Sponsor of the Day:
Jerkmate
https://detection.fyi/tags/data-source-elastic-endgame/
Data Source: Elastic Endgame | Detection.FYI
data sourcedetection fyielasticendgame
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_pua_webbrowserpassview/
PUA - WebBrowserPassView Execution | Detection.FYI
Detects the execution of WebBrowserPassView.exe. A password recovery tool that reveals the passwords stored by the following Web browsers, Internet Explorer …
execution detection fyipua
https://detection.fyi/sigmahq/sigma/windows/builtin/security/account_management/win_security_susp_failed_logon_source/
Failed Logon From Public IP | Detection.FYI
Detects a failed logon attempt from a public IP. A login from a public IP can indicate a misconfigured firewall or network boundary.
public ipdetection fyifailedlogon
https://detection.fyi/sigmahq/sigma/application/bitbucket/audit/bitbucket_audit_user_login_failure_detected/
Bitbucket User Login Failure | Detection.FYI
Detects user authentication failure events. Please note that this rule can be noisy and it is recommended to use with correlation based on …
bitbucket userfailure detectionfyi
https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_schedule_task_job_cron/
Scheduled Cron Task/Job - MacOs | Detection.FYI
Detects abuse of the cron utility to perform task scheduling for initial or recurring execution of malicious code. Detection will focus on crontab jobs...
task jobdetection fyischeduledcronmacos
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_spawn_explorer/
RunDLL32 Spawning Explorer | Detection.FYI
Detects RunDLL32.exe spawning explorer.exe as child, which is very uncommon, often observes Gamarue spawning the explorer.exe process in an unusual way
detection fyirundll32spawningexplorer
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_speechruntime_child_process/
Suspicious Speech Runtime Binary Child Process | Detection.FYI
Detects suspicious Speech Runtime Binary Execution by monitoring its child processes. Child processes spawned by SpeechRuntime.exe could indicate an attempt...
child process detectionsuspiciousspeechruntimebinary
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_agentexecutor_potential_abuse/
AgentExecutor PowerShell Execution | Detection.FYI
Detects execution of the AgentExecutor.exe binary. Which can be abused as a LOLBIN to execute powershell scripts with the ExecutionPolicy
execution detection fyipowershell
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_enable_susp_windows_optional_feature/
Potential Suspicious Windows Feature Enabled - ProcCreation | Detection.FYI
Detects usage of the built-in PowerShell cmdlet
potential suspiciouswindows featuredetection fyienabled
https://detection.fyi/sigmahq/sigma/windows/network_connection/net_connection_win_regsvr32_network_activity/
Network Connection Initiated By Regsvr32.EXE | Detection.FYI
Detects a network connection initiated by
exe detection fyinetwork connectioninitiatedregsvr32
https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_add_load_service_in_safe_mode/
Registry Persistence via Service in Safe Mode | Detection.FYI
Detects the modification of the registry to allow a driver or service to persist in Safe Mode.
persistence viasafe modedetection fyiregistryservice
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_kd_execution/
Windows Kernel Debugger Execution | Detection.FYI
Detects execution of the Windows Kernel Debugger
execution detection fyiwindows kerneldebugger
https://detection.fyi/joesecurity/sigma-rules/wmiclaunchregsvr32/
Wmic Launch regsvr32 | Detection.FYI
Wmic launch regsvr32
detection fyiwmiclaunchregsvr32
https://detection.fyi/sigmahq/sigma/emerging-threats/2021/exploits/cve-2021-26858/web_cve_2021_26858_iis_rce/
ProxyLogon Reset Virtual Directories Based On IIS Log | Detection.FYI
When exploiting this vulnerability with CVE-2021-26858, an SSRF attack is used to manipulate virtual directories
iis logdetection fyiproxylogonresetvirtual
https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_module/posh_pm_invoke_obfuscation_obfuscated_iex/
Invoke-Obfuscation Obfuscated IEX Invocation - PowerShell Module | Detection.FYI
Detects all variations of obfuscated powershell IEX invocation code generated by Invoke-Obfuscation framework from the code block cited in the reference...
powershell module detectioninvoke obfuscationobfuscatediexinvocation
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hktl_hydra/
HackTool - Hydra Password Bruteforce Execution | Detection.FYI
Detects command line parameters used by Hydra password guessing hack tool
execution detection fyihacktoolhydrapasswordbruteforce
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_rundll32_shelldispatch_potential_abuse/
Potential ShellDispatch.DLL Functionality Abuse | Detection.FYI
abuse detectionpotentialdllfunctionalityfyi
https://detection.fyi/sigmahq/sigma/windows/sysmon/sysmon_file_block_shredding/
Sysmon Blocked File Shredding | Detection.FYI
Triggers on any Sysmon
detection fyisysmonblockedfileshredding
https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_create_non_existent_dlls/
Creation Of Non-Existent System DLL | Detection.FYI
Detects creation of specific system DLL files that are usually not present on the system (or at least not in system directories) but may be loaded by …
non existentdetection fyicreationsystemdll
https://detection.fyi/sigmahq/sigma/windows/builtin/system/microsoft_windows_iphlpsvc/win_system_isatap_router_address_set/
ISATAP Router Address Was Set | Detection.FYI
Detects the configuration of a new ISATAP router on a Windows host. While ISATAP is a legitimate Microsoft technology for IPv6 transition, unexpected or …
detection fyirouteraddressset
https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_esxcli_permission_change_admin/
ESXi Admin Permission Assigned To Account Via ESXCLI | Detection.FYI
Detects execution of the
admin permissionaccount viadetection fyiesxiassigned
https://detection.fyi/tags/attack.t1553/
attack.t1553 | Detection.FYI
detection fyiattack
https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_susp_vscode_powershell_profile/
VsCode Powershell Profile Modification | Detection.FYI
Detects the creation or modification of a vscode related powershell profile which could indicate suspicious activity as the profile can be used as a mean of …
modification detection fyivscodepowershellprofile
https://detection.fyi/tags/attack.t1587/
attack.t1587 | Detection.FYI
detection fyiattackt1587
https://detection.fyi/tags/attack.t1203/
attack.t1203 | Detection.FYI
detection fyiattack
https://detection.fyi/sigmahq/sigma/emerging-threats/2021/exploits/cve-2021-26814/web_cve_2021_26814_wzuh_rce/
Exploitation of CVE-2021-26814 in Wazuh | Detection.FYI
Detects the exploitation of the Wazuh RCE vulnerability described in CVE-2021-26814
cve 2021detection fyiexploitation26814wazuh
https://detection.fyi/tags/attack.t1176/
attack.t1176 | Detection.FYI
detection fyiattack
https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_pcre_net_temp_file/
PCRE.NET Package Temp Files | Detection.FYI
Detects processes creating temp files related to PCRE.NET package
detection fyipcrepackagetempfiles
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_cli_obfuscation_escape_char/
Potential Commandline Obfuscation Using Escape Characters | Detection.FYI
Detects potential commandline obfuscation using known escape characters
escape charactersdetection fyipotentialcommandlineobfuscation
https://detection.fyi/tags/attack.lateral_movement/
attack.lateral_movement | Detection.FYI
lateral movement detectionattackfyi
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_msra_process_injection/
Potential Process Injection Via Msra.EXE | Detection.FYI
Detects potential process injection via Microsoft Remote Asssistance (Msra.exe) by looking at suspicious child processes spawned from the aforementioned …
exe detection fyiprocess injectionpotentialvia
https://detection.fyi/tags/attack.discovery/
attack.discovery | Detection.FYI
discovery detection fyiattack
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_dnscmd_install_new_server_level_plugin_dll/
New DNS ServerLevelPluginDll Installed Via Dnscmd.EXE | Detection.FYI
Detects the installation of a DNS plugin DLL via ServerLevelPluginDll parameter in registry, which can be used to execute code in context of the DNS server …
exe detection fyinew dnsinstalledvia
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_remote_access_tools_logmein/
Remote Access Tool - LogMeIn Execution | Detection.FYI
An adversary may use legitimate desktop support and remote access software, such as Team Viewer, Go2Assist, LogMein, AmmyyAdmin, etc, to establish an …
remote access toolexecution detection fyilogmein
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_susp_eventlog_content_recon/
Potentially Suspicious EventLog Recon Activity Using Log Query Utilities | Detection.FYI
Detects execution of different log query utilities and commands to search and dump the content of specific event logs or look for specific event IDs. This …
potentially suspiciousactivity usingdetection fyieventlogrecon
https://detection.fyi/sigmahq/sigma/emerging-threats/2021/malware/devil-bait/proc_creation_win_malware_devil_bait_output_redirect/
Potential Devil Bait Malware Reconnaissance | Detection.FYI
Detects specific process behavior observed with Devil Bait samples
detection fyipotentialdevilbaitmalware
https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_module/posh_pm_syncappvpublishingserver_exe/
SyncAppvPublishingServer Bypass Powershell Restriction - PS Module | Detection.FYI
Detects SyncAppvPublishingServer process execution which usually utilized by adversaries to bypass PowerShell execution restrictions.
module detection fyibypasspowershellrestrictionps
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_appvlp_uncommon_child_process/
Uncommon Child Process Of Appvlp.EXE | Detection.FYI
Detects uncommon child processes of Appvlp.EXE Appvlp or the Application Virtualization Utility is included with Microsoft Office. Attackers are able to abuse …
exe detection fyichild processuncommon
https://detection.fyi/mbabinski/sigma-rules/2023_impacket/atexec/win_file_creation_impacket_atexec/
Impacket AtExec Suspicious Temp File Creation | Detection.FYI
Detects Atexec.py (Impacket) suspicious file creation in Windows temp directory.
file creation detectionsuspicioustempfyi
https://detection.fyi/sigmahq/sigma/linux/auditd/syscall/lnx_auditd_create_account/
Creation Of An User Account | Detection.FYI
Detects the creation of a new user account. Such accounts may be used for persistence that do not require persistent remote access tools to be deployed on the …
account detection fyicreationuser
https://detection.fyi/sigmahq/sigma/emerging-threats/2024/exploits/cve-2024-1708/file_event_win_exploit_cve_2024_1708_screenconnect/
CVE-2024-1708 - ScreenConnect Path Traversal Exploitation | Detection.FYI
This detects file modifications to ASPX and ASHX files within the root of the App_Extensions directory, which is allowed by a ZipSlip vulnerability in versions...
cve 2024path traversaldetection fyi1708screenconnect
https://detection.fyi/mbabinski/sigma-rules/2022_renamesystemutilities/file_creation_exe_in_temp_directories_4663/
File Creation of Executables in Temp Folders (Event 4663) | Detection.FYI
Detects creation of files potentially matching attempts to copy executables to temporary directories to hide usage.
file creationdetection fyiexecutablestempfolders
https://detection.fyi/tags/attack.t1562/
attack.t1562 | Detection.FYI
detection fyiattackt1562
https://detection.fyi/tags/attack.t1003/
attack.t1003 | Detection.FYI
attack t1003detection fyi
https://detection.fyi/tags/car.2022-03-001/
car.2022-03-001 | Detection.FYI
001 detection fyi2022 03car
https://detection.fyi/sigmahq/sigma/emerging-threats/2021/exploits/cve-2021-26857/proc_creation_win_exploit_cve_2021_26857_msexchange/
Potential CVE-2021-26857 Exploitation Attempt | Detection.FYI
Detects possible successful exploitation for vulnerability described in CVE-2021-26857 by looking for | abnormal subprocesses spawning by Exchange Server's …
attempt detection fyipotential cve2021exploitation
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_odbcconf_register_dll_regsvr/
New DLL Registered Via Odbcconf.EXE | Detection.FYI
Detects execution of
exe detection fyinewdllregisteredvia
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_sysinternals_tools_masquerading/
Potential Binary Impersonating Sysinternals Tools | Detection.FYI
Detects binaries that use the same name as legitimate sysinternals tools to evade detection. This rule looks for the execution of binaries that are named …
tools detection fyipotentialbinaryimpersonatingsysinternals
https://detection.fyi/tags/attack.t1490/
attack.t1490 | Detection.FYI
detection fyiattack
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_qemu_suspicious_execution/
Potentially Suspicious Usage Of Qemu | Detection.FYI
Detects potentially suspicious execution of the Qemu utility in a Windows environment. Threat actors have leveraged this utility and this technique for …
potentially suspiciousdetection fyiusageqemu
https://detection.fyi/tags/attack.t1110/
attack.t1110 | Detection.FYI
detection fyiattackt1110
https://detection.fyi/sigmahq/sigma/cloud/azure/activity_logs/azure_network_virtual_device_modified_or_deleted/
Azure Virtual Network Device Modified or Deleted | Detection.FYI
Identifies when a virtual network device is being modified or deleted. This can be a network interface, network virtual appliance, virtual hub, or virtual …
deleted detection fyiazure virtualnetwork devicemodified
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_hostname_execution/
Suspicious Execution of Hostname | Detection.FYI
Use of hostname to get information
suspicious executiondetection fyihostname
https://detection.fyi/joesecurity/sigma-rules/officeproductdropsexecutableatsuspiciouslocation/
Office product drops executable at suspicious location | Detection.FYI
Office product drops executable at suspicious location
location detection fyioffice productdropsexecutablesuspicious
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_addinutil_uncommon_dir_exec/
AddinUtil.EXE Execution From Uncommon Directory | Detection.FYI
Detects execution of the Add-In deployment cache updating utility (AddInutil.exe) from a non-standard directory.
detection fyiexeuncommondirectory
https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_meterpreter_or_cobaltstrike_getsystem_service_install/
Meterpreter or Cobalt Strike Getsystem Service Installation - Security | Detection.FYI
Detects the use of getsystem Meterpreter/Cobalt Strike command by detecting a specific service installation
cobalt strikeservice installationsecurity detectionmeterpretergetsystem
https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_sysinternals_psexec_service/
PsExec Service File Creation | Detection.FYI
Detects default PsExec service filename which indicates PsExec service installation and execution
file creation detectionservicefyi
https://detection.fyi/tags/attack.t1055.003/
attack.t1055.003 | Detection.FYI
003 detection fyiattackt1055
https://detection.fyi/sigmahq/sigma/emerging-threats/2018/ta/slingshot/proc_creation_win_apt_slingshot/
Defrag Deactivation | Detection.FYI
Detects the deactivation and disabling of the Scheduled defragmentation task as seen by Slingshot APT group
detection fyidefragdeactivation
https://detection.fyi/tags/attack.t1543.003/
attack.t1543.003 | Detection.FYI
003 detection fyiattackt1543
https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_clearing_windows_console_history/
Clearing Windows Console History | Detection.FYI
Identifies when a user attempts to clear console history. An adversary may clear the command history of a compromised account to conceal the actions undertaken...
windows consoledetection fyiclearinghistory
https://detection.fyi/sigmahq/sigma/windows/file/file_access/file_access_win_susp_credential_manager_access/
Credential Manager Access By Uncommon Applications | Detection.FYI
Detects suspicious processes based on name and location that access the windows credential manager and vault. Which can be a sign of credential stealing. …
credential managerdetection fyiaccessuncommonapplications
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wab_execution_from_non_default_location/
Wab Execution From Non Default Location | Detection.FYI
Detects execution of wab.exe (Windows Contacts) and Wabmig.exe (Microsoft Address Book Import Tool) from non default locations as seen with bumblebee activity
location detection fyinon defaultwabexecution
https://detection.fyi/sigmahq/sigma/windows/builtin/windefend/win_defender_antimalware_platform_expired/
Windows Defender Grace Period Expired | Detection.FYI
Detects the expiration of the grace period of Windows Defender. This means protection against viruses, spyware, and other potentially unwanted software is …
windows defendergrace perioddetection fyiexpired
https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_hktl_dumpert/
HackTool - Dumpert Process Dumper Default File | Detection.FYI
Detects the creation of the default dump file used by Outflank Dumpert tool. A process dumper, which dumps the lsass process memory
default filedetection fyihacktoolprocessdumper
https://detection.fyi/sigmahq/sigma/emerging-threats/2021/exploits/cve-2021-21978/web_cve_2021_21978_vmware_view_planner_exploit/
CVE-2021-21978 Exploitation Attempt | Detection.FYI
Detects the exploitation of the VMware View Planner vulnerability described in CVE-2021-21978
attempt detection fyicve 2021exploitation
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_install_unsigned_appx_packages/
Unsigned AppX Installation Attempt Using Add-AppxPackage | Detection.FYI
Detects usage of the
using adddetection fyiunsignedappxinstallation
https://detection.fyi/sigmahq/sigma/linux/process_creation/proc_creation_lnx_mkfifo_named_pipe_creation_susp_location/
Potentially Suspicious Named Pipe Created Via Mkfifo | Detection.FYI
Detects the creation of a new named pipe using the
potentially suspiciousnamed pipecreated viadetection fyimkfifo
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_conhost_susp_winshell_child_process/
Potentially Suspicious Child Processes Spawned by ConHost | Detection.FYI
Detects suspicious child processes related to Windows Shell utilities spawned by conhost.exe, which could indicate malicious activity using trusted system …
potentially suspicious childprocesses spawneddetection fyi
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mshta_susp_child_processes/
Suspicious MSHTA Child Process | Detection.FYI
Detects a suspicious process spawning from an
child process detectionsuspiciousmshtafyi
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_bcp_export_data/
Data Export From MSSQL Table Via BCP.EXE | Detection.FYI
Detects the execution of the BCP utility in order to export data from the database. Attackers were seen saving their malware to a database column or table and …
exe detection fyidata exportmssqltablevia
https://detection.fyi/tags/attack.t1546.008/
attack.t1546.008 | Detection.FYI
attack t1546detection fyi008
https://detection.fyi/tags/attack.t1027/
attack.t1027 | Detection.FYI
detection fyiattackt1027
https://detection.fyi/sigmahq/sigma/cloud/azure/activity_logs/azure_owner_removed_from_application_or_service_principal/
Azure Owner Removed From Application or Service Principal | Detection.FYI
Identifies when a owner is was removed from a application or service principal in Azure.
detection fyiazureownerremovedapplication
https://detection.fyi/mbabinski/sigma-rules/2023_onenote_malware/win_proc_creation_regasm_process_injection/
Suspicious Process Injection to RegAsm | Detection.FYI
Detects potential process injection of RegAsm.exe as indicated by lack of command-line arguments. This was observed in a recent campaign to distribute AsyncRAT...
process injectiondetection fyisuspicious
https://detection.fyi/sigmahq/sigma/emerging-threats/2021/malware/pingback/file_event_win_malware_pingback_backdoor/
Pingback Backdoor File Indicators | Detection.FYI
Detects the use of Pingback backdoor that creates ICMP tunnel for C2 as described in the trustwave report
indicators detection fyipingbackbackdoorfile
https://detection.fyi/sigmahq/sigma/windows/builtin/security/win_security_audit_log_cleared/
Security Eventlog Cleared | Detection.FYI
One of the Windows Eventlogs has been cleared. e.g. caused by
detection fyisecurityeventlogcleared
https://detection.fyi/sigmahq/sigma/windows/powershell/powershell_script/posh_ps_x509enrollment/
Suspicious X509Enrollment - Ps Script | Detection.FYI
Detect use of X509Enrollment
script detection fyisuspiciousps
https://detection.fyi/tags/attack.t1003.001/
attack.t1003.001 | Detection.FYI
001 detection fyiattack t1003
https://detection.fyi/sigmahq/sigma/identity/okta/okta_fastpass_phishing_detection/
Okta FastPass Phishing Detection | Detection.FYI
Detects when Okta FastPass prevents a known phishing site.
okta fastpassphishing detectionfyi
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_invocation_specific/
Suspicious PowerShell Invocations - Specific - ProcessCreation | Detection.FYI
Detects suspicious PowerShell invocation command parameters
detection fyisuspiciouspowershellinvocationsspecific
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_presentationhost_download/
Arbitrary File Download Via PresentationHost.EXE | Detection.FYI
arbitrary file downloadexe detection fyivia
https://detection.fyi/tags/attack.command-and-control/
attack.command-and-control | Detection.FYI
detection fyiattackcommandcontrol
https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_uac_disable_secure_desktop_prompt/
UAC Secure Desktop Prompt Disabled | Detection.FYI
Detects when an attacker tries to change User Account Control (UAC) elevation request destination via the
disabled detection fyisecure desktopuacprompt
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_mstsc_run_local_rpd_file_susp_parent/
Mstsc.EXE Execution From Uncommon Parent | Detection.FYI
Detects potential RDP connection via Mstsc using a local
detection fyiexeuncommonparent
https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_hktl_safetykatz/
HackTool - SafetyKatz Dump Indicator | Detection.FYI
Detects default lsass dump filename generated by SafetyKatz.
detection fyihacktooldumpindicator
https://detection.fyi/sigmahq/sigma/network/zeek/zeek_http_executable_download_from_webdav/
Executable from Webdav | Detection.FYI
Detects executable access via webdav6. Can be seen in APT 29 such as from the emulated APT 29 hackathon https://github.com/OTRF/detection-hackathon-apt29/
detection fyiexecutablewebdav
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_schtasks_reg_loader_encoded/
Scheduled Task Executing Encoded Payload from Registry | Detection.FYI
Detects the creation of a schtask that potentially executes a base64 encoded payload stored in the Windows Registry using PowerShell.
registry detection fyischeduled taskexecutingencodedpayload
https://detection.fyi/sigmahq/sigma/windows/registry/registry_set/registry_set_persistence_office_vsto/
Potential Persistence Via Visual Studio Tools for Office | Detection.FYI
Detects persistence via Visual Studio Tools for Office (VSTO) add-ins in Office applications.
potential persistence viavisual studiodetection fyitoolsoffice
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_net_start_service/
Start Windows Service Via Net.EXE | Detection.FYI
Detects the usage of the
exe detection fyiwindows servicestartvia
https://detection.fyi/loginsoft-research/detection-rules/active-exploits/cve-2021-22205/
CVE-2021-22205 | Detection.FYI
Detection of CVE-2021-22205 observed from our Honeypots
cve 2021detection fyi22205
https://detection.fyi/sigmahq/sigma/windows/file/file_event/file_event_win_aspnet_temp_files/
Assembly DLL Creation Via AspNetCompiler | Detection.FYI
Detects the creation of new DLL assembly files by
creation viadetection fyiassemblydll
https://detection.fyi/tags/attack.t1053.005/
attack.t1053.005 | Detection.FYI
detection fyiattackt1053005
https://detection.fyi/sigmahq/sigma/windows/builtin/appxdeployment_server/win_appxdeployment_server_appx_downloaded_from_file_sharing_domains/
Remote AppX Package Downloaded from File Sharing or CDN Domain | Detection.FYI
Detects an appx package that was added to the pipeline of the
file sharingdetection fyiremoteappxpackage
https://detection.fyi/sigmahq/sigma/network/dns/net_dns_wannacry_killswitch_domain/
Wannacry Killswitch Domain | Detection.FYI
Detects wannacry killswitch domain dns queries
detection fyiwannacrykillswitchdomain
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_wmic_recon_group/
Local Groups Reconnaissance Via Wmic.EXE | Detection.FYI
Detects the execution of
exe detection fyilocal groupsreconnaissanceviawmic
https://detection.fyi/sigmahq/sigma/windows/image_load/image_load_side_load_smadhook/
Potential SmadHook.DLL Sideloading | Detection.FYI
Detects potential DLL sideloading of
dll sideloading detectionpotentialfyi
https://detection.fyi/sigmahq/sigma/macos/process_creation/proc_creation_macos_disable_security_tools/
Disable Security Tools | Detection.FYI
Detects disabling security tools
tools detection fyidisablesecurity
https://detection.fyi/sigmahq/sigma/windows/process_creation/proc_creation_win_powershell_frombase64string_archive/
Suspicious FromBase64String Usage On Gzip Archive - Process Creation | Detection.FYI
Detects attempts of decoding a base64 Gzip archive via PowerShell. This technique is often used as a method to load malicious content into memory afterward.
creation detection fyisuspicioususagegziparchive
https://detection.fyi/sigmahq/sigma/windows/builtin/dns_client/win_dns_client_tor_onion/
Query Tor Onion Address - DNS Client | Detection.FYI
Detects DNS resolution of an .onion address related to Tor routing networks
client detection fyitor onionqueryaddressdns