSASS Memory T1003.001, Dynamic Data Exchange T1559.002, Impair Defenses T1562
match: \AppData\Local\Temp\ 9 rules
Disable or Modify Tools T1562.001, Registry Run Keys / Startup Folder T1547.001, Netsh Helper DLL T1546.007, OS Credential Dumping T1003, Image File Execution Options Injection T1546.012, Change Default File Association T1546.001
eq: 0x00000000 8 rules
Disable or Modify Tools T1562.001, Modify Registry T1112, Trusted Developer Utilities Proxy Execution T1127, Indicator Blocking T1562.006, Browser Session Hijacking T1185, LSA Secrets T1003.004
match: powershell 8 rules
Service Execution T1569.002, SMB/Windows Admin Shares T1021.002, Windows Service T1543.003, Indirect Command Execution T1202, Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: \Users\Public\ 5 rules
Disable or Modify Tools T1562.001, Modify Registry T1112, Component Object Model Hijacking T1546.015, Change Default File Association T1546.001, Bypass User Account Control T1548.002
eq: 0 4 rules
Modify Registry T1112, Impair Defenses T1562, Indicator Blocking T1562.006
eq: Binary Data 4 rules
Registry Run Keys / Startup Folder T1547.001, Inhibit System Recovery T1490, Modify Registry T1112, Bypass User Account Control T1548.002
match: %tmp% 4 rules
Image File Execution Options Injection T1546.012, Component Object Model Hijacking T1546.015, Registry Run Keys / Startup Folder T1547.001, Change Default File Association T1546.001, Bypass User Account Control T1548.002
match: :\Users\ 4 rules
Disable or Modify Tools T1562.001, Netsh Helper DLL T1546.007, Component Object Model Hijacking T1546.015, Registry Run Keys / Startup Folder T1547.001
match: :\Users\Public\ 4 rules
Disable or Modify Tools T1562.001, Netsh Helper DLL T1546.007, OS Credential Dumping T1003, Registry Run Keys / Startup Folder T1547.001
match: :\Windows\Temp\ 4 rules
Disable or Modify Tools T1562.001, Netsh Helper DLL T1546.007, OS Credential Dumping T1003, Registry Run Keys / Startup Folder T1547.001
match: \Contacts\ 4 rules
Disable or Modify Tools T1562.001, Netsh Helper DLL T1546.007, Component Object Model Hijacking T1546.015, Change Default File Association T1546.001, Bypass User Account Control T1548.002
match: \Windows\Temp\ 4 rules
Disable or Modify Tools T1562.001, Image File Execution Options Injection T1546.012, Component Object Model Hijacking T1546.015, Change Default File Association T1546.001, Bypass User Account Control T1548.002
match: cscript 4 rules
Malicious Copy and Paste T1204.004, Image File Execution Options Injection T1546.012, Malicious Link T1204.001
match: mshta 4 rules
Malicious Copy and Paste T1204.004, Image File Execution Options Injection T1546.012, Malicious Link T1204.001
match: pwsh 4 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001, Service Execution T1569.002, PowerShell T1059.001
match: rundll32 4 rules
Malicious Copy and Paste T1204.004, Image File Execution Options Injection T1546.012, Malicious Link T1204.001
match: wscript 4 rules
Malicious Copy and Paste T1204.004, Image File Execution Options Injection T1546.012, Malicious Link T1204.001
ends_with: .dll 3 rules
Port Monitors T1547.010, Winlogon Helper DLL T1547.004
eq: "Binary Data" 3 rules
Modify Registry T1112
match: # 3 rules
Malicious Copy and Paste T1204.004, Command Obfuscation T1027.010
match: %temp% 3 rules
Image File Execution Options Injection T1546.012, Component Object Model Hijacking T1546.015, Registry Run Keys / Startup Folder T1547.001
match: .dll 3 rules
Netsh Helper DLL T1546.007, Image File Execution Options Injection T1546.012, Scheduled Task T1053.005
match: :\Perflogs\ 3 rules
Disable or Modify Tools T1562.001, Netsh Helper DLL T1546.007, Component Object Model Hijacking T1546.015
match: \Desktop\ 3 rules
Disable or Modify Tools T1562.001, Image File Execution Options Injection T1546.012, Component Object Model Hijacking T1546.015
match: \Favorites\ 3 rules
Disable or Modify Tools T1562.001, Netsh Helper DLL T1546.007, Component Object Model Hijacking T1546.015
match: \Favourites\ 3 rules
Disable or Modify Tools T1562.001, Netsh Helper DLL T1546.007, Component Object Model Hijacking T1546.015
match: \Pictures\ 3 rules
Netsh Helper DLL T1546.007, Component Object Model Hijacking T1546.015, Change Default File Association T1546.001, Bypass User Account Control T1548.002
match: \Temporary Internet 3 rules
Disable or Modify Tools T1562.001, Netsh Helper DLL T1546.007, Component Object Model Hijacking T1546.015
match: cmd 3 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: regsvr32 3 rules
Malicious Copy and Paste T1204.004, Image File Execution Options Injection T1546.012, Malicious Link T1204.001
ends_with: .exe" /burn.runonce 2 rules
Registry Run Keys / Startup Folder T1547.001
eq: %%systemroot%%\system32\ntdsa.dll 2 rules
LSASS Driver T1547.008, Windows Service T1543.003
eq: 1 2 rules
Credentials in Registry T1552.002, Modify Registry T1112
eq: DWORD (0x00000004) 2 rules
Disable or Modify Tools T1562.001, Modify Registry T1112
eq: DWORD (0x00000009) 2 rules
Disable or Modify Tools T1562.001, Registry Run Keys / Startup Folder T1547.001
eq: cpwmon64_v40.dll 2 rules
Port Monitors T1547.010, Registry Run Keys / Startup Folder T1547.001
eq: {472083B0-C522-11CF-8763-00608CC02F24} 2 rules
Registry Run Keys / Startup Folder T1547.001
eq: {472083B1-C522-11CF-8763-00608CC02F24} 2 rules
Registry Run Keys / Startup Folder T1547.001
eq: {807583E5-5146-11D5-A672-00B0D022E945} 2 rules
Registry Run Keys / Startup Folder T1547.001
match: 2 rules
Command Obfuscation T1027.010, Malicious Copy and Paste T1204.004
match: %AppData% 2 rules
Registry Run Keys / Startup Folder T1547.001, Change Default File Association T1546.001, Bypass User Account Control T1548.002
match: %comspec% 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: .bat 2 rules
Image File Execution Options Injection T1546.012, Scheduled Task T1053.005
match: .exe 2 rules
SMB/Windows Admin Shares T1021.002, Windows Service T1543.003, Service Execution T1569.002, Scheduled Task T1053.005
match: .hta 2 rules
Image File Execution Options Injection T1546.012, Scheduled Task T1053.005
match: 0x00000001 2 rules
Fallback Channels T1008, Office Application Startup T1137, Event Triggered Execution T1546
match: :\ProgramData\ 2 rules
OS Credential Dumping T1003, Registry Run Keys / Startup Folder T1547.001
match: :\Temp\ 2 rules
OS Credential Dumping T1003, Registry Run Keys / Startup Folder T1547.001
match: Invoke- 2 rules
Image File Execution Options Injection T1546.012, PowerShell T1059.001
match: \AppData\Roaming\ 2 rules
Disable or Modify Tools T1562.001, OS Credential Dumping T1003
match: \Downloads\ 2 rules
Image File Execution Options Injection T1546.012, Component Object Model Hijacking T1546.015
match: \Microsoft\Windows\Start Menu\Programs\Startup\ 2 rules
Component Object Model Hijacking T1546.015
match: \PerfLogs\ 2 rules
Disable or Modify Tools T1562.001, Change Default File Association T1546.001, Bypass User Account Control T1548.002
match: account 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: anti-bot 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: bitsadmin 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: botcheck 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: captcha 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: certutil 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: challenge 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: confirmation 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: curl 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: finger 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: fraud 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: http 2 rules
Malicious Copy and Paste T1204.004, PowerShell T1059.001
match: human 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: identification 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: identificator 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: identity 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: iex 2 rules
Image File Execution Options Injection T1546.012, PowerShell T1059.001
match: robot 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: schtasks 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: validation 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: verification 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: verify 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match: wget 2 rules
Malicious Copy and Paste T1204.004, Malicious Link T1204.001
match:              2 rules
Command Obfuscation T1027.010, Malicious Copy and Paste T1204.004
match:              2 rules
Command Obfuscation T1027.010, Malicious Copy and Paste T1204.004
match:              2 rules
Command Obfuscation T1027.010, Malicious Copy and Paste T1204.004
match:              2 rules
Command Obfuscation T1027.010, Malicious Copy and Paste T1204.004
match:              2 rules
Command Obfuscation T1027.010, Malicious Copy and Paste T1204.004
match:              2 rules
Command Obfuscation T1027.010, Malicious Copy and Paste T1204.004
match:              2 rules
Command Obfuscation T1027.010, Malicious Copy and Paste T1204.004
match:              2 rules
Command Obfuscation T1027.010, Malicious Copy and Paste T1204.004
match:              2 rules
Command Obfuscation T1027.010, Malicious Copy and Paste T1204.004
match:              2 rules
Command Obfuscation T1027.010, Malicious Copy and Paste T1204.004
match:              2 rules
Command Obfuscation T1027.010, Malicious Copy and Paste T1204.004
match:              2 rules
Command Obfuscation T1027.010, Malicious Copy and Paste T1204.004
starts_with: C:\Windows\system32\cmd.exe /q /c del /q "C:\Users\ 2 rules
Registry Run Keys / Startup Folder T1547.001

TargetObject 73 entries

ends_with: \EulaAccepted 4 rules
Tool T1588.002
match: \Active Directory Explorer 3 rules
Tool T1588.002
match: \Handle 3 rules
Tool T1588.002
match: \LiveKd 3 rules
Tool T1588.002
match: \ProcDump 3 rules
Tool T1588.002
match: \Process Explorer 3 rules
Tool T1588.002
match: \PsExec 3 rules
Tool T1588.002
match: \PsLoglist 3 rules
Tool T1588.002
match: \PsPasswd 3 rules
Tool T1588.002
match: \SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\ 3 rules
Impair Defenses T1562
match: \Services\ 3 rules
Disable or Modify Tools T1562.001, Service Execution T1569.002, Windows Service T1543.003
match: \Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 3 rules
Registry Run Keys / Startup Folder T1547.001
match: \Software\Microsoft\Windows\CurrentVersion\Run 3 rules
Registry Run Keys / Startup Folder T1547.001
match: \Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 3 rules
Registry Run Keys / Startup Folder T1547.001
ends_with: (Default) 2 rules
Image File Execution Options Injection T1546.012
ends_with: SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoControlPanel 2 rules
Modify Registry T1112
ends_with: SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoRun 2 rules
Modify Registry T1112
ends_with: \(Default) 2 rules
Hidden Files and Directories T1564.001, Component Object Model Hijacking T1546.015
ends_with: \ChannelAccess 2 rules
Disable Windows Event Logging T1562.002, Modify Registry T1112, Registry Run Keys / Startup Folder T1547.001
ends_with: \DeviceGuard\EnableVirtualizationBasedSecurity 2 rules
Disable or Modify Tools T1562.001
ends_with: \DeviceGuard\LsaCfgFlags 2 rules
Disable or Modify Tools T1562.001
ends_with: \Driver 2 rules
OS Credential Dumping T1003
ends_with: \Enabled 2 rules
Disable Windows Event Logging T1562.002
ends_with: \ImagePath 2 rules
Modify Registry T1112, Service Execution T1569.002
ends_with: \Lsa\LsaCfgFlags 2 rules
Disable or Modify Tools T1562.001
ends_with: \Software\Microsoft\Windows\CurrentVersion\Explorer\TypedPaths\url1 2 rules
Malicious Copy and Paste T1204.004, Command Obfuscation T1027.010
ends_with: \Start 2 rules
Modify Registry T1112
ends_with: \URL 2 rules
Modify Registry T1112
match: ControlSet 2 rules
Modify Registry T1112, Disable or Modify Tools T1562.001, Windows Service T1543.003
match: Ime File 2 rules
Disable or Modify Tools T1562.001
match: Index 2 rules
Impair Defenses T1562
match: SYSTEM\ 2 rules
Modify Registry T1112, Disable or Modify Tools T1562.001
match: Software\Microsoft\Office\ 2 rules
Modify Registry T1112, Add-ins T1137.006
match: \CLSID\{083863F1-70DE-11d0-BD40-00A0C911CE86}\Instance 2 rules
Registry Run Keys / Startup Folder T1547.001
match: \CLSID\{7ED96837-96F0-4812-B211-F13C24117ED3}\Instance 2 rules
Registry Run Keys / Startup Folder T1547.001
match: \CLSID\{ABE3B9A4-257D-4B97-BD1A-294AF496222E}\Instance 2 rules
Registry Run Keys / Startup Folder T1547.001
match: \CLSID\{AC757296-3522-4E11-9862-C17BE5A1767E}\Instance 2 rules
Registry Run Keys / Startup Folder T1547.001
match: \Control\Keyboard Layouts\ 2 rules
Disable or Modify Tools T1562.001
match: \Directory\Shellex\CopyHookHandlers 2 rules
Registry Run Keys / Startup Folder T1547.001
match: \Directory\Shellex\DragDropHandlers 2 rules
Registry Run Keys / Startup Folder T1547.001
match: \Drivers32 2 rules
Registry Run Keys / Startup Folder T1547.001
match: \Explorer\Browser Helper Objects 2 rules
Registry Run Keys / Startup Folder T1547.001
match: \Explorer\SharedTaskScheduler 2 rules
Registry Run Keys / Startup Folder T1547.001
match: \Explorer\ShellExecuteHooks 2 rules
Registry Run Keys / Startup Folder T1547.001
match: \Explorer\ShellIconOverlayIdentifiers 2 rules
Registry Run Keys / Startup Folder T1547.001
match: \Explorer\ShellServiceObjects 2 rules
Registry Run Keys / Startup Folder T1547.001
match: \Folder\ShellEx\DragDropHandlers 2 rules
Registry Run Keys / Startup Folder T1547.001
match: \Folder\ShellEx\ExtShellFolderViews 2 rules
Registry Run Keys / Startup Folder T1547.001
match: \Image File Execution Options 2 rules
Registry Run Keys / Startup Folder T1547.001
match: \Image File Execution Options\ 2 rules
Registry Run Keys / Startup Folder T1547.001, Image File Execution Options Injection T1546.012
match: \Microsoft\Office\ 2 rules
Disable or Modify Tools T1562.001
match: \Microsoft\Office\Outlook\Addins\Antivirus.AsOutExt\ 2 rules
Registry Run Keys / Startup Folder T1547.001, Add-ins T1137.006
match: \Microsoft\Office\Outlook\Addins\Avast.AsOutExt\ 2 rules
Registry Run Keys / Startup Folder T1547.001, Add-ins T1137.006
match: \Microsoft\Windows\CurrentVersion\WINEVT\Channels\ 2 rules
Disable Windows Event Logging T1562.002
match: \RunOnceEx\ 2 rules
Registry Run Keys / Startup Folder T1547.001
match: \RunOnce\ 2 rules
Registry Run Keys / Startup Folder T1547.001
match: \RunServicesOnce\ 2 rules
Registry Run Keys / Startup Folder T1547.001
match: \RunServices\ 2 rules
Registry Run Keys / Startup Folder T1547.001
match: \Run\ 2 rules
Registry Run Keys / Startup Folder T1547.001
match: \SDelete 2 rules
Tool T1588.002
match: \SOFTWARE\Microsoft\NetSh 2 rules
Netsh Helper DLL T1546.007
match: \SOFTWARE\Microsoft\Office\ 2 rules
Disable or Modify Tools T1562.001, Office Application Startup T1137
match: \SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Custom\ 2 rules
Application Shimming T1546.011
match: \SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\InstalledSDB\ 2 rules
Application Shimming T1546.011
match: \SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\VolumeCaches\ 2 rules
match: \SOFTWARE\ODBC\ODBCINST.INI\ 2 rules
OS Credential Dumping T1003
match: \SYSTEM\CurrentControlSet\Services\EventLog\ 2 rules
Modify Registry T1112, Registry Run Keys / Startup Folder T1547.001, Disable Windows Event Logging T1562.002
match: \Security\Trusted Documents\TrustRecords 2 rules
Spearphishing Attachment T1566.001, Modify Registry T1112
match: \ShellEx\ContextMenuHandlers 2 rules
Registry Run Keys / Startup Folder T1547.001
match: \ShellEx\PropertySheetHandlers 2 rules
Registry Run Keys / Startup Folder T1547.001
match: \ShellServiceObjectDelayLoad 2 rules
Registry Run Keys / Startup Folder T1547.001
match: \Software\Winternals\BGInfo\UserFields\ 2 rules
Modify Registry T1112
match: \Windows\Appinit_Dlls 2 rules
Registry Run Keys / Startup Folder T1547.001

ScriptBlockText 67 entries

match: New-Object 6 rules
PowerShell T1059.001, Credentials from Password Stores T1555, Exfiltration Over Unencrypted Non-C2 Protocol T1048.003, Clear Command History T1070.003
eq: "*[adsisearcher]*" 4 rules
Domain Account T1087.002, Domain Groups T1069.002
eq: "*-ComputerName*" 3 rules
Windows Remote Management T1021.006, Windows Management Instrumentation T1047
eq: "*Get-DomainComputer*" 3 rules
Remote System Discovery T1018
eq: "*Get-NetComputer*" 3 rules
Remote System Discovery T1018, Domain Account T1087.002
eq: "*Get-NetUser*" 3 rules
Account Discovery T1087, Local Account T1087.001
eq: "*SELECT*" 3 rules
Gather Victim Host Information T1592, Hardware T1592.001
match: -Path 3 rules
File and Directory Permissions Modification T1222, File and Directory Discovery T1083, Mark-of-the-Web Bypass T1553.005
match: Get-ChildItem 3 rules
Automated Collection T1119, Browser Information Discovery T1217, File and Directory Discovery T1083
match: Invoke-RestMethod 3 rules
Automated Exfiltration T1020, Web Protocols T1071.001, PowerShell T1059.001
match: Invoke-WebRequest 3 rules
Automated Exfiltration T1020, Web Protocols T1071.001, PowerShell T1059.001
match: Out-File 3 rules
System Owner/User Discovery T1033, Automated Exfiltration T1020
match: Start-Process 3 rules
NTFS File Attributes T1564.004, Windows Command Shell T1059.003, Rename Legitimate Utilities T1036.003
match: iwr 3 rules
Automated Exfiltration T1020, Web Protocols T1071.001, PowerShell T1059.001
match: powershell 3 rules
PowerShell T1059.001, Obfuscated Files or Information T1027, Hidden Window T1564.003
eq: "*Get-DomainUser*" 2 rules
AS-REP Roasting T1558.004, Domain Account T1087.002
eq: "*findAll()*" 2 rules
Domain Groups T1069.002, Domain Account T1087.002
eq: "*namespace root\\directory\\ldap*" 2 rules
Remote System Discovery T1018, Domain Groups T1069.002
eq: *Get-WmiObject* 2 rules
Remote System Discovery T1018, Domain Groups T1069.002
in: "*pwdlastset*" 2 rules
Account Discovery T1087, Domain Account T1087.002
in: "*samaccountname*" 2 rules
Account Discovery T1087, Domain Account T1087.002
match: -Filter \* 2 rules
System Owner/User Discovery T1033
match: -Recurse 2 rules
Automated Collection T1119, Browser Information Discovery T1217
match: irm 2 rules
Web Protocols T1071.001, PowerShell T1059.001
match: | Select 2 rules
System Owner/User Discovery T1033
match: && 2 rules
Obfuscated Files or Information T1027, PowerShell T1059.001
match: (Get-PSReadlineOption).HistorySavePath 2 rules
Clear Command History T1070.003, Indicator Removal T1070
match: (New-Object System.Net.WebClient).DownloadString('https://chocolatey.org/install.ps1') 2 rules
PowerShell T1059.001
match: -AclObject 2 rules
File and Directory Permissions Modification T1222
match: -ComputerName 2 rules
PowerShell T1059.001, Non-Standard Port T1571
match: -FeatureName 2 rules
Disable or Modify Tools T1562.001
match: -Filter 2 rules
System Owner/User Discovery T1033, Domain Groups T1069.002
match: -ImagePath 2 rules
Mark-of-the-Web Bypass T1553.005
match: -Online 2 rules
Disable or Modify Tools T1562.001
match: -SecurityDescriptorSddl 2 rules
Services Registry Permissions Weakness T1574.011
match: -sd 2 rules
Services Registry Permissions Weakness T1574.011
match: Add-Content 2 rules
System Owner/User Discovery T1033
match: AdjustTokenPrivileges 2 rules
PowerShell T1059.001, Native API T1106
match: DumpCerts 2 rules
PowerShell T1059.001, OS Credential Dumping T1003
match: DumpCreds 2 rules
PowerShell T1059.001, OS Credential Dumping T1003
match: Find-GPOLocation 2 rules
PowerShell T1059.001, Permission Groups Discovery T1069, Local Groups T1069.001, Domain Groups T1069.002, Account Discovery T1087, Local Account T1087.001
match: Get-ADReplAccount 2 rules
PowerShell T1059.001, DCSync T1003.006
match: Get-Keystrokes 2 rules
Keylogging T1056.001, PowerShell T1059.001, Permission Groups Discovery T1069, Local Groups T1069.001, Domain Groups T1069.002, Account Discovery T1087
match: Get-WmiObject 2 rules
System Checks T1497.001, Inhibit System Recovery T1490
match: Invoke-ACLScanner 2 rules
PowerShell T1059.001, Permission Groups Discovery T1069, Local Groups T1069.001, Domain Groups T1069.002, Account Discovery T1087, Local Account T1087.001
match: Invoke-DNSExfiltrator 2 rules
Exfiltration Over Alternative Protocol T1048, PowerShell T1059.001, Permission Groups Discovery T1069, Local Groups T1069.001, Domain Groups T1069.002, Account Discovery T1087
match: Invoke-UserHunter 2 rules
PowerShell T1059.001, Permission Groups Discovery T1069, Local Groups T1069.001, Domain Groups T1069.002, Account Discovery T1087, Local Account T1087.001
match: Microsoft.PowerShell.Core\Export-ModuleMember 2 rules
Scheduled Task T1053.005, Network Share Connection Removal T1070.005
match: Mount-DiskImage 2 rules
Mark-of-the-Web Bypass T1553.005
match: New-LocalUser 2 rules
PowerShell T1059.001, Local Account T1136.001, Account Manipulation T1098
match: Remove-Item 2 rules
Clear Command History T1070.003, Indicator Removal T1070
match: Remove-Update 2 rules
PowerShell T1059.001, Permission Groups Discovery T1069, Local Groups T1069.001, Domain Groups T1069.002, Account Discovery T1087, Local Account T1087.001
match: Set-Acl 2 rules
File and Directory Permissions Modification T1222
match: Set-Content 2 rules
System Owner/User Discovery T1033
match: Set-Service 2 rules
Services Registry Permissions Weakness T1574.011
match: Win32_ShadowCopy 2 rules
NTDS T1003.003, Inhibit System Recovery T1490
match: bypass 2 rules
PowerShell T1059.001
match: foreach 2 rules
Automated Exfiltration T1020, File and Directory Discovery T1083
match: gwmi 2 rules
System Checks T1497.001, Inhibit System Recovery T1490
match: gwmi 2 rules
Local Groups T1069.001, Windows Management Instrumentation T1047
match: iex 2 rules
PowerShell T1059.001, Obfuscated Files or Information T1027
match: ls 2 rules
File and Directory Discovery T1083, Credentials In Files T1552.001
match: new-object 2 rules
PowerShell T1059.001, Obfuscated Files or Information T1027
match: rm 2 rules
Clear Command History T1070.003, Indicator Removal T1070
match: rundll32 2 rules
PowerShell T1059.001, Obfuscated Files or Information T1027
match: shell32.dll 2 rules
Obfuscated Files or Information T1027, PowerShell T1059.001
match: shellexec_rundll 2 rules
Obfuscated Files or Information T1027, PowerShell T1059.001

EventID 61 entries

eq: 4104 108 rules
PowerShell T1059.001, Domain Account T1087.002, Remote System Discovery T1018, Domain Groups T1069.002, Steal or Forge Authentication Certificates T1649, AS-REP Roasting T1558.004
eq: 7 35 rules
DLL T1574.001, CMSTP T1218.003, Spearphishing Attachment T1566.001, JavaScript T1059.007, Dynamic-link Library Injection T1055.001, Print Processors T1547.012
eq: 5136 22 rules
Windows File and Directory Permissions Modification T1222.001, Domain or Tenant Policy Modification T1484, Group Policy Modification T1484.001, Account Manipulation T1098, Rogue Domain Controller T1207, Disable or Modify Tools T1562.001
eq: 4663 16 rules
Query Registry T1012, Credentials from Web Browsers T1555.003, Credentials In Files T1552.001, Exploit Public-Facing Application T1190, Security Account Manager T1003.002, Unsecured Credentials T1552
eq: 22 15 rules
DNS T1071.004, Visual Basic T1059.005, IP Addresses T1590.005, Gather Victim Network Information T1590, Exploitation for Client Execution T1203, System Binary Proxy Execution T1218
eq: 10 14 rules
LSASS Memory T1003.001, Token Impersonation/Theft T1134.001, Portable Executable Injection T1055.002, Pass the Ticket T1550.003, Exploitation for Privilege Escalation T1068, Disable or Modify Tools T1562.001
eq: 7045 12 rules
Service Execution T1569.002, Windows Service T1543.003, Create or Modify System Process T1543, Masquerading T1036, Rootkit T1014, Exploitation for Privilege Escalation T1068
eq: 11 10 rules
LSASS Memory T1003.001, Malicious File T1204.002, Data Encrypted for Impact T1486, Rundll32 T1218.011, Domain Account T1087.002, Print Processors T1547.012
eq: 4768 10 rules
Password Spraying T1110.003, Use Alternate Authentication Material T1550, Email Addresses T1589.002, OS Credential Dumping T1003, Domain Accounts T1078.002, Steal or Forge Kerberos Tickets T1558
eq: 4698 8 rules
Scheduled Task T1053.005, Scheduled Task/Job T1053
eq: 8 8 rules
Process Injection T1055, Portable Executable Injection T1055.002, LSASS Memory T1003.001, Dynamic-link Library Injection T1055.001
eq: 4624 6 rules
Valid Accounts T1078, Exploit Public-Facing Application T1190, Steal or Forge Kerberos Tickets T1558, Credential Stuffing T1110.004, Security Account Manager T1003.002, Remote Desktop Protocol T1021.001
eq: 4625 6 rules
Password Spraying T1110.003, Exploit Public-Facing Application T1190, Credential Stuffing T1110.004
eq: 4769 6 rules
Kerberoasting T1558.003, Valid Accounts T1078, Golden Ticket T1558.001, Domain Accounts T1078.002, Network Share Discovery T1135
in: "23" 6 rules
Data Destruction T1485, File Deletion T1070.004, Clear Command History T1070.003
in: "26" 6 rules
Data Destruction T1485, File Deletion T1070.004, Clear Command History T1070.003
in: 17 6 rules
Application Layer Protocol T1071, Process Injection T1055, Inter-Process Communication T1559, SMB/Windows Admin Shares T1021.002
in: 18 6 rules
Application Layer Protocol T1071, Process Injection T1055, Inter-Process Communication T1559, SMB/Windows Admin Shares T1021.002
eq: 3 4 rules
Regsvcs/Regasm T1218.009, Mail Protocols T1071.003
eq: 4662 4 rules
Domain Account T1087.002, DCSync T1003.006
eq: 4742 4 rules
SID-History Injection T1134.005, Exploitation of Remote Services T1210, Rogue Domain Controller T1207
eq: 4776 4 rules
Password Spraying T1110.003
eq: 5145 4 rules
SMB/Windows Admin Shares T1021.002, Transfer Data to Cloud Account T1537, Forced Authentication T1187, Network Share Discovery T1135
eq: 6 4 rules
Windows Service T1543.003, Rootkit T1014, Exploitation for Privilege Escalation T1068
eq: 1 3 rules
Remote Access Tools T1219, Indicator Removal T1070, Exploitation for Privilege Escalation T1068, Access Token Manipulation T1134, Abuse Elevation Control Mechanism T1548
eq: 15 3 rules
NTFS File Attributes T1564.004, Ingress Tool Transfer T1105
eq: 15457 3 rules
SQL Stored Procedures T1505.001
eq: 17 3 rules
SMB/Windows Admin Shares T1021.002, Process Injection T1055, Inter-Process Communication T1559
eq: 18 3 rules
SMB/Windows Admin Shares T1021.002, Process Injection T1055, Inter-Process Communication T1559
eq: 4648 3 rules
Password Spraying T1110.003, Exploit Public-Facing Application T1190
eq: 4738 3 rules
SID-History Injection T1134.005, AS-REP Roasting T1558.004
eq: 5137 3 rules
Rogue Domain Controller T1207, Domain Accounts T1078.002, Group Policy Modification T1484.001, DNS T1071.004, Forced Authentication T1187, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
eq: 7040 3 rules
Disable or Modify Tools T1562.001, Service Stop T1489
in: 1126 3 rules
Command and Scripting Interpreter T1059, Spearphishing Attachment T1566.001, Spearphishing Link T1566.002
in: 4727 3 rules
Local Account T1136.001, Domain Account T1136.002, Account Manipulation T1098, Impair Defenses T1562
in: 4728 3 rules
Account Manipulation T1098, Impair Defenses T1562
in: 5007 3 rules
Modify Registry T1112, Command and Scripting Interpreter T1059, Spearphishing Attachment T1566.001, Spearphishing Link T1566.002
eq: 23 2 rules
Mark-of-the-Web Bypass T1553.005, File Deletion T1070.004
eq: 4719 2 rules
Disable or Modify Tools T1562.001
eq: 4732 2 rules
Local Account T1136.001, Account Manipulation T1098
eq: 4741 2 rules
Steal or Forge Kerberos Tickets T1558
eq: 4771 2 rules
Password Spraying T1110.003
eq: 4781 2 rules
Domain Accounts T1078.002
eq: 5 2 rules
Data Encrypted for Impact T1486, Service Stop T1489
eq: 5140 2 rules
Network Share Discovery T1135
eq: 7036 2 rules
Service Execution T1569.002, Inhibit System Recovery T1490
eq: 9 2 rules
Disk Structure Wipe T1561.002
in: 1121 2 rules
Command and Scripting Interpreter T1059, Spearphishing Attachment T1566.001, Spearphishing Link T1566.002
in: 1122 2 rules
Command and Scripting Interpreter T1059, Spearphishing Attachment T1566.001, Spearphishing Link T1566.002
in: 1125 2 rules
Command and Scripting Interpreter T1059, Spearphishing Attachment T1566.001, Spearphishing Link T1566.002
in: 1129 2 rules
Command and Scripting Interpreter T1059, Spearphishing Attachment T1566.001, Spearphishing Link T1566.002
in: 1131 2 rules
Command and Scripting Interpreter T1059, Spearphishing Attachment T1566.001, Spearphishing Link T1566.002
in: 1132 2 rules
Command and Scripting Interpreter T1059, Spearphishing Attachment T1566.001, Spearphishing Link T1566.002
in: 1133 2 rules
Command and Scripting Interpreter T1059, Spearphishing Attachment T1566.001, Spearphishing Link T1566.002
in: 1134 2 rules
Command and Scripting Interpreter T1059, Spearphishing Attachment T1566.001, Spearphishing Link T1566.002
in: 4698 2 rules
Scheduled Task T1053.005
in: 4700 2 rules
Scheduled Task T1053.005
in: 4702 2 rules
Scheduled Task T1053.005
in: 4731 2 rules
Account Manipulation T1098, Impair Defenses T1562, Local Account T1136.001, Domain Account T1136.002
in: 4738 2 rules
SID-History Injection T1134.005, Account Manipulation T1098, Impair Defenses T1562
in: 4887 2 rules
Steal or Forge Authentication Certificates T1649, Use Alternate Authentication Material T1550

ImageLoaded 60 entries

starts_with: C:\Windows\WinSxS\ 9 rules
DLL T1574.001
starts_with: C:\Windows\SysWOW64\ 8 rules
DLL T1574.001, Process Injection T1055, System Binary Proxy Execution T1218
starts_with: C:\Windows\System32\ 8 rules
DLL T1574.001, Process Injection T1055, System Binary Proxy Execution T1218
starts_with: C:\Program Files (x86)\ 6 rules
DLL T1574.001
starts_with: C:\Program Files\ 6 rules
DLL T1574.001
ends_with: \dbgcore.dll 4 rules
DLL T1574.001, LSASS Memory T1003.001, OS Credential Dumping T1003, Disable or Modify Tools T1562.001
ends_with: \dbghelp.dll 4 rules
DLL T1574.001, LSASS Memory T1003.001, OS Credential Dumping T1003, Disable or Modify Tools T1562.001
ends_with: .dll 3 rules
CMSTP T1218.003, Distributed Component Object Model T1021.003, System Binary Proxy Execution T1218, Regsvr32 T1218.010, Rundll32 T1218.011
ends_with: \vbscript.dll 3 rules
Windows Management Instrumentation Event Subscription T1546.003, Visual Basic T1059.005, MMC T1218.014, XSL Script Processing T1220
eq: "*.dll" 3 rules
Print Processors T1547.012, MMC T1218.014, Bypass User Account Control T1548.002, Ingress Tool Transfer T1105
match: \ProgramData\ 3 rules
CMSTP T1218.003, DLL T1574.001, Distributed Component Object Model T1021.003, System Binary Proxy Execution T1218
starts_with: C:\Program Files (x86)\Windows Kits\ 3 rules
DLL T1574.001
ends_with: \RstrtMgr.dll 2 rules
Data Encrypted for Impact T1486, Disable or Modify Tools T1562.001
ends_with: \amsi.dll 2 rules
DLL T1574.001
ends_with: \credui.dll 2 rules
GUI Input Capture T1056.002, DLL T1574.001
ends_with: \cryptbase.dll 2 rules
DLL T1574.001
ends_with: \cryptsp.dll 2 rules
DLL T1574.001
ends_with: \dismcore.dll 2 rules
DLL T1574.001, Bypass User Account Control T1548.002
ends_with: \edputil.dll 2 rules
DLL T1574.001
ends_with: \iphlpapi.dll 2 rules
DLL T1574.001
ends_with: \jscript.dll 2 rules
Visual Basic T1059.005, MMC T1218.014, XSL Script Processing T1220
ends_with: \kprocesshacker.sys 2 rules
Create or Modify System Process T1543, Exploitation for Privilege Escalation T1068, Windows Service T1543.003
ends_with: \mfdetours.dll 2 rules
DLL T1574.001
ends_with: \mscoree.dll 2 rules
DLL T1574.001, Process Injection T1055
ends_with: \profapi.dll 2 rules
DLL T1574.001
ends_with: \sspicli.dll 2 rules
DLL T1574.001
ends_with: \ttdrecord.dll 2 rules
LSASS Memory T1003.001, System Binary Proxy Execution T1218, DLL T1574.001
ends_with: \version.dll 2 rules
DLL T1574.001
ends_with: \vssapi.dll 2 rules
Inhibit System Recovery T1490, DLL T1574.001
ends_with: \vsstrace.dll 2 rules
Inhibit System Recovery T1490, DLL T1574.001
ends_with: \wininet.dll 2 rules
DLL T1574.001
ends_with: \winsta.dll 2 rules
DLL T1574.001
ends_with: \wldp.dll 2 rules
DLL T1574.001
ends_with: \wtsapi32.dll 2 rules
DLL T1574.001
eq: "*\\taskschd.dll" 2 rules
Spearphishing Attachment T1566.001, Scheduled Task/Job T1053
in: "*:\\windows\\system32\\*" 2 rules
DLL T1574.001
in: "*:\\windows\\syswow64\\*" 2 rules
DLL T1574.001
in: "*\\fastprox.dll" 2 rules
JavaScript T1059.007, CMSTP T1218.003
in: "*\\wbemcomn.dll" 2 rules
JavaScript T1059.007, CMSTP T1218.003
in: "*\\wbemprox.dll" 2 rules
JavaScript T1059.007, CMSTP T1218.003
match: :\Perflogs\ 2 rules
Command and Scripting Interpreter T1059, Distributed Component Object Model T1021.003, System Binary Proxy Execution T1218
match: :\Program Files (x86)\Windows Kits\10\bin\ 2 rules
DLL T1574.001
match: :\Users\ 2 rules
Command and Scripting Interpreter T1059, DLL T1574.001
match: :\Users\Public\ 2 rules
Command and Scripting Interpreter T1059, Distributed Component Object Model T1021.003, System Binary Proxy Execution T1218
match: :\Windows\Temp\ 2 rules
DLL T1574.001, Distributed Component Object Model T1021.003, System Binary Proxy Execution T1218
match: C:\Debuggers\dbghelp.dll 2 rules
DLL T1574.001
match: \AppData\Local\Temp\ 2 rules
DLL T1574.001, Distributed Component Object Model T1021.003, System Binary Proxy Execution T1218
match: \AppData\local\Google\Chrome\Application\ 2 rules
DLL T1574.001
match: \Contacts\ 2 rules
Command and Scripting Interpreter T1059, Distributed Component Object Model T1021.003, System Binary Proxy Execution T1218
match: \Favorites\ 2 rules
Command and Scripting Interpreter T1059, Distributed Component Object Model T1021.003, System Binary Proxy Execution T1218
match: \Favourites\ 2 rules
Command and Scripting Interpreter T1059, Distributed Component Object Model T1021.003, System Binary Proxy Execution T1218
match: \Pictures\ 2 rules
Command and Scripting Interpreter T1059, Distributed Component Object Model T1021.003, System Binary Proxy Execution T1218
match: \Temp\ 2 rules
Windows Service T1543.003, Malicious File T1204.002
match: \Temporary Internet 2 rules
Command and Scripting Interpreter T1059, Distributed Component Object Model T1021.003, System Binary Proxy Execution T1218
match: \Windows\Temp\ 2 rules
CMSTP T1218.003, Command and Scripting Interpreter T1059
match: opera\Opera Installer Temp\opera_package 2 rules
DLL T1574.001
starts_with: C:\Program Files\Windows Kits\ 2 rules
DLL T1574.001
starts_with: C:\ProgramData\Microsoft\Windows Defender\Platform\ 2 rules
DLL T1574.001
starts_with: C:\Windows\SoftwareDistribution\ 2 rules
DLL T1574.001
starts_with: C:\Windows\SystemTemp\ 2 rules
DLL T1574.001

QueryName 58 entries

ends_with: .hiddenservice.net 2 rules
Multi-hop Proxy T1090.003
ends_with: .onion 2 rules
Multi-hop Proxy T1090.003
ends_with: .onion.ca 2 rules
Multi-hop Proxy T1090.003
ends_with: .onion.cab 2 rules
Multi-hop Proxy T1090.003
ends_with: .onion.casa 2 rules
Multi-hop Proxy T1090.003
ends_with: .onion.city 2 rules
Multi-hop Proxy T1090.003
ends_with: .onion.direct 2 rules
Multi-hop Proxy T1090.003
ends_with: .onion.dog 2 rules
Multi-hop Proxy T1090.003
ends_with: .onion.glass 2 rules
Multi-hop Proxy T1090.003
ends_with: .onion.gq 2 rules
Multi-hop Proxy T1090.003
ends_with: .onion.ink 2 rules
Multi-hop Proxy T1090.003
ends_with: .onion.it 2 rules
Multi-hop Proxy T1090.003
ends_with: .onion.link 2 rules
Multi-hop Proxy T1090.003
ends_with: .onion.lt 2 rules
Multi-hop Proxy T1090.003
ends_with: .onion.lu 2 rules
Multi-hop Proxy T1090.003
ends_with: .onion.nu 2 rules
Multi-hop Proxy T1090.003
ends_with: .onion.pet 2 rules
Multi-hop Proxy T1090.003
ends_with: .onion.plus 2 rules
Multi-hop Proxy T1090.003
ends_with: .onion.rip 2 rules
Multi-hop Proxy T1090.003
ends_with: .onion.sh 2 rules
Multi-hop Proxy T1090.003
ends_with: .onion.to 2 rules
Multi-hop Proxy T1090.003
ends_with: .onion.top 2 rules
Multi-hop Proxy T1090.003
ends_with: .s1.tor-gateways.de 2 rules
Multi-hop Proxy T1090.003
ends_with: .s2.tor-gateways.de 2 rules
Multi-hop Proxy T1090.003
ends_with: .s3.tor-gateways.de 2 rules
Multi-hop Proxy T1090.003
ends_with: .s4.tor-gateways.de 2 rules
Multi-hop Proxy T1090.003
ends_with: .s5.tor-gateways.de 2 rules
Multi-hop Proxy T1090.003
ends_with: .t2w.pw 2 rules
Multi-hop Proxy T1090.003
ends_with: .tor2web.ae.org 2 rules
Multi-hop Proxy T1090.003
ends_with: .tor2web.blutmagie.de 2 rules
Multi-hop Proxy T1090.003
ends_with: .tor2web.com 2 rules
Multi-hop Proxy T1090.003
ends_with: .tor2web.fi 2 rules
Multi-hop Proxy T1090.003
ends_with: .tor2web.io 2 rules
Multi-hop Proxy T1090.003
ends_with: .tor2web.org 2 rules
Multi-hop Proxy T1090.003
ends_with: .tor2web.xyz 2 rules
Multi-hop Proxy T1090.003
ends_with: .torlink.co 2 rules
Multi-hop Proxy T1090.003
ends_with: remoteassistance.support.services.microsoft.com 2 rules
Web Protocols T1071.001, Exploitation of Remote Services T1210, Remote Desktop Software T1219.002
in: "*api.ip.sb" 2 rules
IP Addresses T1590.005
in: "*api.ipify.org" 2 rules
IP Addresses T1590.005
in: "*b.barracudacentral.org" 2 rules
IP Addresses T1590.005
in: "*cbl.abuseat.org" 2 rules
IP Addresses T1590.005
in: "*discord*" 2 rules
Visual Basic T1059.005
in: "*dnsbl-1.uceprotect.net" 2 rules
IP Addresses T1590.005
in: "*icanhazip.com" 2 rules
IP Addresses T1590.005
in: "*ip.anysrc.com" 2 rules
IP Addresses T1590.005
in: "*ipecho.net" 2 rules
IP Addresses T1590.005
in: "*ipinfo.io" 2 rules
IP Addresses T1590.005
in: "*spam.dnsbl.sorbs.net" 2 rules
IP Addresses T1590.005
in: "*wtfismyip.com" 2 rules
IP Addresses T1590.005
in: "*zen.spamhaus.org" 2 rules
IP Addresses T1590.005
in: "ident.me" 2 rules
IP Addresses T1590.005
in: "www.myexternalip.com" 2 rules
IP Addresses T1590.005
match: .anonfiles.com 2 rules
Exfiltration to Cloud Storage T1567.002
match: .stage.123456. 2 rules
DNS T1071.004
match: ufile.io 2 rules
Exfiltration to Cloud Storage T1567.002
match: userstorage.mega.co.nz 2 rules
Exfiltration to Cloud Storage T1567.002
starts_with: aaa.stage. 2 rules
DNS T1071.004
starts_with: post.1 2 rules
DNS T1071.004

process_name 51 entries

in: "EQNEDT32.exe" 5 rules
Spearphishing Attachment T1566.001
in: "Graph.exe" 5 rules
Spearphishing Attachment T1566.001
in: "excel.exe" 5 rules
Spearphishing Attachment T1566.001
in: "msaccess.exe" 5 rules
Spearphishing Attachment T1566.001
in: "mspub.exe" 5 rules
Spearphishing Attachment T1566.001
in: "onenote.exe" 5 rules
Spearphishing Attachment T1566.001
in: "onenoteim.exe" 5 rules
Spearphishing Attachment T1566.001
in: "onenotem.exe" 5 rules
Spearphishing Attachment T1566.001
in: "outlook.exe" 5 rules
Spearphishing Attachment T1566.001
in: "powerpnt.exe" 5 rules
Spearphishing Attachment T1566.001
in: "visio.exe" 5 rules
Spearphishing Attachment T1566.001
in: "winproj.exe" 5 rules
Spearphishing Attachment T1566.001
in: "winword.exe" 5 rules
Spearphishing Attachment T1566.001
in: "pwsh.exe" 4 rules
External Remote Services T1133, Exploit Public-Facing Application T1190, NTFS File Attributes T1564.004, Windows Remote Management T1021.006, Visual Basic T1059.005
eq: C:\Windows\System32\svchost.exe 3 rules
Timestomp T1070.006, Disable or Modify Tools T1562.001, LSASS Memory T1003.001
eq: powershell.exe 3 rules
PowerShell T1059.001, Malicious File T1204.002, SQL Stored Procedures T1505.001
eq: powershell_ise.exe 3 rules
PowerShell T1059.001, Malicious File T1204.002, SQL Stored Procedures T1505.001
eq: pwsh.exe 3 rules
PowerShell T1059.001, Malicious File T1204.002, SQL Stored Procedures T1505.001
eq: rundll32.exe 3 rules
Rundll32 T1218.011, Exfiltration Over Unencrypted Non-C2 Protocol T1048.003
in: "cacls.exe" 3 rules
Windows File and Directory Permissions Modification T1222.001
in: "cmd.exe" 3 rules
External Remote Services T1133, Exploit Public-Facing Application T1190, Windows Remote Management T1021.006, Visual Basic T1059.005
in: "cscript.exe" 3 rules
External Remote Services T1133, Exploit Public-Facing Application T1190, NTFS File Attributes T1564.004, Visual Basic T1059.005
in: "icacls.exe" 3 rules
Windows File and Directory Permissions Modification T1222.001
in: "wordpad.exe" 3 rules
Spearphishing Attachment T1566.001
in: "wordview.exe" 3 rules
Spearphishing Attachment T1566.001
in: "wscript.exe" 3 rules
External Remote Services T1133, Exploit Public-Facing Application T1190, NTFS File Attributes T1564.004, Visual Basic T1059.005
in: "xcacls.exe" 3 rules
Windows File and Directory Permissions Modification T1222.001
ends_with: \procexp.exe 2 rules
LSASS Memory T1003.001, Disable or Modify Tools T1562.001
ends_with: \procexp64.exe 2 rules
LSASS Memory T1003.001, Disable or Modify Tools T1562.001
ends_with: \procmon.exe 2 rules
LSASS Memory T1003.001, Disable or Modify Tools T1562.001
ends_with: \procmon64.exe 2 rules
LSASS Memory T1003.001, Disable or Modify Tools T1562.001
ends_with: \thor.exe 2 rules
LSASS Memory T1003.001
ends_with: \thor64.exe 2 rules
LSASS Memory T1003.001
ends_with: \wmiprvse.exe 2 rules
LSASS Memory T1003.001, Windows Management Instrumentation T1047, Service Execution T1569.002
eq: *.exe 2 rules
Screen Capture T1113
eq: C:\Windows\System32\wbem\WmiPrvSE.exe 2 rules
LSASS Memory T1003.001
eq: cmd.exe 2 rules
PowerShell T1059.001, Malicious File T1204.002, SQL Stored Procedures T1505.001
eq: outlook.exe 2 rules
Spearphishing Attachment T1566.001, Phishing T1566
eq: spoolsv.exe 2 rules
Print Processors T1547.012
in: "*powershell*" 2 rules
Windows Remote Management T1021.006, Visual Basic T1059.005
in: "mshta.exe" 2 rules
External Remote Services T1133, Exploit Public-Facing Application T1190, NTFS File Attributes T1564.004
in: "powershell.exe" 2 rules
External Remote Services T1133, Exploit Public-Facing Application T1190, NTFS File Attributes T1564.004
in: "powershell_ise.exe" 2 rules
External Remote Services T1133, Exploit Public-Facing Application T1190, NTFS File Attributes T1564.004
match: :\Program Files (x86)\ 2 rules
LSASS Memory T1003.001
match: :\Program Files\ 2 rules
LSASS Memory T1003.001
match: Microsoft.Identity.Health.Adfs.DiagnosticsAgent.exe 2 rules
Query Registry T1012
match: Microsoft.Identity.Health.Adfs.InsightsService.exe 2 rules
Query Registry T1012
match: Microsoft.Identity.Health.Adfs.MonitoringAgent.Startup.exe 2 rules
Query Registry T1012
match: Microsoft.Identity.Health.Adfs.PshSurrogate.exe 2 rules
Query Registry T1012
match: Microsoft.Identity.Health.Common.Clients.ResourceMonitor.exe 2 rules
Query Registry T1012
ne: "-" 2 rules
Password Spraying T1110.003

DestinationHostname 33 entries

ends_with: mega.co.nz 4 rules
Ingress Tool Transfer T1105, Web Service T1102, Dead Drop Resolver T1102.001, Exfiltration to Cloud Storage T1567.002
ends_with: mega.nz 4 rules
Ingress Tool Transfer T1105, Web Service T1102, Dead Drop Resolver T1102.001, Exfiltration to Cloud Storage T1567.002
ends_with: trycloudflare.com 4 rules
Ingress Tool Transfer T1105, Exfiltration Over Web Service T1567, Protocol Tunneling T1572, Web Service T1102, Dead Drop Resolver T1102.001
ends_with: anonfiles.com 3 rules
Ingress Tool Transfer T1105, Web Service T1102, Dead Drop Resolver T1102.001
ends_with: cdn.discordapp.com 3 rules
Ingress Tool Transfer T1105, Web Service T1102, Dead Drop Resolver T1102.001
ends_with: ddns.net 3 rules
Ingress Tool Transfer T1105, Web Service T1102, Dead Drop Resolver T1102.001
ends_with: gofile.io 3 rules
Ingress Tool Transfer T1105, Web Service T1102, Dead Drop Resolver T1102.001
ends_with: hastebin.com 3 rules
Ingress Tool Transfer T1105, Web Service T1102, Dead Drop Resolver T1102.001
ends_with: mediafire.com 3 rules
Ingress Tool Transfer T1105, Web Service T1102, Dead Drop Resolver T1102.001
ends_with: pages.dev 3 rules
Ingress Tool Transfer T1105, Web Service T1102, Dead Drop Resolver T1102.001
ends_with: paste.ee 3 rules
Ingress Tool Transfer T1105, Web Service T1102, Dead Drop Resolver T1102.001
ends_with: pastebin.com 3 rules
Ingress Tool Transfer T1105, Web Service T1102, Dead Drop Resolver T1102.001
ends_with: pastebin.pl 3 rules
Ingress Tool Transfer T1105, Web Service T1102, Dead Drop Resolver T1102.001
ends_with: pastetext.net 3 rules
Ingress Tool Transfer T1105, Web Service T1102, Dead Drop Resolver T1102.001
ends_with: privatlab.com 3 rules
Ingress Tool Transfer T1105, Web Service T1102, Dead Drop Resolver T1102.001
ends_with: privatlab.net 3 rules
Ingress Tool Transfer T1105, Web Service T1102, Dead Drop Resolver T1102.001
ends_with: send.exploit.in 3 rules
Ingress Tool Transfer T1105, Web Service T1102, Dead Drop Resolver T1102.001
ends_with: sendspace.com 3 rules
Ingress Tool Transfer T1105, Web Service T1102, Dead Drop Resolver T1102.001
ends_with: storage.googleapis.com 3 rules
Ingress Tool Transfer T1105, Web Service T1102, Dead Drop Resolver T1102.001
ends_with: temp.sh 3 rules
Ingress Tool Transfer T1105, Web Service T1102, Dead Drop Resolver T1102.001
ends_with: transfer.sh 3 rules
Ingress Tool Transfer T1105, Web Service T1102, Dead Drop Resolver T1102.001
ends_with: ufile.io 3 rules
Ingress Tool Transfer T1105, Web Service T1102, Dead Drop Resolver T1102.001
ends_with: w3spaces.com 3 rules
Ingress Tool Transfer T1105, Web Service T1102, Dead Drop Resolver T1102.001
ends_with: workers.dev 3 rules
Ingress Tool Transfer T1105, Web Service T1102, Dead Drop Resolver T1102.001
ends_with: .githubusercontent.com 2 rules
Ingress Tool Transfer T1105
ends_with: dl.dropboxusercontent.com 2 rules
Ingress Tool Transfer T1105
ends_with: ghostbin.co 2 rules
Ingress Tool Transfer T1105
ends_with: github.com 2 rules
Ingress Tool Transfer T1105
ends_with: glitch.me 2 rules
Ingress Tool Transfer T1105
ends_with: onrender.com 2 rules
Ingress Tool Transfer T1105
ends_with: pixeldrain.com 2 rules
Web Service T1102, Dead Drop Resolver T1102.001, Ingress Tool Transfer T1105
ends_with: storjshare.io 2 rules
Ingress Tool Transfer T1105
ends_with: supabase.co 2 rules
Ingress Tool Transfer T1105

GrantedAccess 33 entries

in: "0x1fffff" 4 rules
Portable Executable Injection T1055.002, LSASS Memory T1003.001, Windows Management Instrumentation T1047
eq: 0x1fffff 3 rules
Native API T1106, Disable or Modify Tools T1562.001, Bypass User Account Control T1548.002, Exploitation for Privilege Escalation T1068
ends_with: 0x14C2 3 rules
LSASS Memory T1003.001
ends_with: 18 3 rules
LSASS Memory T1003.001
ends_with: 1A 3 rules
LSASS Memory T1003.001
ends_with: 30 3 rules
LSASS Memory T1003.001
ends_with: 38 3 rules
LSASS Memory T1003.001
ends_with: 3A 3 rules
LSASS Memory T1003.001
ends_with: 50 3 rules
LSASS Memory T1003.001
ends_with: 58 3 rules
LSASS Memory T1003.001
ends_with: 5A 3 rules
LSASS Memory T1003.001
ends_with: 70 3 rules
LSASS Memory T1003.001
ends_with: 78 3 rules
LSASS Memory T1003.001
ends_with: 7A 3 rules
LSASS Memory T1003.001
ends_with: 90 3 rules
LSASS Memory T1003.001
ends_with: 98 3 rules
LSASS Memory T1003.001
ends_with: 9A 3 rules
LSASS Memory T1003.001
ends_with: B0 3 rules
LSASS Memory T1003.001
ends_with: B8 3 rules
LSASS Memory T1003.001
ends_with: BA 3 rules
LSASS Memory T1003.001
ends_with: D0 3 rules
LSASS Memory T1003.001
ends_with: D8 3 rules
LSASS Memory T1003.001
ends_with: DA 3 rules
LSASS Memory T1003.001
ends_with: F0 3 rules
LSASS Memory T1003.001
ends_with: F8 3 rules
LSASS Memory T1003.001
ends_with: FA 3 rules
LSASS Memory T1003.001
eq: 0x1FFFFF 3 rules
LSASS Memory T1003.001, Extra Window Memory Injection T1055.011
in: "0x40" 3 rules
Portable Executable Injection T1055.002, LSASS Memory T1003.001
eq: 0x14c0 2 rules
LSASS Memory T1003.001, OS Credential Dumping T1003
eq: 0x40 2 rules
LSASS Memory T1003.001, OS Credential Dumping T1003
ends_with: 10 2 rules
LSASS Memory T1003.001
ends_with: FF 2 rules
LSASS Memory T1003.001
eq: 0x1040 2 rules
Token Impersonation/Theft T1134.001

Contents 33 entries

match: .githubusercontent.com 2 rules
NTFS File Attributes T1564.004
match: anonfiles.com 2 rules
NTFS File Attributes T1564.004
match: cdn.discordapp.com 2 rules
NTFS File Attributes T1564.004
match: ddns.net 2 rules
NTFS File Attributes T1564.004
match: dl.dropboxusercontent.com 2 rules
NTFS File Attributes T1564.004
match: ghostbin.co 2 rules
NTFS File Attributes T1564.004
match: github.com 2 rules
NTFS File Attributes T1564.004
match: glitch.me 2 rules
NTFS File Attributes T1564.004
match: gofile.io 2 rules
NTFS File Attributes T1564.004
match: hastebin.com 2 rules
NTFS File Attributes T1564.004
match: mediafire.com 2 rules
NTFS File Attributes T1564.004
match: mega.nz 2 rules
NTFS File Attributes T1564.004
match: onrender.com 2 rules
NTFS File Attributes T1564.004
match: pages.dev 2 rules
NTFS File Attributes T1564.004
match: paste.ee 2 rules
NTFS File Attributes T1564.004
match: pastebin.com 2 rules
NTFS File Attributes T1564.004
match: pastebin.pl 2 rules
NTFS File Attributes T1564.004
match: pastetext.net 2 rules
NTFS File Attributes T1564.004
match: pixeldrain.com 2 rules
NTFS File Attributes T1564.004
match: privatlab.com 2 rules
NTFS File Attributes T1564.004
match: privatlab.net 2 rules
NTFS File Attributes T1564.004
match: send.exploit.in 2 rules
NTFS File Attributes T1564.004
match: sendspace.com 2 rules
NTFS File Attributes T1564.004
match: storage.googleapis.com 2 rules
NTFS File Attributes T1564.004
match: storjshare.io 2 rules
NTFS File Attributes T1564.004
match: supabase.co 2 rules
NTFS File Attributes T1564.004
match: temp.sh 2 rules
NTFS File Attributes T1564.004
match: transfer.sh 2 rules
NTFS File Attributes T1564.004
match: trycloudflare.com 2 rules
NTFS File Attributes T1564.004
match: ufile.io 2 rules
NTFS File Attributes T1564.004
match: w3spaces.com 2 rules
NTFS File Attributes T1564.004
match: workers.dev 2 rules
NTFS File Attributes T1564.004
starts_with: [ZoneTransfer] ZoneId=3 2 rules

TargetImage 29 entries

ends_with: \lsass.exe 13 rules
LSASS Memory T1003.001, Native API T1106, Windows Remote Management T1021.006, PowerShell T1059.001, Disable or Modify Tools T1562.001
eq: *lsass.exe 6 rules
LSASS Memory T1003.001, Disable or Modify Tools T1562.001
wildcard: ?:\WINDOWS\system32\lsass.exe 4 rules
OS Credential Dumping T1003, LSASS Memory T1003.001, Native API T1106, Process Injection T1055
in: "*\\chrome.exe" 3 rules
Process Injection T1055, Portable Executable Injection T1055.002, Dynamic-link Library Injection T1055.001
in: "*\\firefox.exe" 3 rules
Process Injection T1055, Portable Executable Injection T1055.002, Dynamic-link Library Injection T1055.001
in: "*\\spoolsv.exe" 3 rules
Process Injection T1055, Exploitation for Privilege Escalation T1068, Portable Executable Injection T1055.002
ends_with: \calc.exe 2 rules
Thread Execution Hijacking T1055.003, Extra Window Memory Injection T1055.011
ends_with: \calculator.exe 2 rules
Thread Execution Hijacking T1055.003, Extra Window Memory Injection T1055.011
ends_with: \mspaint.exe 2 rules
Thread Execution Hijacking T1055.003, Extra Window Memory Injection T1055.011
ends_with: \notepad.exe 2 rules
Thread Execution Hijacking T1055.003, Extra Window Memory Injection T1055.011
ends_with: \ping.exe 2 rules
Thread Execution Hijacking T1055.003, Extra Window Memory Injection T1055.011
ends_with: \wordpad.exe 2 rules
Thread Execution Hijacking T1055.003, Extra Window Memory Injection T1055.011
ends_with: \write.exe 2 rules
Thread Execution Hijacking T1055.003, Extra Window Memory Injection T1055.011
eq: "*.exe" 2 rules
Process Injection T1055, Portable Executable Injection T1055.002
eq: C:\Windows\System32\conhost.exe 2 rules
Process Injection T1055
eq: System 2 rules
Process Injection T1055
in: "*\\CalculatorApp.exe" 2 rules
Portable Executable Injection T1055.002
in: "*\\SysWOW64\\winlogon.exe*" 2 rules
Token Impersonation/Theft T1134.001
in: "*\\calc.exe" 2 rules
Portable Executable Injection T1055.002
in: "*\\cmd.exe" 2 rules
Process Injection T1055, Portable Executable Injection T1055.002
in: "*\\explorer.exe" 2 rules
Process Injection T1055, Portable Executable Injection T1055.002
in: "*\\iexplore.exe" 2 rules
Process Injection T1055, Dynamic-link Library Injection T1055.001
in: "*\\microsoftedgecp.exe" 2 rules
Process Injection T1055, Dynamic-link Library Injection T1055.001
in: "*\\notepad.exe" 2 rules
Portable Executable Injection T1055.002
in: "*\\svchost.exe" 2 rules
Process Injection T1055, Portable Executable Injection T1055.002
in: "*\\system32\\winlogon.exe*" 2 rules
Token Impersonation/Theft T1134.001
in: "*\\win32calc.exe" 2 rules
Portable Executable Injection T1055.002
starts_with: C:\Program Files (x86)\ 2 rules
Process Injection T1055
starts_with: C:\Program Files\ 2 rules
Process Injection T1055

ServiceName 26 entries

ends_with: $ 2 rules
Kerberoasting T1558.003
eq: "*$" 2 rules
Golden Ticket T1558.001, Valid Accounts T1078, Network Share Discovery T1135
eq: PSEXESVC 2 rules
Service Execution T1569.002, SMB/Windows Admin Shares T1021.002, Lateral Tool Transfer T1570
match: AmmyyAdmin 2 rules
Windows Service T1543.003, Service Execution T1569.002
match: AnyDesk 2 rules
Windows Service T1543.003, Service Execution T1569.002
match: Atera 2 rules
Windows Service T1543.003, Service Execution T1569.002
match: BASupportExpressSrvcUpdater 2 rules
Windows Service T1543.003, Service Execution T1569.002
match: BASupportExpressStandaloneService 2 rules
Windows Service T1543.003, Service Execution T1569.002
match: GoToAssist 2 rules
Windows Service T1543.003, Service Execution T1569.002
match: GoToMyPC 2 rules
Windows Service T1543.003, Service Execution T1569.002
match: LMIGuardianSvc 2 rules
Windows Service T1543.003, Service Execution T1569.002
match: LogMeIn 2 rules
Windows Service T1543.003, Service Execution T1569.002
match: Parsec 2 rules
Windows Service T1543.003, Service Execution T1569.002
match: RManService 2 rules
Windows Service T1543.003, Service Execution T1569.002
match: RPCPerformanceService 2 rules
Windows Service T1543.003, Service Execution T1569.002
match: RPCService 2 rules
Windows Service T1543.003, Service Execution T1569.002
match: SSUService 2 rules
Windows Service T1543.003, Service Execution T1569.002
match: SplashtopRemoteService 2 rules
Windows Service T1543.003, Service Execution T1569.002
match: TeamViewer 2 rules
Windows Service T1543.003, Service Execution T1569.002
match: TightVNC 2 rules
Windows Service T1543.003, Service Execution T1569.002
match: Zoho 2 rules
Windows Service T1543.003, Service Execution T1569.002
match: chromoting 2 rules
Windows Service T1543.003, Service Execution T1569.002
match: jumpcloud 2 rules
Windows Service T1543.003, Service Execution T1569.002
match: monblanking 2 rules
Windows Service T1543.003, Service Execution T1569.002
match: vncserver 2 rules
Windows Service T1543.003, Service Execution T1569.002
ne: "*$" 2 rules
Kerberoasting T1558.003

aceAccessRights 19 entries

in: "Full control" 4 rules
Windows File and Directory Permissions Modification T1222.001, Domain or Tenant Policy Modification T1484, Event Triggered Execution T1546
in: "All extended rights" 3 rules
Windows File and Directory Permissions Modification T1222.001, Domain or Tenant Policy Modification T1484, Event Triggered Execution T1546
in: "All validated writes" 3 rules
Windows File and Directory Permissions Modification T1222.001, Domain or Tenant Policy Modification T1484, Event Triggered Execution T1546
in: "Create all child objects" 3 rules
Windows File and Directory Permissions Modification T1222.001, Domain or Tenant Policy Modification T1484, Event Triggered Execution T1546
in: "Delete all child objects" 3 rules
Windows File and Directory Permissions Modification T1222.001, Domain or Tenant Policy Modification T1484, Event Triggered Execution T1546
in: "Delete subtree" 3 rules
Windows File and Directory Permissions Modification T1222.001, Domain or Tenant Policy Modification T1484, Event Triggered Execution T1546
in: "Delete" 3 rules
Windows File and Directory Permissions Modification T1222.001, Domain or Tenant Policy Modification T1484, Event Triggered Execution T1546
in: "Modify owner" 3 rules
Windows File and Directory Permissions Modification T1222.001, Domain or Tenant Policy Modification T1484, Event Triggered Execution T1546
in: "Modify permissions" 3 rules
Windows File and Directory Permissions Modification T1222.001, Domain or Tenant Policy Modification T1484, Event Triggered Execution T1546
in: "Write all properties" 3 rules
Windows File and Directory Permissions Modification T1222.001, Domain or Tenant Policy Modification T1484, Event Triggered Execution T1546
in: CC 3 rules
Windows File and Directory Permissions Modification T1222.001, Domain or Tenant Policy Modification T1484, Event Triggered Execution T1546
in: CR 3 rules
Windows File and Directory Permissions Modification T1222.001, Domain or Tenant Policy Modification T1484, Event Triggered Execution T1546
in: DC 3 rules
Windows File and Directory Permissions Modification T1222.001, Domain or Tenant Policy Modification T1484, Event Triggered Execution T1546
in: DT 3 rules
Windows File and Directory Permissions Modification T1222.001, Domain or Tenant Policy Modification T1484, Event Triggered Execution T1546
in: SD 3 rules
Windows File and Directory Permissions Modification T1222.001, Domain or Tenant Policy Modification T1484, Event Triggered Execution T1546
in: SW 3 rules
Windows File and Directory Permissions Modification T1222.001, Domain or Tenant Policy Modification T1484, Event Triggered Execution T1546
in: WD 3 rules
Windows File and Directory Permissions Modification T1222.001, Domain or Tenant Policy Modification T1484, Event Triggered Execution T1546
in: WO 3 rules
Windows File and Directory Permissions Modification T1222.001, Domain or Tenant Policy Modification T1484, Event Triggered Execution T1546
in: WP 3 rules
Windows File and Directory Permissions Modification T1222.001, Domain or Tenant Policy Modification T1484, Event Triggered Execution T1546

file_name 17 entries

in: "*.exe" 7 rules
Masquerading T1036, Remote Access Tools T1219, Local Groups T1069.001, Spearphishing Attachment T1566.001, AppDomainManager T1574.014, Replication Through Removable Media T1091
in: "*.dll" 6 rules
Masquerading T1036, Local Groups T1069.001, Spearphishing Attachment T1566.001, AppDomainManager T1574.014, Replication Through Removable Media T1091
in: "*.js" 5 rules
Masquerading T1036, Local Groups T1069.001, Spearphishing Attachment T1566.001, Replication Through Removable Media T1091
in: "*.pif" 5 rules
Masquerading T1036, Local Groups T1069.001, Spearphishing Attachment T1566.001, Replication Through Removable Media T1091
in: "*.vbe" 5 rules
Masquerading T1036, Local Groups T1069.001, Spearphishing Attachment T1566.001, Replication Through Removable Media T1091
in: "*.vbs" 5 rules
Masquerading T1036, Local Groups T1069.001, Spearphishing Attachment T1566.001, Replication Through Removable Media T1091
in: "*.ashx" 4 rules
Exploit Public-Facing Application T1190, External Remote Services T1133, Web Shell T1505.003
in: "*.bat" 4 rules
Masquerading T1036, Local Groups T1069.001, Replication Through Removable Media T1091
in: "*.cmd" 4 rules
Masquerading T1036, Local Groups T1069.001, Replication Through Removable Media T1091
in: "*.com" 4 rules
Masquerading T1036, Local Groups T1069.001, Replication Through Removable Media T1091
in: "*.sys" 4 rules
Masquerading T1036, Local Groups T1069.001, Replication Through Removable Media T1091
eq: "*.dll" 3 rules
Print Processors T1547.012, DLL T1574.001, Phishing T1566
in: "*.aspx" 3 rules
Exploit Public-Facing Application T1190, External Remote Services T1133, Web Shell T1505.003
in: "*.ps1" 3 rules
Masquerading T1036, Spearphishing Attachment T1566.001
in: "*.dat" 2 rules
Screen Capture T1113, Local Groups T1069.001
in: "*.lnk" 2 rules
Local Groups T1069.001, Replication Through Removable Media T1091
in: "*.msc" 2 rules
Masquerading T1036

DestinationPort 16 entries

eq: 443 7 rules
Ingress Tool Transfer T1105, Exploitation for Client Execution T1203, Remote Desktop Protocol T1021.001, Protocol Tunneling T1572, Rundll32 T1218.011, MSBuild T1127.001
eq: 80 6 rules
Ingress Tool Transfer T1105, Exploitation for Client Execution T1203, Remote Desktop Protocol T1021.001, Protocol Tunneling T1572, MSBuild T1127.001
ne: 0 6 rules
Process Injection T1055, Rundll32 T1218.011, Exfiltration Over Unencrypted Non-C2 Protocol T1048.003, Bootkit T1542.003
eq: 587 4 rules
Exploitation for Client Execution T1203, Exfiltration Over Unencrypted Non-C2 Protocol T1048.003
eq: 3389 3 rules
Remote Desktop Protocol T1021.001, Internal Proxy T1090.001, External Proxy T1090.002, Password Guessing T1110.001
eq: 88 3 rules
Kerberoasting T1558.003, Pass the Ticket T1550.003, Steal or Forge Kerberos Tickets T1558, Use Alternate Authentication Material T1550
eq: 445 3 rules
Ingress Tool Transfer T1105
eq: 465 3 rules
Exfiltration Over Unencrypted Non-C2 Protocol T1048.003
eq: 993 3 rules
Exploitation for Client Execution T1203
eq: 995 3 rules
Exploitation for Client Execution T1203
eq: 9389 2 rules
Account Discovery T1087, Local Groups T1069.001, Domain Groups T1069.002, Local Account T1087.001, Domain Account T1087.002, Domain Trust Discovery T1482
eq: 139 2 rules
eq: 143 2 rules
Exploitation for Client Execution T1203
eq: 25 2 rules
Exploitation for Client Execution T1203, Exfiltration Over Unencrypted Non-C2 Protocol T1048.003
eq: 5985 2 rules
PowerShell T1059.001, Windows Remote Management T1021.006
eq: 5986 2 rules
PowerShell T1059.001, Windows Remote Management T1021.006

Properties 15 entries

in: "*Manage Replication Topology*" 2 rules
DCSync T1003.006
in: "*Remove Replica In Domain*" 2 rules
DCSync T1003.006
in: "*Replicating Directory Changes All*" 2 rules
DCSync T1003.006
in: "*{1131f6ac-9c07-11d1-f79f-00c04fc2dcd2}*" 2 rules
DCSync T1003.006
in: "*{1131f6ad-9c07-11d1-f79f-00c04fc2dcd2}*" 2 rules
DCSync T1003.006
in: "*{9923a32a-3607-11d2-b9be-0000f87a36b2}*" 2 rules
DCSync T1003.006
match: 1131f6aa-9c07-11d1-f79f-00c04fc2dcd2 2 rules
DCSync T1003.006
match: 1131f6ad-9c07-11d1-f79f-00c04fc2dcd2 2 rules
DCSync T1003.006
match: 89e95b76-444d-4c62-991a-0facbeda640c 2 rules
DCSync T1003.006
wildcard: *1131f6aa-9c07-11d1-f79f-00c04fc2dcd2* 2 rules
OS Credential Dumping T1003, DCSync T1003.006, Valid Accounts T1078, Domain Accounts T1078.002
wildcard: *1131f6ad-9c07-11d1-f79f-00c04fc2dcd2* 2 rules
OS Credential Dumping T1003, DCSync T1003.006, Valid Accounts T1078, Domain Accounts T1078.002
wildcard: *89e95b76-444d-4c62-991a-0facbeda640c* 2 rules
OS Credential Dumping T1003, DCSync T1003.006, Valid Accounts T1078, Domain Accounts T1078.002
wildcard: *DS-Replication-Get-Changes* 2 rules
OS Credential Dumping T1003, DCSync T1003.006, Valid Accounts T1078, Domain Accounts T1078.002
wildcard: *DS-Replication-Get-Changes-All* 2 rules
OS Credential Dumping T1003, DCSync T1003.006, Valid Accounts T1078, Domain Accounts T1078.002
wildcard: *DS-Replication-Get-Changes-In-Filtered-Set* 2 rules
OS Credential Dumping T1003, DCSync T1003.006, Valid Accounts T1078, Domain Accounts T1078.002

SubcategoryGuid 15 entries

eq: {0CCE9210-69AE-11D9-BED3-505054503030} 2 rules
Disable Windows Event Logging T1562.002
eq: {0CCE9211-69AE-11D9-BED3-505054503030} 2 rules
Disable Windows Event Logging T1562.002
eq: {0CCE9212-69AE-11D9-BED3-505054503030} 2 rules
Disable Windows Event Logging T1562.002
eq: {0CCE9215-69AE-11D9-BED3-505054503030} 2 rules
Disable Windows Event Logging T1562.002
eq: {0CCE9217-69AE-11D9-BED3-505054503030} 2 rules
Disable Windows Event Logging T1562.002
eq: {0CCE921B-69AE-11D9-BED3-505054503030} 2 rules
Disable Windows Event Logging T1562.002
eq: {0CCE922B-69AE-11D9-BED3-505054503030} 2 rules
Disable Windows Event Logging T1562.002
eq: {0CCE922F-69AE-11D9-BED3-505054503030} 2 rules
Disable Windows Event Logging T1562.002
eq: {0CCE9230-69AE-11D9-BED3-505054503030} 2 rules
Disable Windows Event Logging T1562.002
eq: {0CCE9235-69AE-11D9-BED3-505054503030} 2 rules
Disable Windows Event Logging T1562.002
eq: {0CCE9236-69AE-11D9-BED3-505054503030} 2 rules
Disable Windows Event Logging T1562.002
eq: {0CCE9237-69AE-11D9-BED3-505054503030} 2 rules
Disable Windows Event Logging T1562.002
eq: {0CCE923F-69AE-11D9-BED3-505054503030} 2 rules
Disable Windows Event Logging T1562.002
eq: {0CCE9240-69AE-11D9-BED3-505054503030} 2 rules
Disable Windows Event Logging T1562.002
eq: {0CCE9242-69AE-11D9-BED3-505054503030} 2 rules
Disable Windows Event Logging T1562.002

dest_ip 14 entries

cidr_match: 127.0.0.0/8 13 rules
Rundll32 T1218.011, Non-Standard Port T1571, System Binary Proxy Execution T1218, Ingress Tool Transfer T1105, CMSTP T1218.003, Web Protocols T1071.001
cidr_match: ::1/128 13 rules
Rundll32 T1218.011, Non-Standard Port T1571, System Binary Proxy Execution T1218, Ingress Tool Transfer T1105, CMSTP T1218.003, Web Protocols T1071.001
cidr_match: 10.0.0.0/8 12 rules
Rundll32 T1218.011, Non-Standard Port T1571, System Binary Proxy Execution T1218, Ingress Tool Transfer T1105, CMSTP T1218.003, Web Protocols T1071.001
cidr_match: 169.254.0.0/16 12 rules
Rundll32 T1218.011, Non-Standard Port T1571, System Binary Proxy Execution T1218, Ingress Tool Transfer T1105, CMSTP T1218.003, Web Protocols T1071.001
cidr_match: 172.16.0.0/12 12 rules
Rundll32 T1218.011, Non-Standard Port T1571, System Binary Proxy Execution T1218, Ingress Tool Transfer T1105, CMSTP T1218.003, Web Protocols T1071.001
cidr_match: 192.168.0.0/16 12 rules
Rundll32 T1218.011, Non-Standard Port T1571, System Binary Proxy Execution T1218, Ingress Tool Transfer T1105, CMSTP T1218.003, Web Protocols T1071.001
cidr_match: fc00::/7 12 rules
Rundll32 T1218.011, Non-Standard Port T1571, System Binary Proxy Execution T1218, Ingress Tool Transfer T1105, CMSTP T1218.003, Web Protocols T1071.001
cidr_match: fe80::/10 12 rules
Rundll32 T1218.011, Non-Standard Port T1571, System Binary Proxy Execution T1218, Ingress Tool Transfer T1105, CMSTP T1218.003, Web Protocols T1071.001
cidr_match: 51.103.0.0/16 3 rules
Exploitation for Client Execution T1203, Rundll32 T1218.011, System Binary Proxy Execution T1218
cidr_match: 20.184.0.0/13 2 rules
Exploitation for Client Execution T1203, System Binary Proxy Execution T1218
cidr_match: 20.192.0.0/10 2 rules
Exploitation for Client Execution T1203, System Binary Proxy Execution T1218
cidr_match: 51.10.0.0/15 2 rules
Exploitation for Client Execution T1203, System Binary Proxy Execution T1218
cidr_match: 51.104.0.0/15 2 rules
Exploitation for Client Execution T1203, System Binary Proxy Execution T1218
eq: 127.0.0.1 2 rules
Network Service Discovery T1046, Windows Remote Management T1021.006, PowerShell T1059.001

ImagePath 14 entries

match: cmd 5 rules
Obfuscated Files or Information T1027, PowerShell T1059.001, Token Impersonation/Theft T1134.001, Create Process with Token T1134.002
match: powershell 5 rules
Windows Service T1543.003, Service Execution T1569.002, Obfuscated Files or Information T1027, PowerShell T1059.001, SMB/Windows Admin Shares T1021.002
match: && 4 rules
Obfuscated Files or Information T1027, PowerShell T1059.001, Windows Service T1543.003
match: /c 4 rules
Obfuscated Files or Information T1027, PowerShell T1059.001, Token Impersonation/Theft T1134.001, Create Process with Token T1134.002
match: rundll32 3 rules
Obfuscated Files or Information T1027, PowerShell T1059.001, Token Impersonation/Theft T1134.001, Create Process with Token T1134.002, Windows Service T1543.003
match: %COMSPEC% 2 rules
SMB/Windows Admin Shares T1021.002, Windows Service T1543.003, Service Execution T1569.002, Token Impersonation/Theft T1134.001, Create Process with Token T1134.002
match: -f 2 rules
Obfuscated Files or Information T1027, PowerShell T1059.001
match: /r 2 rules
Obfuscated Files or Information T1027, PowerShell T1059.001
match: input 2 rules
Obfuscated Files or Information T1027, PowerShell T1059.001
match: invoke 2 rules
Obfuscated Files or Information T1027, PowerShell T1059.001
match: mshta 2 rules
Obfuscated Files or Information T1027, PowerShell T1059.001, Windows Service T1543.003
match: pwsh 2 rules
Service Execution T1569.002, Windows Service T1543.003
match: shell32.dll 2 rules
Obfuscated Files or Information T1027, PowerShell T1059.001
match: shellexec_rundll 2 rules
Obfuscated Files or Information T1027, PowerShell T1059.001

ParentCommandLine 14 entries

match: :\Users\ 3 rules
Compile After Delivery T1027.004, Visual Basic T1059.005, JavaScript T1059.007, Mshta T1218.005, Active Scanning T1595, Rundll32 T1218.011
ends_with: tunnel 2 rules
Web Protocols T1071.001, Remote Access Tools T1219
eq: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule 2 rules
Bypass User Account Control T1548.002
match: .lnk 2 rules
Active Scanning T1595, Malicious File T1204.002
match: :\Users\Public\ 2 rules
Compile After Delivery T1027.004, Visual Basic T1059.005, JavaScript T1059.007, Mshta T1218.005, Active Scanning T1595
match: :\Windows\Temp\ 2 rules
Compile After Delivery T1027.004, Visual Basic T1059.005, JavaScript T1059.007, Mshta T1218.005, Active Scanning T1595
match: JwB7ACIAZgBhAGkAbABlAGQAIgA6AHQAcgB1AGUALAAiAG0AcwBnACIAOgAiAEEAbgBzAGkAYgBsAGUAIAByAGUAcQB1AGkAcgBlAHMAIABQAG8AdwBlAHIAUwBoAGUAbABsACAAdgAzAC4AMAAgAG8AcgAgAG4AZQB3AGUAcgAiAH0AJw 2 rules
Compile After Delivery T1027.004, Visual Basic T1059.005, JavaScript T1059.007, Mshta T1218.005
match: \Contacts\ 2 rules
Compile After Delivery T1027.004, Visual Basic T1059.005, JavaScript T1059.007, Mshta T1218.005, Active Scanning T1595
match: \Favorites\ 2 rules
Compile After Delivery T1027.004, Visual Basic T1059.005, JavaScript T1059.007, Mshta T1218.005, Active Scanning T1595
match: \Favourites\ 2 rules
Compile After Delivery T1027.004, Visual Basic T1059.005, JavaScript T1059.007, Mshta T1218.005, Active Scanning T1595
match: \ProgramData\Microsoft\Windows Defender Advanced Threat Protection 2 rules
Compile After Delivery T1027.004, Visual Basic T1059.005, JavaScript T1059.007, Mshta T1218.005
match: \Temporary Internet 2 rules
Compile After Delivery T1027.004, Visual Basic T1059.005, JavaScript T1059.007, Mshta T1218.005, Active Scanning T1595
match: cAewAiAGYAYQBpAGwAZQBkACIAOgB0AHIAdQBlACwAIgBtAHMAZwAiADoAIgBBAG4AcwBpAGIAbABlACAAcgBlAHEAdQBpAHIAZQBzACAAUABvAHcAZQByAFMAaABlAGwAbAAgAHYAMwAuADAAIABvAHIAIABuAGUAdwBlAHIAIgB9ACcA 2 rules
Compile After Delivery T1027.004, Visual Basic T1059.005, JavaScript T1059.007, Mshta T1218.005
match: nAHsAIgBmAGEAaQBsAGUAZAAiADoAdAByAHUAZQAsACIAbQBzAGcAIgA6ACIAQQBuAHMAaQBiAGwAZQAgAHIAZQBxAHUAaQByAGUAcwAgAFAAbwB3AGUAcgBTAGgAZQBsAGwAIAB2ADMALgAwACAAbwByACAAbgBlAHcAZQByACIAfQAnA 2 rules
Compile After Delivery T1027.004, Visual Basic T1059.005, JavaScript T1059.007, Mshta T1218.005

file.name 14 entries

wildcard: FssagentRpc 2 rules
Forced Authentication T1187, Adversary-in-the-Middle T1557, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001, Use Alternate Authentication Material T1550
wildcard: Spoolss 2 rules
Forced Authentication T1187, Adversary-in-the-Middle T1557, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001, Use Alternate Authentication Material T1550
wildcard: WinsPipe 2 rules
Forced Authentication T1187, Adversary-in-the-Middle T1557, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001, Use Alternate Authentication Material T1550
wildcard: dhcpserver 2 rules
Forced Authentication T1187, Adversary-in-the-Middle T1557, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001, Use Alternate Authentication Material T1550
wildcard: dnsserver 2 rules
Forced Authentication T1187, Adversary-in-the-Middle T1557, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001, Use Alternate Authentication Material T1550
wildcard: efsrpc 2 rules
Forced Authentication T1187, Adversary-in-the-Middle T1557, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001, Use Alternate Authentication Material T1550
wildcard: eventlog 2 rules
Forced Authentication T1187, Adversary-in-the-Middle T1557, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001, Use Alternate Authentication Material T1550
wildcard: lsarpc 2 rules
Forced Authentication T1187, Adversary-in-the-Middle T1557, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001, Use Alternate Authentication Material T1550
wildcard: lsass 2 rules
Forced Authentication T1187, Adversary-in-the-Middle T1557, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001, Use Alternate Authentication Material T1550
wildcard: netdfs 2 rules
Forced Authentication T1187, Adversary-in-the-Middle T1557, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001, Use Alternate Authentication Material T1550
wildcard: netlogon 2 rules
Forced Authentication T1187, Adversary-in-the-Middle T1557, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001, Use Alternate Authentication Material T1550
wildcard: samr 2 rules
Forced Authentication T1187, Adversary-in-the-Middle T1557, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001, Use Alternate Authentication Material T1550
wildcard: srvsvc 2 rules
Forced Authentication T1187, Adversary-in-the-Middle T1557, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001, Use Alternate Authentication Material T1550
wildcard: winreg 2 rules
Forced Authentication T1187, Adversary-in-the-Middle T1557, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001, Use Alternate Authentication Material T1550

src_ip 12 entries

eq: 127.0.0.1 5 rules
Remote Desktop Protocol T1021.001, Abuse Elevation Control Mechanism T1548, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001, Network Service Discovery T1046, Windows Remote Management T1021.006, PowerShell T1059.001
eq: ::1 5 rules
Remote Desktop Protocol T1021.001, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001, Forced Authentication T1187, SMB/Windows Admin Shares T1021.002, Windows Remote Management T1021.006, PowerShell T1059.001
cidr_match: 127.0.0.0/8 4 rules
Valid Accounts T1078, External Remote Services T1133, Brute Force T1110, Exploit Public-Facing Application T1190, SMB/Windows Admin Shares T1021.002
cidr_match: 169.254.0.0/16 4 rules
Valid Accounts T1078, External Remote Services T1133, Brute Force T1110, Exploit Public-Facing Application T1190, SMB/Windows Admin Shares T1021.002
cidr_match: ::1/128 4 rules
Valid Accounts T1078, External Remote Services T1133, Brute Force T1110, Exploit Public-Facing Application T1190, SMB/Windows Admin Shares T1021.002
cidr_match: fc00::/7 4 rules
Valid Accounts T1078, External Remote Services T1133, Brute Force T1110, Exploit Public-Facing Application T1190, SMB/Windows Admin Shares T1021.002
cidr_match: fe80::/10 4 rules
Valid Accounts T1078, External Remote Services T1133, Brute Force T1110, Exploit Public-Facing Application T1190, SMB/Windows Admin Shares T1021.002
cidr_match: 10.0.0.0/8 3 rules
Valid Accounts T1078, External Remote Services T1133, Brute Force T1110, Exploit Public-Facing Application T1190
cidr_match: 172.16.0.0/12 3 rules
Valid Accounts T1078, External Remote Services T1133, Brute Force T1110, Exploit Public-Facing Application T1190
cidr_match: 192.168.0.0/16 3 rules
Valid Accounts T1078, External Remote Services T1133, Brute Force T1110, Exploit Public-Facing Application T1190
eq: - 2 rules
Valid Accounts T1078, Brute Force T1110, External Remote Services T1133
ne: "-" 2 rules
Password Spraying T1110.003

registry_path 12 entries

eq: "*\\Microsoft\\Windows Defender\\SpyNet*" 3 rules
Disable or Modify Tools T1562.001
eq: "*\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\*" 3 rules
Modify Registry T1112
eq: "*Microsoft\\Windows NT\\CurrentVersion\\Image File Execution Options*" 2 rules
Registry Run Keys / Startup Folder T1547.001, Image File Execution Options Injection T1546.012
eq: "*SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon*" 2 rules
Credentials in Registry T1552.002
eq: "*USBSTOR*" 2 rules
Data from Removable Media T1025, Replication Through Removable Media T1091, Hardware Additions T1200
eq: "*\\Control\\Terminal Server\\fDenyTSConnections*" 2 rules
Modify Registry T1112, Remote Desktop Protocol T1021.001
eq: "*\\InProcServer32\\*" 2 rules
Modify Registry T1112, Phishing T1566
eq: "*\\Microsoft\\Terminal Server Client\\Servers\\*" 2 rules
File Deletion T1070.004, Remote Desktop Protocol T1021.001
eq: "*\\SYSTEM\\CurrentControlSet\\Services*" 2 rules
Services Registry Permissions Weakness T1574.011, Service Stop T1489
eq: "*\\System\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\FirewallRules\\*" 2 rules
Remote Desktop Protocol T1021.001, Modify Registry T1112
in: "HKLM\\SOFTWARE\\Microsoft\\Windows Portable Devices\\Devices\\*" 2 rules
Data from Removable Media T1025, Replication Through Removable Media T1091, Hardware Additions T1200
in: "HKLM\\System\\CurrentControlSet\\Enum\\SWD\\WPDBUSENUM\\*" 2 rules
Data from Removable Media T1025, Replication Through Removable Media T1091, Hardware Additions T1200

EventType 11 entries

eq: deleted 8 rules
Modify Registry T1112, Disable or Modify Tools T1562.001, Modify Authentication Process T1556, File Deletion T1070.004, Scheduled Task T1053.005, Impair Defenses T1562
eq: logged-in 7 rules
Create or Modify System Process T1543, Windows Service T1543.003, Valid Accounts T1078, Brute Force T1110, Password Guessing T1110.001, Password Spraying T1110.003
eq: DeleteValue 5 rules
Modify Registry T1112, Screen Capture T1113, Disable or Modify Tools T1562.001, Indicator Removal T1070, Registry Run Keys / Startup Folder T1547.001
eq: modified 5 rules
Modify Registry T1112, Modify Authentication Process T1556, Port Monitors T1547.010, Service Stop T1489
in: "ConnectPipe" 4 rules
Application Layer Protocol T1071, Inter-Process Communication T1559
in: "CreatePipe" 4 rules
Application Layer Protocol T1071, Inter-Process Communication T1559
eq: SetValue 3 rules
Stage Capabilities T1608, Boot or Logon Autostart Execution T1547, Change Default File Association T1546.001, Bypass User Account Control T1548.002
eq: logon-failed 3 rules
Brute Force T1110, Password Guessing T1110.001, Password Spraying T1110.003
eq: scheduled-task-created 3 rules
Scheduled Task/Job T1053, Scheduled Task T1053.005, Remote Services T1021
eq: CreateKey 2 rules
Modify Registry T1112, Disable Windows Event Logging T1562.002
eq: service-installed 2 rules
Create or Modify System Process T1543, Windows Service T1543.003, Remote Services T1021, SMB/Windows Admin Shares T1021.002, System Services T1569, Service Execution T1569.002

IntegrityLevel 10 entries

eq: S-1-16-16384 21 rules
Bypass User Account Control T1548.002, Msiexec T1218.007, Match Legitimate Resource Name or Location T1036.005, Scheduled Task T1053.005, Exploitation for Privilege Escalation T1068, Exploitation for Client Execution T1203
eq: System 21 rules
Bypass User Account Control T1548.002, Msiexec T1218.007, Match Legitimate Resource Name or Location T1036.005, Scheduled Task T1053.005, Exploitation for Privilege Escalation T1068, Exploitation for Client Execution T1203
eq: High 16 rules
Bypass User Account Control T1548.002, Indirect Command Execution T1202, CMSTP T1218.003
eq: S-1-16-12288 16 rules
Bypass User Account Control T1548.002, Indirect Command Execution T1202, CMSTP T1218.003
eq: Medium 3 rules
Services Registry Permissions Weakness T1574.011, Modify Registry T1112
eq: S-1-16-8192 3 rules
Services Registry Permissions Weakness T1574.011, Modify Registry T1112
in: "low" 3 rules
Exploitation for Privilege Escalation T1068, Access Token Manipulation T1134, Abuse Elevation Control Mechanism T1548, Bypass User Account Control T1548.002
in: "medium" 3 rules
Exploitation for Privilege Escalation T1068, Access Token Manipulation T1134, Abuse Elevation Control Mechanism T1548, Bypass User Account Control T1548.002
eq: "system" 2 rules
Exploitation for Privilege Escalation T1068, Access Token Manipulation T1134, Abuse Elevation Control Mechanism T1548
in: "high" 2 rules
Exploitation for Privilege Escalation T1068, Access Token Manipulation T1134, Abuse Elevation Control Mechanism T1548

user 10 entries

ends_with: $ 18 rules
SMB/Windows Admin Shares T1021.002, Forced Authentication T1187, Adversary-in-the-Middle T1557, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001, Domain Account T1087.002, DCSync T1003.006
match: AUTHORI 16 rules
LSASS Memory T1003.001, File Deletion T1070.004, Scheduled Task T1053.005, Abuse Elevation Control Mechanism T1548, Bypass User Account Control T1548.002, Create Process with Token T1134.002
match: AUTORI 16 rules
LSASS Memory T1003.001, File Deletion T1070.004, Scheduled Task T1053.005, Abuse Elevation Control Mechanism T1548, Bypass User Account Control T1548.002, Create Process with Token T1134.002
ne: *$ 10 rules
Password Spraying T1110.003
ne: "*$" 7 rules
Valid Accounts T1078, Password Spraying T1110.003, Email Addresses T1589.002, Domain Accounts T1078.002, Network Share Discovery T1135, Security Account Manager T1003.002
eq: ANONYMOUS LOGON 3 rules
Pass the Hash T1550.002, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001, Forced Authentication T1187
starts_with: MSOL_ 3 rules
DCSync T1003.006, Domain Account T1087.002
eq: "*$" 2 rules
DCSync T1003.006, Steal or Forge Kerberos Tickets T1558
eq: "ANONYMOUS LOGON" 2 rules
Exploitation of Remote Services T1210, Forced Authentication T1187
eq: HomeGroupUser$ 2 rules
Local Account T1136.001, Masquerading T1036

ServiceFileName 10 entries

match: cmd 5 rules
Obfuscated Files or Information T1027, PowerShell T1059.001, Token Impersonation/Theft T1134.001, Create Process with Token T1134.002
match: powershell 4 rules
Service Execution T1569.002, Obfuscated Files or Information T1027, PowerShell T1059.001, SMB/Windows Admin Shares T1021.002, Windows Service T1543.003
match: && 3 rules
Obfuscated Files or Information T1027, PowerShell T1059.001
match: /c 3 rules
Obfuscated Files or Information T1027, PowerShell T1059.001, Token Impersonation/Theft T1134.001, Create Process with Token T1134.002
match: %COMSPEC% 2 rules
SMB/Windows Admin Shares T1021.002, Windows Service T1543.003, Service Execution T1569.002, Token Impersonation/Theft T1134.001, Create Process with Token T1134.002
match: -f 2 rules
Obfuscated Files or Information T1027, PowerShell T1059.001
match: invoke 2 rules
Obfuscated Files or Information T1027, PowerShell T1059.001
match: rundll32 2 rules
Obfuscated Files or Information T1027, PowerShell T1059.001, Token Impersonation/Theft T1134.001, Create Process with Token T1134.002
match: shell32.dll 2 rules
Obfuscated Files or Information T1027, PowerShell T1059.001
match: shellexec_rundll 2 rules
Obfuscated Files or Information T1027, PowerShell T1059.001

Provider_Name 8 entries

eq: Service Control Manager 43 rules
Windows Service T1543.003, Service Execution T1569.002, Obfuscated Files or Information T1027, PowerShell T1059.001, SMB/Windows Admin Shares T1021.002, Remote Desktop Software T1219.002
eq: MsiInstaller 4 rules
Service Stop T1489, System Binary Proxy Execution T1218, Msiexec T1218.007, Remote Desktop Software T1219.002
eq: Microsoft-Windows-Eventlog 3 rules
Clear Windows Event Logs T1070.001
eq: Microsoft-Windows-Sysmon 3 rules
Process Injection T1055, Trusted Developer Utilities Proxy Execution T1127, MSBuild T1127.001, Indicator Removal T1070, Timestomp T1070.006, Access Token Manipulation T1134
eq: Application Error 2 rules
LSASS Memory T1003.001, Exploitation for Defense Evasion T1211, Disable or Modify Tools T1562.001
eq: ESENT 2 rules
NTDS T1003.003
eq: Microsoft-Windows-DHCP-Server 2 rules
DLL T1574.001
eq: ScreenConnect 2 rules
Windows Command Shell T1059.003

Description 8 entries

eq: GnuPG’s OpenPGP tool 4 rules
Data Encrypted for Impact T1486
eq: AnyDesk 3 rules
Remote Desktop Software T1219.002
eq: Command line RAR 3 rules
Archive via Utility T1560.001, Command and Scripting Interpreter T1059
eq: Active Directory Editor 2 rules
Domain Groups T1069.002, Domain Account T1087.002, Domain Trust Discovery T1482
eq: System activity monitor 2 rules
Disable or Modify Tools T1562.001
eq: Windows PowerShell 2 rules
PowerShell T1059.001, Obfuscated Files or Information T1027, Deobfuscate/Decode Files or Information T1140
match: 7-Zip 2 rules
Archive via Utility T1560.001
match: st2stager 2 rules
Application Layer Protocol T1071

Product 8 entries

eq: AnyDesk 3 rules
Remote Desktop Software T1219.002
eq: Node.js 2 rules
JavaScript T1059.007
eq: Ping Castle 2 rules
Active Scanning T1595
eq: PowerShell Core 6 2 rules
PowerShell T1059.001, Obfuscated Files or Information T1027, Deobfuscate/Decode Files or Information T1140
eq: Remote Utilities 2 rules
eq: SQLite 2 rules
Data from Local System T1005, Steal Web Session Cookie T1539, Credentials from Web Browsers T1555.003
eq: Sysinternals ADExplorer 2 rules
Domain Groups T1069.002, Domain Account T1087.002, Domain Trust Discovery T1482
match: NetSupport Remote Control 2 rules

LogonType 7 entries

eq: 3 12 rules
Valid Accounts T1078, Steal or Forge Kerberos Tickets T1558, Password Spraying T1110.003, Pass the Hash T1550.002, Brute Force T1110, External Remote Services T1133
eq: 9 5 rules
Pass the Hash T1550.002, Token Impersonation/Theft T1134.001, Use Alternate Authentication Material T1550
eq: 10 4 rules
Remote Desktop Protocol T1021.001, Default Accounts T1078.001, Domain Accounts T1078.002, Local Accounts T1078.003, Valid Accounts T1078, Brute Force T1110
eq: Network 4 rules
Brute Force T1110, Password Guessing T1110.001, Password Spraying T1110.003, Adversary-in-the-Middle T1557, Forced Authentication T1187, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
wildcard: Network 3 rules
Brute Force T1110, Password Guessing T1110.001, Password Spraying T1110.003, Remote Services T1021, SMB/Windows Admin Shares T1021.002, Create or Modify System Process T1543
eq: 2 2 rules
Password Spraying T1110.003
wildcard: network 2 rules
Forced Authentication T1187, Adversary-in-the-Middle T1557, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001, Use Alternate Authentication Material T1550

ObjectType 7 entries

eq: File 5 rules
Spearphishing Attachment T1566.001, Shortcut Modification T1547.009, OS Credential Dumping T1003, SMB/Windows Admin Shares T1021.002, Transfer Data to Cloud Account T1537
eq: Key 3 rules
Query Registry T1012, Credentials in Registry T1552.002
eq: SAM_GROUP 2 rules
Domain Account T1087.002, Domain Groups T1069.002
eq: SAM_USER 2 rules
Domain Account T1087.002, Domain Groups T1069.002
eq: SC_MANAGER OBJECT 2 rules
Application Window Discovery T1010, Abuse Elevation Control Mechanism T1548
in: "%{19195a5b-6da0-11d0-afd3-00c04fd930c9}" 2 rules
DCSync T1003.006
in: "domainDNS" 2 rules
DCSync T1003.006

AttributeLDAPDisplayName 6 entries

eq: servicePrincipalName 6 rules
Account Manipulation T1098, Rogue Domain Controller T1207, Steal or Forge Kerberos Tickets T1558, Kerberoasting T1558.003
eq: gPCMachineExtensionNames 4 rules
Group Policy Modification T1484.001, Scheduled Task T1053.005, Boot or Logon Autostart Execution T1547, Windows File and Directory Permissions Modification T1222.001
wildcard: gPCMachineExtensionNames 3 rules
Domain or Tenant Policy Modification T1484, Group Policy Modification T1484.001, Boot or Logon Initialization Scripts T1037, Boot or Logon Autostart Execution T1547, Scheduled Task/Job T1053, Scheduled Task T1053.005
eq: msDS-KeyCredentialLink 2 rules
Modify Authentication Process T1556, Account Manipulation T1098
eq: gPCUserExtensionNames 2 rules
Scheduled Task T1053.005, Group Policy Modification T1484.001, Boot or Logon Autostart Execution T1547
wildcard: gPCUserExtensionNames 2 rules
Domain or Tenant Policy Modification T1484, Group Policy Modification T1484.001, Boot or Logon Initialization Scripts T1037, Boot or Logon Autostart Execution T1547, Scheduled Task/Job T1053, Scheduled Task T1053.005

ShareName 6 entries

eq: \\\\\*\\IPC$ 6 rules
SMB/Windows Admin Shares T1021.002, At T1053.002
in: "\\\\*\\C$" 3 rules
SMB/Windows Admin Shares T1021.002, Transfer Data to Cloud Account T1537, Network Share Discovery T1135
ends_with: \SYSVOL 2 rules
Scheduled Task T1053.005, Group Policy Modification T1484.001, Boot or Logon Autostart Execution T1547
in: "\\\\*\\IPC$" 2 rules
SMB/Windows Admin Shares T1021.002, Transfer Data to Cloud Account T1537
in: "\\\\*\\admin$" 2 rules
SMB/Windows Admin Shares T1021.002, Transfer Data to Cloud Account T1537
wildcard: \\*\SYSVOL 2 rules
Domain or Tenant Policy Modification T1484, Group Policy Modification T1484.001, Boot or Logon Initialization Scripts T1037, Boot or Logon Autostart Execution T1547, Scheduled Task/Job T1053, Scheduled Task T1053.005

Channel 6 entries

eq: Microsoft-Windows-PowerShell/Operational 2 rules
Clear Windows Event Logs T1070.001
eq: Microsoft-Windows-Sysmon/Operational 2 rules
Clear Windows Event Logs T1070.001
eq: PowerShellCore/Operational 2 rules
Clear Windows Event Logs T1070.001
eq: Security 2 rules
Clear Windows Event Logs T1070.001
eq: System 2 rules
Clear Windows Event Logs T1070.001
eq: Windows PowerShell 2 rules
Clear Windows Event Logs T1070.001

Data 6 entries

match: EngineVersion=2. 2 rules
PowerShell T1059.001
match: MsMpEng.exe 2 rules
Exploitation for Defense Evasion T1211, Disable or Modify Tools T1562.001
match: \Desktop\ 2 rules
match: \Users\Public\ 2 rules
match: mpengine.dll 2 rules
Exploitation for Defense Evasion T1211, Disable or Modify Tools T1562.001
match: ntds.dit 2 rules
NTDS T1003.003

TaskName 6 entries

match: \Windows\BitLocker 2 rules
Scheduled Task T1053.005, Service Stop T1489
match: \Windows\ExploitGuard 2 rules
Scheduled Task T1053.005, Service Stop T1489
match: \Windows\SystemRestore\SR 2 rules
Scheduled Task T1053.005, Service Stop T1489
match: \Windows\Windows Defender\ 2 rules
Scheduled Task T1053.005, Service Stop T1489
match: \Windows\WindowsBackup\ 2 rules
Scheduled Task T1053.005, Service Stop T1489
match: \Windows\WindowsUpdate\ 2 rules
Scheduled Task T1053.005, Service Stop T1489

ObjectClass 5 entries

eq: groupPolicyContainer 4 rules
Group Policy Modification T1484.001, Windows File and Directory Permissions Modification T1222.001, Domain Accounts T1078.002
eq: user 4 rules
Account Manipulation T1098, Steal or Forge Kerberos Tickets T1558, Kerberoasting T1558.003, Windows File and Directory Permissions Modification T1222.001, Domain or Tenant Policy Modification T1484
eq: domainDNS 4 rules
Domain or Tenant Policy Modification T1484, Windows File and Directory Permissions Modification T1222.001, Rogue Domain Controller T1207
eq: dnsNode 3 rules
Account Manipulation T1098, DHCP Spoofing T1557.003, Adversary-in-the-Middle T1557, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
eq: "dnsNode" 2 rules
DNS T1071.004, Forced Authentication T1187, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001

RelativeTargetName 5 entries

eq: lsarpc 3 rules
Forced Authentication T1187, SMB/Windows Admin Shares T1021.002
eq: atsvc 2 rules
At T1053.002, SMB/Windows Admin Shares T1021.002
eq: protected_storage 2 rules
SMB/Windows Admin Shares T1021.002
eq: spoolss 2 rules
SMB/Windows Admin Shares T1021.002
eq: svcctl 2 rules
SMB/Windows Admin Shares T1021.002

Status 5 entries

eq: 0x6 3 rules
Password Spraying T1110.003, Email Addresses T1589.002
eq: 0x12 2 rules
Password Spraying T1110.003
eq: 0x18 2 rules
Password Spraying T1110.003
eq: 0xC000006A 2 rules
Password Spraying T1110.003
eq: 0xc0000064 2 rules
Password Spraying T1110.003

AuditPolicyChanges 5 entries

in: "%%8448" 2 rules
Disable or Modify Tools T1562.001
in: "%%8448, %%8450" 2 rules
Disable or Modify Tools T1562.001
in: "%%8450" 2 rules
Disable or Modify Tools T1562.001
match: %%8448 2 rules
Disable Windows Event Logging T1562.002
match: %%8450 2 rules
Disable Windows Event Logging T1562.002

CallTrace 5 entries

match: UNKNOWN 2 rules
Thread Execution Hijacking T1055.003, Malicious File T1204.002, Disable Windows Event Logging T1562.002
match: dbgcore.dll 2 rules
LSASS Memory T1003.001, Disable or Modify Tools T1562.001
match: dbghelp.dll 2 rules
LSASS Memory T1003.001, Disable or Modify Tools T1562.001
match: |UNKNOWN( 2 rules
LSASS Memory T1003.001, Native API T1106
wildcard: *UNKNOWN* 2 rules
OS Credential Dumping T1003, LSASS Memory T1003.001, Process Injection T1055, Process Hollowing T1055.012

AccessMask 4 entries

eq: 0x100 3 rules
DCSync T1003.006, OS Credential Dumping T1003, Valid Accounts T1078, Domain Accounts T1078.002
eq: "0x100" 2 rules
DCSync T1003.006
eq: "0x2" 2 rules
SMB/Windows Admin Shares T1021.002, Transfer Data to Cloud Account T1537
eq: 0x2 2 rules
LSA Secrets T1003.004, SMB/Windows Admin Shares T1021.002

AuthenticationPackageName 4 entries

eq: Negotiate 3 rules
Token Impersonation/Theft T1134.001, Default Accounts T1078.001, Domain Accounts T1078.002, Local Accounts T1078.003, Pass the Hash T1550.002
eq: Kerberos 2 rules
Abuse Elevation Control Mechanism T1548, Steal or Forge Kerberos Tickets T1558
eq: NTLM 2 rules
SMB/Windows Admin Shares T1021.002, Forced Authentication T1187, Adversary-in-the-Middle T1557, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001
wildcard: Kerberos 2 rules
Adversary-in-the-Middle T1557, Forced Authentication T1187, Use Alternate Authentication Material T1550, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001, Create or Modify System Process T1543, Windows Service T1543.003

ModifyingApplication 4 entries

ends_with: \MsMpEng.exe 2 rules
Disable or Modify System Firewall T1562.004
eq: C:\Windows\System32\svchost.exe 2 rules
Disable or Modify System Firewall T1562.004
starts_with: C:\ProgramData\Microsoft\Windows Defender\Platform\ 2 rules
Disable or Modify System Firewall T1562.004
starts_with: C:\Windows\WinSxS\ 2 rules
Disable or Modify System Firewall T1562.004

ObjectName 4 entries

ends_with: -500 2 rules
Domain Account T1087.002, Domain Groups T1069.002
ends_with: -512 2 rules
Domain Account T1087.002, Domain Groups T1069.002
ends_with: \lsass.exe 2 rules
LSASS Memory T1003.001
match: \Microsoft\Windows Defender\Exclusions\ 2 rules
Disable or Modify Tools T1562.001

event.category 3 entries

eq: authentication 5 rules
Brute Force T1110, Password Guessing T1110.001, Password Spraying T1110.003, Valid Accounts T1078, Use Alternate Authentication Material T1550, Pass the Hash T1550.002
eq: iam 2 rules
Scheduled Task/Job T1053, Scheduled Task T1053.005, Access Token Manipulation T1134
eq: process 2 rules
OS Credential Dumping T1003, LSASS Memory T1003.001, Masquerading T1036, Rename Legitimate Utilities T1036.003, System Binary Proxy Execution T1218, Rundll32 T1218.011

AccessList 3 entries

match: WriteData 4 rules
At T1053.002, Scheduled Task T1053.005, Shortcut Modification T1547.009, SMB/Windows Admin Shares T1021.002
match: %%4417 3 rules
Scheduled Task T1053.005, Group Policy Modification T1484.001, Boot or Logon Autostart Execution T1547, Disable or Modify Tools T1562.001
wildcard: *%%4417* 2 rules
Domain or Tenant Policy Modification T1484, Group Policy Modification T1484.001, Boot or Logon Initialization Scripts T1037, Boot or Logon Autostart Execution T1547, Scheduled Task/Job T1053, Scheduled Task T1053.005

TicketOptions 3 entries

eq: 0x40810000 3 rules
Kerberoasting T1558.003, Golden Ticket T1558.001
eq: 0x40800000 2 rules
Kerberoasting T1558.003, Golden Ticket T1558.001
eq: 0x40810010 2 rules
Kerberoasting T1558.003, Golden Ticket T1558.001

Changes 3 entries

in: "Failure removed" 2 rules
Disable or Modify Tools T1562.001
in: "Success removed" 2 rules
Disable or Modify Tools T1562.001
in: "Success removed, Failure removed" 2 rules
Disable or Modify Tools T1562.001

Payload 3 entries

match: && 2 rules
Obfuscated Files or Information T1027, PowerShell T1059.001
match: shell32.dll 2 rules
Obfuscated Files or Information T1027, PowerShell T1059.001
match: shellexec_rundll 2 rules
Obfuscated Files or Information T1027, PowerShell T1059.001

Signed 2 entries

eq: false 8 rules
DLL T1574.001, LSASS Memory T1003.001, Match Legitimate Resource Name or Location T1036.005, Shared Modules T1129, MMC T1218.014, Bypass User Account Control T1548.002
eq: true 8 rules
DLL T1574.001, Regsvr32 T1218.010, Rundll32 T1218.011

source.ip 2 entries

ne: 127.0.0.1 8 rules
Forced Authentication T1187, Adversary-in-the-Middle T1557, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001, Remote Services T1021, SMB/Windows Admin Shares T1021.002, Brute Force T1110
ne: ::1 7 rules
Forced Authentication T1187, Adversary-in-the-Middle T1557, LLMNR/NBT-NS Poisoning and SMB Relay T1557.001, Remote Services T1021, SMB/Windows Admin Shares T1021.002, Brute Force T1110

Esql.script_block_length 2 entries

gt: 500 6 rules
Obfuscated Files or Information T1027, Command Obfuscation T1027.010, Command and Scripting Interpreter T1059, PowerShell T1059.001, Deobfuscate/Decode Files or Information T1140
gt: 1000 2 rules
Obfuscated Files or Information T1027, Command Obfuscation T1027.010, Command and Scripting Interpreter T1059, PowerShell T1059.001, Deobfuscate/Decode Files or Information T1140

Esql.script_block_pattern_count 2 entries

ge: 1 6 rules
Obfuscated Files or Information T1027, Command Obfuscation T1027.010, Command and Scripting Interpreter T1059, PowerShell T1059.001, Deobfuscate/Decode Files or Information T1140
ge: 2 2 rules
Obfuscated Files or Information T1027, Command Obfuscation T1027.010, Command and Scripting Interpreter T1059, PowerShell T1059.001, Deobfuscate/Decode Files or Information T1140

OperationType 2 entries

eq: %%14674 4 rules
Account Manipulation T1098, Steal or Forge Kerberos Tickets T1558, Kerberoasting T1558.003, Exploitation for Privilege Escalation T1068, Windows File and Directory Permissions Modification T1222.001, Use Alternate Authentication Material T1550
eq: "%%14674" 3 rules
Group Policy Modification T1484.001, Disable or Modify Tools T1562.001, Account Manipulation T1098, SID-History Injection T1134.005

SignatureStatus 2 entries

eq: Valid 4 rules
DLL T1574.001, Regsvr32 T1218.010, Rundll32 T1218.011
ne: Valid 2 rules
DLL T1574.001, Boot or Logon Autostart Execution T1547

Company 2 entries

eq: AnyDesk Software GmbH 3 rules
Remote Desktop Software T1219.002
eq: LogMeIn, Inc. 2 rules
Remote Desktop Software T1219.002

TargetName 2 entries

match: Microsoft_Windows_Shell_ZipFolder:filename 3 rules
Obfuscated Files or Information T1027, Masquerading T1036, Ingress Tool Transfer T1105, Spearphishing Attachment T1566.001
match: \Temporary Internet Files\Content.Outlook 2 rules
Obfuscated Files or Information T1027, Spearphishing Attachment T1566.001

event_action 2 entries

eq: "created" 3 rules
Masquerading T1036, Spearphishing Link T1566.002, AppDomainManager T1574.014
eq: created 2 rules
Spearphishing Attachment T1566.001

user.id 2 entries

wildcard: S-1-12-1-* 3 rules
Use Alternate Authentication Material T1550, Pass the Hash T1550.002, Access Token Manipulation T1134, Create Process with Token T1134.002, Make and Impersonate Token T1134.003, Exploitation for Privilege Escalation T1068
wildcard: S-1-5-21-* 3 rules
Use Alternate Authentication Material T1550, Pass the Hash T1550.002, Access Token Manipulation T1134, Create Process with Token T1134.002, Make and Impersonate Token T1134.003, Exploitation for Privilege Escalation T1068

Attributes 2 entries

eq: "*CertificateTemplate:*" 2 rules
Steal or Forge Authentication Certificates T1649, Use Alternate Authentication Material T1550
eq: "*SAN:*upn*" 2 rules
Steal or Forge Authentication Certificates T1649, Use Alternate Authentication Material T1550

LogonId 2 entries

eq: 0x3e4 2 rules
Application Window Discovery T1010, Abuse Elevation Control Mechanism T1548
eq: 0x3e7 2 rules
Command and Scripting Interpreter T1059, Windows Management Instrumentation T1047

ParentUser 2 entries

match: AUTHORI 2 rules
Create Process with Token T1134.002, LSASS Memory T1003.001
match: AUTORI 2 rules
Create Process with Token T1134.002, LSASS Memory T1003.001

Path 2 entries

match: \Desktop\ 2 rules
Scheduled Task T1053.005
match: \Downloads\ 2 rules
Scheduled Task T1053.005

TargetUserSid 2 entries

ends_with: -500 2 rules
Abuse Elevation Control Mechanism T1548
starts_with: S-1-5-21- 2 rules
Abuse Elevation Control Mechanism T1548

aceType 2 entries

in: "Access denied" 2 rules
Windows File and Directory Permissions Modification T1222.001, Domain or Tenant Policy Modification T1484
in: D 2 rules
Windows File and Directory Permissions Modification T1222.001, Domain or Tenant Policy Modification T1484

isutility 2 entries

eq: TRUE 2 rules
Remote Access Tools T1219
eq: True 2 rules
Remote Access Tools T1219

registry_value_name 2 entries

eq: "(Default)" 2 rules
Bypass User Account Control T1548.002
eq: "FriendlyName" 2 rules
Data from Removable Media T1025, Replication Through Removable Media T1091, Hardware Additions T1200

Initiated 1 entries

eq: true 40 rules
Protocol Tunneling T1572, Ingress Tool Transfer T1105, Web Service T1102, Exfiltration Over Web Service T1567, Remote Desktop Protocol T1021.001, Dead Drop Resolver T1102.001

isOutlier 1 entries

eq: 1 16 rules
Password Spraying T1110.003, Account Manipulation T1098, Impair Defenses T1562, Service Execution T1569.002, Transfer Data to Cloud Account T1537, Email Addresses T1589.002

event.outcome 1 entries

eq: success 8 rules
Create or Modify System Process T1543, Windows Service T1543.003, Valid Accounts T1078, Access Token Manipulation T1134, Use Alternate Authentication Material T1550, Pass the Hash T1550.002

unique_accounts 1 entries

gt: 30 8 rules
Password Spraying T1110.003

TicketEncryptionType 1 entries

eq: 0x17 7 rules
Kerberoasting T1558.003, Golden Ticket T1558.001, Use Alternate Authentication Material T1550

unique_targets 1 entries

gt: 30 5 rules
Network Share Discovery T1135, Valid Accounts T1078, Credential Stuffing T1110.004, Security Account Manager T1003.002, SMB/Windows Admin Shares T1021.002, Account Discovery T1087

short_lived 1 entries

eq: TRUE 4 rules
Scheduled Task T1053.005, Domain Accounts T1078.002, Account Manipulation T1098, Rogue Domain Controller T1207

LogonProcessName 1 entries

eq: seclogo 3 rules
Pass the Hash T1550.002, Use Alternate Authentication Material T1550

SourcePort 1 entries

eq: 3389 3 rules
Remote Desktop Protocol T1021.001, Protocol Tunneling T1572, Internal Proxy T1090.001, External Proxy T1090.002

admonEventType 1 entries

eq: Update 3 rules
Group Policy Modification T1484.001, Disable or Modify Tools T1562.001, Windows File and Directory Permissions Modification T1222.001

dns.question.name 1 entries

eq: * 3 rules
Compromise Software Supply Chain T1195.002, Drive-by Compromise T1189, Remote Access Tools T1219

objectCategory 1 entries

eq: "CN=Group-Policy-Container*" 3 rules
Group Policy Modification T1484.001, Disable or Modify Tools T1562.001, Windows File and Directory Permissions Modification T1222.001

status 1 entries

eq: success 3 rules
Valid Accounts T1078, Account Manipulation T1098

unique_users 1 entries

gt: 5 3 rules
Valid Accounts T1078, Account Manipulation T1098

ClientProcessId 1 entries

eq: 0 2 rules
Create or Modify System Process T1543, Windows Service T1543.003

parent_process_id 1 entries

eq: 0 2 rules
Create or Modify System Process T1543, Windows Service T1543.003

process_id 1 entries

eq: 0 2 rules
Create or Modify System Process T1543, Windows Service T1543.003, Adversary-in-the-Middle T1557, Steal or Forge Kerberos Tickets T1558

Action 1 entries

eq: 2 2 rules
Disable or Modify System Firewall T1562.004

All_Changes.result_id 1 entries

eq: 4720 2 rules
Local Account T1136.001, Local Accounts T1078.003

ApplicationPath 1 entries

match: \AppData\Local\Temp\ 2 rules
Disable or Modify System Firewall T1562.004

Esql.max_logon 1 entries

ge: 1000 2 rules
Valid Accounts T1078

Esql.min_logon 1 entries

ge: 1 2 rules
Valid Accounts T1078

Esql.unique_host_count 1 entries

ge: 2 2 rules
Valid Accounts T1078

NewTargetUserName 1 entries

ne: "*$" 2 rules
Domain Accounts T1078.002

NewTemplateContent 1 entries

match: CT_FLAG_ENROLLEE_SUPPLIES_SUBJECT 2 rules

OldTargetUserName 1 entries

eq: "*$" 2 rules
Domain Accounts T1078.002

PipeName 1 entries

starts_with: \PSHost 2 rules
PowerShell T1059.001

ServiceType 1 entries

eq: "kernel mode driver" 2 rules
Rootkit T1014, Exploitation for Privilege Escalation T1068, Windows Service T1543.003

SubjectUserSid 1 entries

eq: S-1-0-0 2 rules
Pass the Hash T1550.002, Valid Accounts T1078

Target_User_Name 1 entries

ne: *$ 2 rules
Password Spraying T1110.003

TemplateContent 1 entries

match: CT_FLAG_ENROLLEE_SUPPLIES_SUBJECT 2 rules

count 1 entries

ge: 100 2 rules
Data Destruction T1485

dropped_file_path_split_count 1 entries

eq: 2 2 rules
Local Groups T1069.001, Replication Through Removable Media T1091

is_driver 1 entries

eq: TRUE 2 rules
Windows Service T1543.003

islibrary 1 entries

eq: TRUE 2 rules
DLL T1574.001

parent_process_name 1 entries

in: "powershell.exe" 2 rules
Process Injection T1055, PowerShell T1059.001, Account Access Removal T1531

user.domain 1 entries

ne: NT AUTHORITY 2 rules
Brute Force T1110, Password Guessing T1110.001, Password Spraying T1110.003

ut_shannon 1 entries

gt: 3 2 rules
Scheduled Task T1053.005, Windows Service T1543.003