Skip to content

Latest commit

 

History

History
16 lines (14 loc) · 39.8 KB

r_m_github_github_Malware.md

File metadata and controls

16 lines (14 loc) · 39.8 KB

Rules by Product and UseCase

Vendor: GitHub

Product: GitHub

Use-Case: Malware

Rules Models MITRE ATT&CK® TTPs Activity Types Parsers
164 25 76 3 6
Event Type Rules Models
app-login T1078 - Valid Accounts
Auth-Blacklist-Shost: User authentication or login from a known blacklisted IP
authentication-successful T1078 - Valid Accounts
Auth-Blacklist-Shost: User authentication or login from a known blacklisted IP
process-created T1059 - Command and Scripting Interperter
EPA-PU-PS-F: First execution of powershell process for user
EPA-PU-PS-A: Abnormal execution of powershell process for user
EPA-PG-PS-F: First execution of powershell process for this peer group
EPA-PG-PS-A: Abnormal execution of powershell process for this peer group
Powershell-Advanced-A: Abnormal user using advanced powershell capabilities
Powershell-Commands-F: First new Powershell Command
Powershell-Commands-A: Abnormal Powershell Command
Powershell-Script-F: First time this powershell script has been run
Powershell-RunType-A: Abnormal invocation of powershell
Powershell-WMI-F: First time for user using powershell WMI
Powershell-WMI-A: Abnormal user using powershell WMI
Powershell-Empire: The attacker tool, Powershell Empire, has been used
WMIExec-VBS-Script: Suspicious usage of wscript/cscript
FE-WC: Modified WMIPRVSE by FIREEYE for pentesting
PC-PowerShell-SocketCreate: Powershell TCP Socket Creation through Powershell.
PC-PowerShell-ExchangeSnapIns: Exchange Snap-In was imported and run by Powershell.
PC-PowerShell-PowerCatDownload: PowerCat tool was downloaded via Powershell.
PC-Powershell-HafniumActivity: Powershell HAFNIUM Activity
PowerShell-Invoke-WebRequest: Powershell run with invoke-webrequest.
Powershell-ExecPolicy-Bypass-F: First use of powershell with '-ExecutionPolicy Bypass' by the user
Powershell-ExecPolicy-Bypass-A: Abnormal user using powershell with '-ExecutionPolicy Bypass'
A-Suspicious-Persistence: Suspicious 'schtask' creation, possible attack tool usage on this asset
A-DLL-ULOAD-EquationGroup: A known 'Equation Group' artifact was observed on this asset
A-TrojanLoader: Possible Trojan Loader activity on this asset
A-ZxShell: Known backdoor software, ZxShell, possibly loaded on this asset
A-Archer: 'Archer' malware executed on this asset
A-Hanword-Subprocess: Suspicious processes spawned by the Hangul word processor on this asset
A-Outlook-Unsafe-Execution: A suspicious sub process was spawned by Microsoft Outlook on this asset
A-TurlaGroup-LateralMovement: Artifacts from the ATP 'Turla Group' have been observed on this asset
A-Sus-Powershell-Invocation-Parent-Proc: Suspicious Powershell invocation from interpreters or unusual programs on this asset.
A-Sus-Encoded-PS-CmdLine: Suspicious Powershell process was started with base64 encoded commands on this asset.
A-Base64-Powershell-CmdLine-Keywords: Base64 encoded strings were found in hidden malicious Powershell command lines on this asset.
A-Baby-Shark-Activity: Activity related to Baby Shark malware has been found on this asset.
A-Non-Interactive-Powershell: Non-Interactive Powershell activity was found on this asset.
A-Powershell-Script-AppData: Powershell was invoked in a suspicious command line execution with reference to an AppData folder on this asset.
A-Dtrack: Known banking malware, Dtrack, observed on this asset
A-Suspicious-DAT: A suspicious .dat file used, possible APT activity on this asset
A-Operation-Wocao-Activity: Possible Operation-Wocao APT activity on this asset, suspicious command line arguments
A-Koadic-Tool-Usage: 'Koadic' attacker tool usage on this asset
A-WScript-CScript-Dropper: Wscript or Cscript used for script execution from User directories on this asset
A-Mshta-Javascript: Mshta.exe has executed a javascript related command on this asset
A-Mshta-CMD-Spawn: Mshta.exe has executed a command line executable on this asset
A-Suspicious-Shell-Child-Process: Windows shell has spawned a suspicious process on this asset
A-WMI-Spawn-PowerShell: PowerShell was spawned via WMI on this asset.
A-Powershell-CMDLETS: Malicious PowerShell script was used via get cmdlets function of PowerShell on the asset
A-PowerShell-BITS-Job: BITS job via PowerShell was created on this asset.
A-Mustang-Panda-Dropper: Possible Mustang Panda droppers execution on this asset.
A-Mshta-Script: Mshta.exe .NET code execution on this asset.
A-EPA-Powershell-Invoke-WebRequest-F: First execution of powershell process with invoke-webrequest for the asset in the organization.
A-EPA-Powershell-Invoke-WebRequest-A: Abnormal execution of powershell process with invoke-webrequest for the asset in the organization.
EPA-Powershell-Invoke-WebRequest-Domain-F: First execution of powershell process with invoke-webrequest and with this domain for the asset in the organization.
EPA-Powershell-Invoke-WebRequest-Domain-A: Abnormal execution of powershell process with invoke-webrequest and with this domain for the asset in the organization.

T1059.001 - Command and Scripting Interperter: PowerShell
EPA-PU-PS-F: First execution of powershell process for user
EPA-PU-PS-A: Abnormal execution of powershell process for user
EPA-PG-PS-F: First execution of powershell process for this peer group
EPA-PG-PS-A: Abnormal execution of powershell process for this peer group
Powershell-Advanced-A: Abnormal user using advanced powershell capabilities
Powershell-Commands-F: First new Powershell Command
Powershell-Commands-A: Abnormal Powershell Command
Powershell-Script-F: First time this powershell script has been run
Powershell-RunType-A: Abnormal invocation of powershell
Powershell-WMI-F: First time for user using powershell WMI
Powershell-WMI-A: Abnormal user using powershell WMI
Powershell-Empire: The attacker tool, Powershell Empire, has been used
PC-PowerShell-SocketCreate: Powershell TCP Socket Creation through Powershell.
PC-PowerShell-ExchangeSnapIns: Exchange Snap-In was imported and run by Powershell.
PC-PowerShell-PowerCatDownload: PowerCat tool was downloaded via Powershell.
PC-Powershell-HafniumActivity: Powershell HAFNIUM Activity
PowerShell-Invoke-WebRequest: Powershell run with invoke-webrequest.
Powershell-ExecPolicy-Bypass-F: First use of powershell with '-ExecutionPolicy Bypass' by the user
Powershell-ExecPolicy-Bypass-A: Abnormal user using powershell with '-ExecutionPolicy Bypass'
A-Suspicious-Persistence: Suspicious 'schtask' creation, possible attack tool usage on this asset
A-Sus-Powershell-Invocation-Parent-Proc: Suspicious Powershell invocation from interpreters or unusual programs on this asset.
A-Sus-Encoded-PS-CmdLine: Suspicious Powershell process was started with base64 encoded commands on this asset.
A-Base64-Powershell-CmdLine-Keywords: Base64 encoded strings were found in hidden malicious Powershell command lines on this asset.
A-Baby-Shark-Activity: Activity related to Baby Shark malware has been found on this asset.
A-Non-Interactive-Powershell: Non-Interactive Powershell activity was found on this asset.
A-Powershell-Script-AppData: Powershell was invoked in a suspicious command line execution with reference to an AppData folder on this asset.
A-Operation-Wocao-Activity: Possible Operation-Wocao APT activity on this asset, suspicious command line arguments
A-Mshta-CMD-Spawn: Mshta.exe has executed a command line executable on this asset
A-Suspicious-Shell-Child-Process: Windows shell has spawned a suspicious process on this asset
A-WMI-Spawn-PowerShell: PowerShell was spawned via WMI on this asset.
A-Powershell-CMDLETS: Malicious PowerShell script was used via get cmdlets function of PowerShell on the asset
A-PowerShell-BITS-Job: BITS job via PowerShell was created on this asset.
A-EPA-Powershell-Invoke-WebRequest-F: First execution of powershell process with invoke-webrequest for the asset in the organization.
A-EPA-Powershell-Invoke-WebRequest-A: Abnormal execution of powershell process with invoke-webrequest for the asset in the organization.
EPA-Powershell-Invoke-WebRequest-Domain-F: First execution of powershell process with invoke-webrequest and with this domain for the asset in the organization.
EPA-Powershell-Invoke-WebRequest-Domain-A: Abnormal execution of powershell process with invoke-webrequest and with this domain for the asset in the organization.

T1218 - Signed Binary Proxy Execution
PC-ParentName-ProcessName-DotNET-A: Abnormal child process creation for .NET associated process
A-CSC-Suspicious-Parent-Process: Suspicious parent process for csc.exe, possible payload delivery on this asset
A-MsiExec-Web-Install: A suspicious msiexec process was started with web addresses as a parameter on this asset.
A-DLL-ULOAD-EquationGroup: A known 'Equation Group' artifact was observed on this asset
A-TrojanLoader: Possible Trojan Loader activity on this asset
A-ZxShell: Known backdoor software, ZxShell, possibly loaded on this asset
A-Archer: 'Archer' malware executed on this asset
A-Baby-Shark-Activity: Activity related to Baby Shark malware has been found on this asset.
A-Empire-Monkey: EmpireMonkey APT activity was found on this asset.
A-Suspicious-ControlPanel: Control Panel commandlets loaded outside the default directory on this asset
A-Devtoolslauncher-Binary: Devtoolslauncher.exe has executed a binary on this asset
A-HH-EXE-CHM: HH.exe usage, possible code execution on this asset
A-MSHTA-SVCHOST: Mshta.exe spawned by svchost.exe, possible lateral movement on this asset
A-Mshta-Javascript: Mshta.exe has executed a javascript related command on this asset
A-Mshta-CMD-Spawn: Mshta.exe has executed a command line executable on this asset
A-Suspicious-Shell-Child-Process: Windows shell has spawned a suspicious process on this asset
A-OpenWith-Exec-Cmd: OpenWith.exe executed via command line on this asset.
A-Ordinal-Rundll32-Call: Suspicious calls of DLLs in rundll32.dll exports by ordinal on this asset.
A-Regsvr32-Suspicious-Cmd: Suspicious command line arguments related to regsvr32.exe have been observed on this asset.
A-CDB-App-Whitelisting: 64-bit shellcode was launched using cdb.exe on this asset.
A-PC-Mshta-Hta-F: First time hta file usage by Mshta.exe on this asset.
A-PC-Mshta-Hta-A: Abnormal hta file usage by Mshta.exe on this asset.
A-PC-Regsvr32-sct-F: First time sct file usage by Regsvr32.exe on this asset.
A-PC-Regsvr32-sct-A: Abnormal sct file usage by Regsvr32.exe on the asset.
A-PC-InstallUtil-exe-F: First time exe file usage by InstallUtil.exe on this asset.
A-PC-InstallUtil-exe-A: Abnormal for exe file usage by InstallUtil.exe on this asset.
A-PC-InstallUtil-dll-F: First time dll file usage by InstallUtil.exe on this asset.
A-PC-InstallUtil-dll-A: Abnormal dll file usage by InstallUtil.exe on this asset.
A-DotNET-URL: DotNET command line contains remote file on this asset.
A-Mshta-Script: Mshta.exe .NET code execution on this asset.
A-BinExec-MSI-Remote: 'Msiexec.exe' used to execute a remote '.msi' file on this host
A-BinExec-HTA-Remote: 'Mshta.exe' used to execute a remote '.hta' file on this host
A-BinExec-Odbcconf: 'Odbcconf.exe' used to execute a DLL on this host

T1218.008 - T1218.008
A-BinExec-Odbcconf: 'Odbcconf.exe' used to execute a DLL on this host

T1218.005 - T1218.005
PC-ParentName-ProcessName-DotNET-A: Abnormal child process creation for .NET associated process
A-CSC-Suspicious-Parent-Process: Suspicious parent process for csc.exe, possible payload delivery on this asset
A-Baby-Shark-Activity: Activity related to Baby Shark malware has been found on this asset.
A-MSHTA-SVCHOST: Mshta.exe spawned by svchost.exe, possible lateral movement on this asset
A-Mshta-Javascript: Mshta.exe has executed a javascript related command on this asset
A-Mshta-CMD-Spawn: Mshta.exe has executed a command line executable on this asset
A-Suspicious-Shell-Child-Process: Windows shell has spawned a suspicious process on this asset
A-PC-Mshta-Hta-F: First time hta file usage by Mshta.exe on this asset.
A-PC-Mshta-Hta-A: Abnormal hta file usage by Mshta.exe on this asset.
A-DotNET-URL: DotNET command line contains remote file on this asset.
A-Mshta-Script: Mshta.exe .NET code execution on this asset.
A-BinExec-HTA-Remote: 'Mshta.exe' used to execute a remote '.hta' file on this host

T1218.007 - Signed Binary Proxy Execution: Msiexec
A-MsiExec-Web-Install: A suspicious msiexec process was started with web addresses as a parameter on this asset.
A-BinExec-MSI-Remote: 'Msiexec.exe' used to execute a remote '.msi' file on this host

T1053 - Scheduled Task/Job
ChaferAPT-Activity: Chafer APT related activity observed
EPA-UP-CrontabMod-F: First execution of process which contains commands for crontab modification for user.
EPA-UP-CrontabMod-A: Abnormal execution of of process which contains commands for crontab modification for user.
A-Suspicious-Persistence: Suspicious 'schtask' creation, possible attack tool usage on this asset
A-New-ScheduledTask: New scheduled task created using schtasks.exe on this asset
A-Defrag-Deactivation: Scheduled defragmentation task was deactivated on this asset.
A-EPA-HP-CrontabMod-F: First execution of process on asset and the command of the process is crontab modification
A-EPA-HP-CrontabMod-A: Abnormal execution of process on asset and the command of the process is crontab modification

T1053.003 - T1053.003
EPA-UP-CrontabMod-F: First execution of process which contains commands for crontab modification for user.
EPA-UP-CrontabMod-A: Abnormal execution of of process which contains commands for crontab modification for user.
A-EPA-HP-CrontabMod-F: First execution of process on asset and the command of the process is crontab modification
A-EPA-HP-CrontabMod-A: Abnormal execution of process on asset and the command of the process is crontab modification

TA0002 - TA0002
EPA-UP-A: Abnormal execution of process for user
EPA-GP-F: First execution of process for this peer group
EPA-GP-A: Abnormal execution of process for this peer group
EPA-PDir-F: First execution of a process in this directory for the organization
EPA-HDir-Server-F: First execution of a process in this directory on a server
EPA-PH-F: First execution of process (vssadmin.exe) on host
EPA-F-CLI: Suspicious Windows process executed
EPA-UH-Pen-F: Known pentest tool used
SW-UC: Unusual child process loaded by SolarWinds tool
ParentProcess-P-F: First execution of this parent process for peer group.
ParentProcess-P-A: Abnormal parent process for peer group
EPA-UP-Commands-F: First execution of this process for user and the command of the process is curl/wget
EPA-UP-Commands-A: Abnormal process execution containing wget or curl commands for the user.
A-EPA-HP-F: First execution of process on asset
A-EPA-HP-A: Abnormal execution of process on asset
A-EPA-ZP-A: Abnormal execution of process for the asset in this zone
A-EPA-ZP-F: First execution of process for the asset in this zone
A-EPA-OP-F: First execution of process for the asset in this organization
A-EPA-OP-A: Abnormal execution of process for the asset in this organization
A-EPA-HPP-F: First parent-process combination on asset
A-EPA-HPP-A: Abnormal parent-process combination on asset
A-EPA-OPP-F: First parent-process combination in this organization
A-EPA-OPP-A: Abnormal parent-process combination in this organization
A-EPA-TEMP-DIRECTORY-F: First execution of this process from a temporary directory on this asset
A-EPA-TEMP-DIRECTORY-A: Abnormal execution of this process from a temporary directory
A-Emotet: A process associated with the Emotet malware has been executed on this asset
A-Qbot: Artifacts related to Qbot banking malware have been observed on this asset
A-TropicTrooper-APT: Possible TropicTrooper APT artifacts observed on this asset
A-EPA-HP-Commands-F: First execution of process on asset and the command of the process is curl/wget
A-EPA-HP-Commands-A: Abnormal execution of process on asset and the command of the process is curl/wget

T1562 - Impair Defenses
A-Java-Remote-Dubugging: Java executed with remote debugging enabled on this asset
A-KnownFirewallDisable-Log4j: FireWall disable arguments via command line were detected on this asset.

T1562.004 - Impair Defenses: Disable or Modify System Firewall
A-KnownFirewallDisable-Log4j: FireWall disable arguments via command line were detected on this asset.

T1190 - Exploit Public Fasing Application
A-EPA-Log4j-String-Command-2: There was an attempt via process creation to exploit the CVE-2021-44228 vulnerability using known keywords on this asset.

T1059.005 - T1059.005
WMIExec-VBS-Script: Suspicious usage of wscript/cscript
A-WScript-CScript-Dropper: Wscript or Cscript used for script execution from User directories on this asset
A-Suspicious-Shell-Child-Process: Windows shell has spawned a suspicious process on this asset
A-Mshta-Script: Mshta.exe .NET code execution on this asset.

T1059.007 - T1059.007
A-WScript-CScript-Dropper: Wscript or Cscript used for script execution from User directories on this asset
A-Mshta-Javascript: Mshta.exe has executed a javascript related command on this asset
A-Mshta-Script: Mshta.exe .NET code execution on this asset.

T1047 - Windows Management Instrumentation
Powershell-WMI-F: First time for user using powershell WMI
Powershell-WMI-A: Abnormal user using powershell WMI
PC-ParentName-ProcessName-DotNET-A: Abnormal child process creation for .NET associated process
A-Squibly-Two: A WMI SquiblyTwo Attack with possibly renamed WMI by looking for imphash was detected on this asset.
A-DotNET-URL: DotNET command line contains remote file on this asset.

T1127 - Trusted Developer Utilities Proxy Execution
PC-ParentName-ProcessName-DotNET-A: Abnormal child process creation for .NET associated process
A-CSharp-Interactive-Console: Execution of CSharp interactive console by PowerShell on this asset.
A-Microsoft-Workflow-Compiler: Microsoft Workflow Compiler was invoked on this asset.
A-CDB-App-Whitelisting: 64-bit shellcode was launched using cdb.exe on this asset.
A-PC-MSBuild-xml-F: First time xml file usage by MSBuild.exe on this asset.
A-PC-MSBuild-Csproj-F: First time csproj file usage by MSBuild.exe on this asset.
A-DotNET-URL: DotNET command line contains remote file on this asset.

T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild
PC-ParentName-ProcessName-DotNET-A: Abnormal child process creation for .NET associated process
A-PC-MSBuild-xml-F: First time xml file usage by MSBuild.exe on this asset.
A-PC-MSBuild-Csproj-F: First time csproj file usage by MSBuild.exe on this asset.
A-DotNET-URL: DotNET command line contains remote file on this asset.

T1218.001 - Signed Binary Proxy Execution: Compiled HTML File
A-HH-EXE-CHM: HH.exe usage, possible code execution on this asset
A-DotNET-URL: DotNET command line contains remote file on this asset.

T1218.004 - Signed Binary Proxy Execution: InstallUtil
PC-ParentName-ProcessName-DotNET-A: Abnormal child process creation for .NET associated process
A-PC-InstallUtil-exe-F: First time exe file usage by InstallUtil.exe on this asset.
A-PC-InstallUtil-exe-A: Abnormal for exe file usage by InstallUtil.exe on this asset.
A-PC-InstallUtil-dll-F: First time dll file usage by InstallUtil.exe on this asset.
A-PC-InstallUtil-dll-A: Abnormal dll file usage by InstallUtil.exe on this asset.
A-DotNET-URL: DotNET command line contains remote file on this asset.

T1218.010 - Signed Binary Proxy Execution: Regsvr32
PC-ParentName-ProcessName-DotNET-A: Abnormal child process creation for .NET associated process
A-Empire-Monkey: EmpireMonkey APT activity was found on this asset.
A-Regsvr32-Suspicious-Cmd: Suspicious command line arguments related to regsvr32.exe have been observed on this asset.
A-PC-Regsvr32-sct-F: First time sct file usage by Regsvr32.exe on this asset.
A-PC-Regsvr32-sct-A: Abnormal sct file usage by Regsvr32.exe on the asset.

T1574 - Hijack Execution Flow
DLL-SideLoading: DLL sideloading malware used, known artifact of APT27
A-Winnti-Malware: Artifacts of 'Winnti' malware have been observed on this asset
A-PlugX-DLL-Sideloading: DLL loaded from suspicous location on this asset, typically seen by the PlugX malware family
A-ServiceName-ServiceCmdline-F: First time binary command line for this service on this asset.
A-ServiceName-ServiceCmdline-A: Abnormal binary command line for this service

T1574.010 - T1574.010
A-ServiceName-ServiceCmdline-F: First time binary command line for this service on this asset.
A-ServiceName-ServiceCmdline-A: Abnormal binary command line for this service

T1574.011 - T1574.011
A-ServiceName-ServiceCmdline-F: First time binary command line for this service on this asset.
A-ServiceName-ServiceCmdline-A: Abnormal binary command line for this service

T1203 - Exploitation for Client Execution
A-Word-FLTLDR-Exploit-Vector: Possible loading of exploit using Microsoft Office and the fltldr.exe application on this asset
A-Hanword-Subprocess: Suspicious processes spawned by the Hangul word processor on this asset
A-WinWord-Uncommon-Subprocess: Winword has spawned an uncommon subprocess, csc.exe, on this asset
A-PC-ParentName-UMWorkerProcess-F: First time child process creation for Exchange Unified Messaging service UMWorkerProcess.exe

T1505 - Server Software Component
A-WebShell-CLI: Possible command line web shell detected on this asset
A-WebShell-WebServer: Possible web server web shell detected on this asset
A-Suspicious-IIS-Modules: Native-Code modules for IIS installed via command line on this asset
A-PC-ParentName-W3WP-F: First time child process creation for Exchange web front-end process w3wp.exe

T1505.003 - Server Software Component: Web Shell
A-WebShell-CLI: Possible command line web shell detected on this asset
A-WebShell-WebServer: Possible web server web shell detected on this asset
A-Suspicious-IIS-Modules: Native-Code modules for IIS installed via command line on this asset
A-PC-ParentName-W3WP-F: First time child process creation for Exchange web front-end process w3wp.exe

T1059.003 - T1059.003
FE-WC: Modified WMIPRVSE by FIREEYE for pentesting
A-DLL-ULOAD-EquationGroup: A known 'Equation Group' artifact was observed on this asset
A-TrojanLoader: Possible Trojan Loader activity on this asset
A-ZxShell: Known backdoor software, ZxShell, possibly loaded on this asset
A-Archer: 'Archer' malware executed on this asset
A-Hanword-Subprocess: Suspicious processes spawned by the Hangul word processor on this asset
A-Baby-Shark-Activity: Activity related to Baby Shark malware has been found on this asset.
A-Operation-Wocao-Activity: Possible Operation-Wocao APT activity on this asset, suspicious command line arguments
A-Koadic-Tool-Usage: 'Koadic' attacker tool usage on this asset
A-Mshta-CMD-Spawn: Mshta.exe has executed a command line executable on this asset
A-Mustang-Panda-Dropper: Possible Mustang Panda droppers execution on this asset.

T1055 - Process Injection
A-Zoho-DCTask: Dctask64.exe executed, possible process injection on this asset
A-Svchost-Suspicious-Launch: Svchost.exe has launched without any command line arguments on this asset
A-Formbook: Possible Formbook usage on this asset

T1197 - BITS Jobs
A-PowerShell-BITS-Job: BITS job via PowerShell was created on this asset.
A-Bitsadmin-Download: Bitsadmin was used to download a file on this asset.

T1546 - Event Triggered Execution
FE-WC: Modified WMIPRVSE by FIREEYE for pentesting
WMI-Script-Event-Consumers: Suspicious usage of WMI script event consumers.
A-Shim-Installation: Possible installation of a 'shim' using sdbinst.exe on this asset
A-FileType-Association-Change: File Association changed for this file extension on this asset
A-WMI-Spawn-PowerShell: PowerShell was spawned via WMI on this asset.

T1546.003 - T1546.003
FE-WC: Modified WMIPRVSE by FIREEYE for pentesting
WMI-Script-Event-Consumers: Suspicious usage of WMI script event consumers.
A-WMI-Spawn-PowerShell: PowerShell was spawned via WMI on this asset.

T1218.011 - Signed Binary Proxy Execution: Rundll32
A-DLL-ULOAD-EquationGroup: A known 'Equation Group' artifact was observed on this asset
A-TrojanLoader: Possible Trojan Loader activity on this asset
A-ZxShell: Known backdoor software, ZxShell, possibly loaded on this asset
A-Archer: 'Archer' malware executed on this asset
A-Suspicious-Shell-Child-Process: Windows shell has spawned a suspicious process on this asset
A-Ordinal-Rundll32-Call: Suspicious calls of DLLs in rundll32.dll exports by ordinal on this asset.

T1563 - Remote Service Session Hijacking
A-MSTSC-RDP-Hijack: MSTSC Shadowing, possible RDP session hijack/shadowing of session on this asset

T1563.002 - T1563.002
A-MSTSC-RDP-Hijack: MSTSC Shadowing, possible RDP session hijack/shadowing of session on this asset

T1012 - Query Registry
A-Baby-Shark-Activity: Activity related to Baby Shark malware has been found on this asset.
A-Operation-Wocao-Activity: Possible Operation-Wocao APT activity on this asset, suspicious command line arguments

T1027 - Obfuscated Files or Information
A-CSC-Suspicious-Parent-Process: Suspicious parent process for csc.exe, possible payload delivery on this asset
A-CSC-Suspicious-Folder: Csc.exe spawned from suspicious folder on this asset
A-Sus-Encoded-PS-CmdLine: Suspicious Powershell process was started with base64 encoded commands on this asset.
A-Base64-Powershell-CmdLine-Keywords: Base64 encoded strings were found in hidden malicious Powershell command lines on this asset.
A-Operation-Wocao-Activity: Possible Operation-Wocao APT activity on this asset, suspicious command line arguments

T1036 - Masquerading
A-Executable-Suspicious-Folder: A process has been run from a binary located in a suspicious folder on this asset
A-Sus-Double-Extension: An .exe extension was used after a different non-executable file extension on this asset.
A-Operation-Wocao-Activity: Possible Operation-Wocao APT activity on this asset, suspicious command line arguments

T1036.004 - T1036.004
A-Operation-Wocao-Activity: Possible Operation-Wocao APT activity on this asset, suspicious command line arguments

T1482 - Domain Trust Discovery
A-Trickbot-Recon: Trickbot malware domain recon activity on this asset

T1204 - User Execution
A-CMD-Spawn-From-Office: A command line executable was spawned from an Office application on this asset
A-UserProcess-Spawned-FromOffice: An executable running under the 'Users' path has been spawned from an Office application on this asset
A-WinWord-Uncommon-Subprocess: Winword has spawned an uncommon subprocess, csc.exe, on this asset

T1204.002 - T1204.002
A-CMD-Spawn-From-Office: A command line executable was spawned from an Office application on this asset
A-UserProcess-Spawned-FromOffice: An executable running under the 'Users' path has been spawned from an Office application on this asset
A-WinWord-Uncommon-Subprocess: Winword has spawned an uncommon subprocess, csc.exe, on this asset

T1218.002 - Signed Binary Proxy Execution: Control Panel
A-Suspicious-ControlPanel: Control Panel commandlets loaded outside the default directory on this asset

T1546.001 - T1546.001
A-FileType-Association-Change: File Association changed for this file extension on this asset

T1113 - Screen Capture
A-PSR-Screenshot: Psr.exe was used to take a screenshot on this asset

T1547 - Boot or Logon Autostart Execution
DLL-SideLoading: DLL sideloading malware used, known artifact of APT27
A-AutoRun-Modification: AutoRun Keys modified using reg.exe on this asset

T1547.001 - T1547.001
A-AutoRun-Modification: AutoRun Keys modified using reg.exe on this asset

T1123 - Audio Capture
A-Powershell-AudioCapture: Powershell has recorded external audio on this asset
A-SoundRecorder-AudioCapture: SoundRecorder has recorded external audio on this asset

T1543 - Create or Modify System Process
EPA-SERVICE-PARAMS: Suspicious parameters found in process for service creation
A-EPA-USF-F: First process per service name for asset
A-ServicePath-Modification: Suspicious service path identified on this asset

T1543.003 - Create or Modify System Process: Windows Service
EPA-SERVICE-PARAMS: Suspicious parameters found in process for service creation
A-EPA-USF-F: First process per service name for asset
A-ServicePath-Modification: Suspicious service path identified on this asset

T1105 - Ingress Tool Transfer
A-MsiExec-Web-Install: A suspicious msiexec process was started with web addresses as a parameter on this asset.
A-Office-Payload-Download: Possible malicious payload download via Microsoft Office binaries on this asset

T1546.011 - T1546.011
A-Shim-Installation: Possible installation of a 'shim' using sdbinst.exe on this asset

T1490 - Inhibit System Recovery
EPA-EXPERT-SHADOW-COPIES: A Suspicious command that deletes shadow copies has been executed for process
EPA-EXPERT-DISABLE-RECOVERY: A Suspicious command that disables recovery mode has been executed for process
A-Mod-Boot-Config: Boot configuration data was deleted using the bcdedit command on this asset.

T1210 - Exploitation of Remote Services
A-SIGRed: Possible SIGRed (CVE-2020-1350) exploitation on this asset

T1569 - System Services
A-SIGRed: Possible SIGRed (CVE-2020-1350) exploitation on this asset

T1021 - Remote Services
A-TurlaGroup-LateralMovement: Artifacts from the ATP 'Turla Group' have been observed on this asset

T1021.002 - Remote Services: SMB/Windows Admin Shares
A-TurlaGroup-LateralMovement: Artifacts from the ATP 'Turla Group' have been observed on this asset

T1083 - File and Directory Discovery
A-TurlaGroup-LateralMovement: Artifacts from the ATP 'Turla Group' have been observed on this asset

T1135 - Network Share Discovery
A-TurlaGroup-LateralMovement: Artifacts from the ATP 'Turla Group' have been observed on this asset

T1202 - Indirect Command Execution
A-UserProcess-Spawned-FromOffice: An executable running under the 'Users' path has been spawned from an Office application on this asset
A-Outlook-Unsafe-Execution: A suspicious sub process was spawned by Microsoft Outlook on this asset

T1055.001 - Process Injection: Dynamic-link Library Injection
A-Zoho-DCTask: Dctask64.exe executed, possible process injection on this asset

T1027.004 - Obfuscated Files or Information: Compile After Delivery
A-CSC-Suspicious-Parent-Process: Suspicious parent process for csc.exe, possible payload delivery on this asset
A-CSC-Suspicious-Folder: Csc.exe spawned from suspicious folder on this asset

T1574.002 - Hijack Execution Flow: DLL Side-Loading
A-Winnti-Malware: Artifacts of 'Winnti' malware have been observed on this asset
A-PlugX-DLL-Sideloading: DLL loaded from suspicous location on this asset, typically seen by the PlugX malware family

T1555 - Credentials from Password Stores
A-SecX-Tool-Exec: SecurityXploded Tool execution detected on this asset

T1003 - OS Credential Dumping
ATP-PWDump: Malicious exe was run which is a part of credential dumping tool
A-Rubeus-CMD-Tool: Command line parameters used by Rubeus hack tool detected on this asset

T1550 - Use Alternate Authentication Material
A-Rubeus-CMD-Tool: Command line parameters used by Rubeus hack tool detected on this asset

T1550.003 - Use Alternate Authentication Material: Pass the Ticket
A-Rubeus-CMD-Tool: Command line parameters used by Rubeus hack tool detected on this asset

T1558 - Steal or Forge Kerberos Tickets
A-Rubeus-CMD-Tool: Command line parameters used by Rubeus hack tool detected on this asset

T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting
A-Rubeus-CMD-Tool: Command line parameters used by Rubeus hack tool detected on this asset

T1053.005 - Scheduled Task/Job: Scheduled Task
A-Suspicious-Persistence: Suspicious 'schtask' creation, possible attack tool usage on this asset
A-New-ScheduledTask: New scheduled task created using schtasks.exe on this asset

T1134 - Access Token Manipulation
A-Suspicious-GetSystem-Usage: Possible Meterpeter/Cobalt Strike usage of GetSystem on this asset

T1134.001 - Access Token Manipulation: Token Impersonation/Theft
A-Suspicious-GetSystem-Usage: Possible Meterpeter/Cobalt Strike usage of GetSystem on this asset

T1134.002 - T1134.002
A-Suspicious-GetSystem-Usage: Possible Meterpeter/Cobalt Strike usage of GetSystem on this asset

T1003.002 - T1003.002
ATP-PWDump: Malicious exe was run which is a part of credential dumping tool

T1547.002 - T1547.002
DLL-SideLoading: DLL sideloading malware used, known artifact of APT27

T1112 - Modify Registry
ChaferAPT-Activity: Chafer APT related activity observed
A-EPA-Powershell-Invoke-WebRequest-Domain: Domains called with Powershell executions using invoke-webrequest for the asset in the organization.
A-PC-InstallUtil-exe: EXE file parameter passed to InstallUtil.exe on the asset.
A-PC-MSBuild-Csproj: CSPROJ file parameter passed to MSBuild.exe on the asset in the organization.
A-PC-MSBuild-xml: XML file parameter passed to MSBuild.exe on the asset in the organization.
A-PC-Regsvr32-sct: SCT file parameter passed to Regsvr32.exe on the asset in the organization.
A-PC-Mshta-Hta: HTA file parameter passed to Mshta.exe on the asset in the organization.
A-ServiceName-ServiceCmdline: Service Executable Files on the asset
A-PC-ParentName-ProcessName: Processes for parent parent processes.
A-EPA-USF: Processes per service name for asset
A-EPA-UP-TEMP: Processes executed from TEMP directories on this asset
A-EPA-OPP: Parent processes in the organization
A-EPA-HPP: Parent processes per host on this asset
A-EPA-ZP: Processes in the zone on asset
Powershell-ExecPolicy-Bypass: Suspicous powershell execution with '-ExecutionPolicy Bypass' for users in the organization.
PC-InstallUtil-dll: DLL file parameter passed to Installutil.exe
ParentProcess-P-New: Parent processes for peer group
Powershell-WMI-O: Users using Powershell WMI
Powershell-Commands: Powershell Commands per user
Powershell-Advanced: Users who use powershell capabilities
EPA-UH-Pen: Malicious tools used by user
EPA-PH: Hosts that executed 'vssadmin.exe' process
EPA-PDir: Process executable directories in the organization
EPA-PG-PS: Powershell executions for the peer group
EPA-PU-PS: Powershell executions for the user
EPA-GP: Processes for the peer group