Alert Rules
Alert Rules
1 Alert Rules 1
1.1 Required Log Source . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
i
2.30 LP_Proxy Execution via Desktop Setting Control Panel . . . . . . . . . . . 16
2.31 LP_ScreenSaver Registry Key Set Detected . . . . . . . . . . . . . . . . . 17
2.32 LP_Xwizard DLL Side Loading Detected . . . . . . . . . . . . . . . . . . . 17
2.33 LP_DLL Side Loading Via Microsoft Defender . . . . . . . . . . . . . . . . 18
2.34 LP_ZIP File Creation or Extraction via Printer Migration CLI Tool . . . . . 18
2.35 LP_Credentials Capture via Rpcping Detected . . . . . . . . . . . . . . . . 19
2.36 LP_Suspicious ConfigSecurityPolicy Execution Detected . . . . . . . . . . 19
2.37 LP_C-Sharp Code Compilation Using Ilasm Detected . . . . . . . . . . . . 19
2.38 LP_Process Dump via Resource Leak Diagnostic Tool . . . . . . . . . . . . 20
2.39 LP_Suspicious DLL execution via Register-Cimprovider . . . . . . . . . . . 20
2.40 Accessibility features - Process . . . . . . . . . . . . . . . . . . . . . . . . 21
2.41 LP_Accessibility Features-Registry . . . . . . . . . . . . . . . . . . . . . . 21
2.42 LP_Account Discovery Detected . . . . . . . . . . . . . . . . . . . . . . . 22
2.43 LP_Active Directory DLLs Loaded By Office Applications . . . . . . . . . . 22
2.44 LP_DCSync detected . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
2.45 LP_Active Directory Replication User Backdoor . . . . . . . . . . . . . . . 23
2.46 LP_Active Directory Schema Change Detected . . . . . . . . . . . . . . . 24
2.47 LP_Activity Related to NTDS Domain Hash Retrieval . . . . . . . . . . . . 24
2.48 LP_AD Object WriteDAC Access Detected . . . . . . . . . . . . . . . . . 25
2.49 LP_AD Privileged Users or Groups Reconnaissance Detected . . . . . . . 25
2.50 LP_Addition of SID History to Active Directory Object . . . . . . . . . . . 26
2.51 LP_Admin User Remote Logon Detected . . . . . . . . . . . . . . . . . . . 26
2.52 LP_Adobe Flash Use-After-Free Vulnerability Detected . . . . . . . . . . . 26
2.53 LP_Adwind RAT JRAT Detected . . . . . . . . . . . . . . . . . . . . . . . . 27
2.54 LP_Antivirus Exploitation Framework Detection . . . . . . . . . . . . . . . 27
2.55 LP_Antivirus Password Dumper Detected . . . . . . . . . . . . . . . . . . 28
2.56 LP_Antivirus Web Shell Detected . . . . . . . . . . . . . . . . . . . . . . . 28
2.57 LP_Apache Struts 2 Remote Code Execution Detected . . . . . . . . . . . 29
2.58 LP_AppCert DLLs Detected . . . . . . . . . . . . . . . . . . . . . . . . . . 29
2.59 LP_Application Shimming - File Access Detected . . . . . . . . . . . . . . 29
2.60 LP_Application Whitelisting Bypass via Bginfo Detected . . . . . . . . . . 30
2.61 LP_Application Whitelisting Bypass via DLL Loaded by odbcconf Detected 30
2.62 LP_Application Whitelisting Bypass via Dnx Detected . . . . . . . . . . . 31
2.63 LP_Audio Capture Detected . . . . . . . . . . . . . . . . . . . . . . . . . . 31
2.64 LP_Authentication Package Detected . . . . . . . . . . . . . . . . . . . . . 32
2.65 LP_Autorun Keys Modification Detected . . . . . . . . . . . . . . . . . . . 32
2.66 LP_Batch Scripting Detected . . . . . . . . . . . . . . . . . . . . . . . . . . 33
2.67 LP_BITS Jobs - Network Detected . . . . . . . . . . . . . . . . . . . . . . 33
2.68 LP_BITS Jobs - Process Detected . . . . . . . . . . . . . . . . . . . . . . . 34
2.69 LP_Bloodhound and Sharphound Hack Tool Detected . . . . . . . . . . . 34
2.70 LP_BlueMashroom DLL Load Detected . . . . . . . . . . . . . . . . . . . . 34
2.71 LP_Browser Bookmark Discovery . . . . . . . . . . . . . . . . . . . . . . . 35
2.72 LP_CACTUSTORCH Remote Thread Creation Detected . . . . . . . . . . 35
2.73 LP_Call to a Privileged Service Failed . . . . . . . . . . . . . . . . . . . . . 36
2.74 LP_Capture a Network Trace with netsh . . . . . . . . . . . . . . . . . . . 36
ii
2.75 LP_CEO Fraud - Possible Fraudulent Email Behavior . . . . . . . . . . . . 37
2.76 LP_Certutil Encode Detected . . . . . . . . . . . . . . . . . . . . . . . . . 37
2.77 LP_Chafer Activity Detected . . . . . . . . . . . . . . . . . . . . . . . . . . 38
2.78 LP_Change of Default File Association Detected . . . . . . . . . . . . . . 38
2.79 LP_Citrix ADC VPN Directory Traversal Detected . . . . . . . . . . . . . . 39
2.80 LP_Clear Command History . . . . . . . . . . . . . . . . . . . . . . . . . . 39
2.81 LP_Clearing of PowerShell Logs Detected . . . . . . . . . . . . . . . . . . 39
2.82 LP_Clipboard Data Access Detected . . . . . . . . . . . . . . . . . . . . . 40
2.83 LP_Clop Ransomware Emails Sent to Attacker . . . . . . . . . . . . . . . . 40
2.84 LP_Clop Ransomware Infected Host Detected . . . . . . . . . . . . . . . . 41
2.85 LP_Cmdkey Cached Credentials Recon Detected . . . . . . . . . . . . . . 41
2.86 LP_CMSTP Detected . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
2.87 LP_CMSTP Execution Detected . . . . . . . . . . . . . . . . . . . . . . . . 42
2.88 LP_CMSTP UAC Bypass via COM Object Access . . . . . . . . . . . . . . 42
2.89 LP_CobaltStrike Process Injection Detected . . . . . . . . . . . . . . . . . 43
2.90 LP_Windows Command Line Execution with Suspicious URL and
AppData Strings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
2.91 LP_Compiled HTML File Detected . . . . . . . . . . . . . . . . . . . . . . 44
2.92 LP_Component Object Model Hijacking Detected . . . . . . . . . . . . . 44
2.93 LP_Connection to Hidden Cobra Source . . . . . . . . . . . . . . . . . . . 45
2.94 LP_Console History Discovery Detected . . . . . . . . . . . . . . . . . . . 45
2.95 LP_Control Panel Items - Process Detected . . . . . . . . . . . . . . . . . 45
2.96 LP_Control Panel Items - Registry Detected . . . . . . . . . . . . . . . . . 46
2.97 LP_Control Panel Items Detected . . . . . . . . . . . . . . . . . . . . . . . 46
2.98 LP_Copy from Admin Share Detected . . . . . . . . . . . . . . . . . . . . 47
2.99 LP_Copying Sensitive Files with Credential Data . . . . . . . . . . . . . . 47
2.100LP_Copyright Violation Email . . . . . . . . . . . . . . . . . . . . . . . . . 48
2.101LP_CrackMapExecWin Detected . . . . . . . . . . . . . . . . . . . . . . . 48
2.102LP_CreateMiniDump Hacktool Detected . . . . . . . . . . . . . . . . . . . 48
2.103LP_CreateRemoteThread API and LoadLibrary . . . . . . . . . . . . . . . 49
2.104LP_Command Obfuscation in Command Prompt . . . . . . . . . . . . . . 49
2.105LP_Command Obfuscation via Character Insertion . . . . . . . . . . . . . 50
2.106LP_Command Obfuscation via Environment Variable Concatenation
Reassembly . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
2.107LP_Credential Access via Input Prompt Detected . . . . . . . . . . . . . . 50
2.108LP_Credential Dump Tools Dropped Files Detected . . . . . . . . . . . . 51
2.109LP_Credential Dumping - Process Creation . . . . . . . . . . . . . . . . . 51
2.110LP_Credential Dumping - Process Access . . . . . . . . . . . . . . . . . . 52
2.111LP_Credential Dumping - Registry Save . . . . . . . . . . . . . . . . . . . 52
2.112LP_Credential Dumping with ImageLoad Detected . . . . . . . . . . . . . 53
2.113LP_Credentials Access in Files Detected . . . . . . . . . . . . . . . . . . . 53
2.114LP_Credentials in Registry Detected . . . . . . . . . . . . . . . . . . . . . 54
2.115LP_Curl Start Combination Detected . . . . . . . . . . . . . . . . . . . . . 54
2.116LP_CVE-2019-0708 RDP RCE Vulnerability Detected . . . . . . . . . . . . 55
2.117LP_Data Compression Detected in Windows . . . . . . . . . . . . . . . . 55
iii
2.118LP_Data Staging Process Detected in Windows . . . . . . . . . . . . . . . 55
2.119LP_Default Accepted Traffic From Bad IP . . . . . . . . . . . . . . . . . . . 56
2.120LP_Default Account Created but Password Not Changed . . . . . . . . . 56
2.121LP_Default Account privilege elevation followed by restoration of
previous account state . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
2.122LP_Default Audit Policy Changed . . . . . . . . . . . . . . . . . . . . . . . 57
2.123LP_Default Blocked Inbound Traffic followed by Allowed Event . . . . . . 58
2.124LP_Default Blocked Outbound Traffic followed by Allowed Event . . . . . 58
2.125LP_Default Brute Force Attack Attempt - Multiple Unique Sources . . . . 59
2.126LP_Default Brute Force Attack Attempt - Multiple Unique Users . . . . . 59
2.127LP_Default Brute Force Attack Successful . . . . . . . . . . . . . . . . . . 60
2.128LP_Default Connection Attempts on Closed Port . . . . . . . . . . . . . . 60
2.129LP_Default CPU Usage Status . . . . . . . . . . . . . . . . . . . . . . . . . 61
2.130LP_Default Device Stopped Sending Logs for Half an Hour . . . . . . . . 61
2.131LP_Default DNS Tunneling Detection - Data Transfer Size . . . . . . . . . 61
2.132LP_Default DNS Tunneling Detection - Multiple domains . . . . . . . . . . 62
2.133LP_Default DNS Tunneling Detection - Multiple Subdomains . . . . . . . 62
2.134LP_Default DNS Tunneling Detection - Query Size . . . . . . . . . . . . . 63
2.135LP_Default Excessive Authentication Failures . . . . . . . . . . . . . . . . 63
2.136LP_Default Excessive Blocked Connections . . . . . . . . . . . . . . . . . 64
2.137LP_Default Excessive HTTP Errors . . . . . . . . . . . . . . . . . . . . . . . 64
2.138LP_Default File Association Changed . . . . . . . . . . . . . . . . . . . . . 64
2.139LP_Default Guest Account Added to Administrative Group . . . . . . . . 65
2.140LP_Default High Unique DNS Traffic . . . . . . . . . . . . . . . . . . . . . 65
2.141LP_Default High Unique SMTP Traffic . . . . . . . . . . . . . . . . . . . . . 66
2.142LP_Default High Unique Web-Server traffic . . . . . . . . . . . . . . . . . 66
2.143LP_Default Inbound Connection with Non-Whitelist Country . . . . . . . 67
2.144LP_Default Inbound Queries Denied by Firewalls . . . . . . . . . . . . . . 67
2.145LP_Default Inbound RDP Connection . . . . . . . . . . . . . . . . . . . . . 67
2.146LP_Default Inbound SMB Connection . . . . . . . . . . . . . . . . . . . . . 68
2.147LP_Default Inbound SMTP Connection . . . . . . . . . . . . . . . . . . . . 68
2.148LP_Default Inbound SSH Connection . . . . . . . . . . . . . . . . . . . . . 69
2.149LP_Default Internal Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
2.150LP_Default Internal Virus Worm Outburst . . . . . . . . . . . . . . . . . . 70
2.151LP_Default IRC connection . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
2.152LP_Default Malware Detected . . . . . . . . . . . . . . . . . . . . . . . . . 70
2.153LP_Default Malware Detected in Various Machines . . . . . . . . . . . . . 71
2.154LP_Default Malware not Cleaned . . . . . . . . . . . . . . . . . . . . . . . 71
2.155LP_Default Malware Removed . . . . . . . . . . . . . . . . . . . . . . . . . 72
2.156LP_Default Memory Usage Status . . . . . . . . . . . . . . . . . . . . . . . 72
2.157LP_Default Network Configuration Change on Network Device . . . . . . 72
2.158LP_Default Outbound Connection with Non-Whitelist Country . . . . . . 73
2.159LP_Default Outbound Traffic from Unusual Source . . . . . . . . . . . . . 73
2.160LP_Default Port Scan Detected . . . . . . . . . . . . . . . . . . . . . . . . 74
2.161LP_Default Possible Cross Site Scripting Attack Detected . . . . . . . . . 74
iv
2.162LP_Default Possible Network Performance Degradation Detected . . . . 75
2.163LP_Default Possible Non-PCI Compliant Inbound Network Traffic Detected 75
2.164LP_Default Possible Spamming Zombie . . . . . . . . . . . . . . . . . . . 76
2.165LP_Default Possible SQL Injection Attack . . . . . . . . . . . . . . . . . . 76
2.166LP_Default Possible System Instability State Detected . . . . . . . . . . . 76
2.167LP_Default PowerSploit and Empire Schtasks Persistence . . . . . . . . . 77
2.168LP_Default Successful Login outside Normal Hour . . . . . . . . . . . . . 77
2.169LP_Default Successful Login Using a Default Account . . . . . . . . . . . . 78
2.170LP_Default Suspicious DNS Queries with Higher Data Size . . . . . . . . . 78
2.171LP_Default System Time Change . . . . . . . . . . . . . . . . . . . . . . . 79
2.172LP_Default TCP Port Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
2.173LP_Default TCP Probable SynFlood Attack . . . . . . . . . . . . . . . . . . 80
2.174LP_Default UDP Port Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
2.175LP_Default Unapproved Port Activity Detected . . . . . . . . . . . . . . . 80
2.176LP_Default Unusual Number of Failed Vendor User Login . . . . . . . . . 81
2.177LP_Detection of PowerShell Execution via DLL . . . . . . . . . . . . . . . 81
2.178LP_Devtoolslauncher Executes Specified Binary . . . . . . . . . . . . . . . 82
2.179LP_DHCP Callout DLL Installation Detected . . . . . . . . . . . . . . . . . 82
2.180LP_DHCP Server Error Failed Loading the CallOut DLL . . . . . . . . . . . 83
2.181LP_DHCP Server Loaded the CallOut DLL . . . . . . . . . . . . . . . . . . 83
2.182LP_Direct Autorun Keys Modification Detected . . . . . . . . . . . . . . . 84
2.183LP_Disable of ETW Trace Detected . . . . . . . . . . . . . . . . . . . . . . 84
2.184LP_MiniNt Registry Key Addition . . . . . . . . . . . . . . . . . . . . . . . 85
2.185LP_Discovery of a System Time Detected . . . . . . . . . . . . . . . . . . 85
2.186LP_Discovery using Bloodhound Detected . . . . . . . . . . . . . . . . . . 86
2.187LP_Discovery via File and Directory Discovery Using Command Prompt . 86
2.188LP_Discovery via Discovery via PowerSploit Recon Module Detected . . 87
2.189LP_DLL Load via LSASS Detected . . . . . . . . . . . . . . . . . . . . . . . 87
2.190LP_DNS Exfiltration Tools Execution Detected . . . . . . . . . . . . . . . 88
2.191LP_DNS Server Error Failed Loading the ServerLevelPluginDLL . . . . . . 88
2.192LP_DNS ServerLevelPluginDll Install . . . . . . . . . . . . . . . . . . . . . 88
2.193LP_Domain Trust Discovery Detected . . . . . . . . . . . . . . . . . . . . . 89
2.194LP_DoppelPaymer Ransomware Connection to Malicious Domains . . . . 89
2.195LP_DoppelPaymer Ransomware Exploitable Vulnerabilities Detected . . 90
2.196LP_DoppelPaymer Ransomware Infected Host Detected . . . . . . . . . . 90
2.197LP_dotNET DLL Loaded Via Office Applications . . . . . . . . . . . . . . . 91
2.198LP_DPAPI Domain Backup Key Extraction Detected . . . . . . . . . . . . 91
2.199LP_DPAPI Domain Master Key Backup Attempt . . . . . . . . . . . . . . . 92
2.200LP_DragonFly - File Upload with Trojan Karagany . . . . . . . . . . . . . . 92
2.201LP_DragonFly - Malicious File Creation . . . . . . . . . . . . . . . . . . . . 92
2.202LP_DragonFly - Watering Hole Sources . . . . . . . . . . . . . . . . . . . . 93
2.203LP_Dridex Process Pattern Detected . . . . . . . . . . . . . . . . . . . . . 93
2.204LP_Droppers Exploiting CVE-2017-11882 Detected . . . . . . . . . . . . 94
2.205LP_Drupal Arbitrary Code Execution Detected . . . . . . . . . . . . . . . 94
2.206LP_DTRACK Process Creation Detected . . . . . . . . . . . . . . . . . . . 94
v
2.207LP_Elevated Command Prompt Activity by Non-Admin User Detected . . 95
2.208LP_Elise Backdoor Detected . . . . . . . . . . . . . . . . . . . . . . . . . . 95
2.209LP_EMC Possible Ransomware Detection . . . . . . . . . . . . . . . . . . 96
2.210LP_Emissary Panda Malware SLLauncher Detected . . . . . . . . . . . . . 96
2.211LP_Emotet Process Creation Detected . . . . . . . . . . . . . . . . . . . . 96
2.212LP_Empire PowerShell Launch Parameters . . . . . . . . . . . . . . . . . . 97
2.213LP_Empire PowerShell UAC Bypass Detected . . . . . . . . . . . . . . . . 97
2.214LP_Enabled User Right in AD to Control User Objects . . . . . . . . . . . 98
2.215LP_Encoded FromBase64String Detected . . . . . . . . . . . . . . . . . . 98
2.216LP_Encoded IEX Detected . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
2.217LP_Encoded PowerShell Command Detected . . . . . . . . . . . . . . . . 99
2.218LP_Endpoint Protect Multiple Failed Login Attempt . . . . . . . . . . . . 100
2.219LP_Equation Group DLL_U Load Detected . . . . . . . . . . . . . . . . . . 100
2.220LP_Eventlog Cleared Detected . . . . . . . . . . . . . . . . . . . . . . . . 101
2.221LP_ExchangeMT Possible Data Theft - Email with Attachment Outside
Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
2.222LP_ExchangeMT Unusual Outbound Email . . . . . . . . . . . . . . . . . . 102
2.223LP_Executables Stored in OneDrive . . . . . . . . . . . . . . . . . . . . . . 102
2.224LP_Execution in Non-Executable Folder Detected . . . . . . . . . . . . . 102
2.225LP_Execution in Outlook Temp Folder Detected . . . . . . . . . . . . . . 103
2.226LP_Execution in Webserver Root Folder Detected . . . . . . . . . . . . . 103
2.227LP_Execution of Renamed PaExec Detected . . . . . . . . . . . . . . . . . 104
2.228LP_Execution via Control Panel Items . . . . . . . . . . . . . . . . . . . . . 104
2.229LP_Execution via HTA using IE JavaScript Engine Detected . . . . . . . . 105
2.230LP_Execution via Squiblydoo Technique Detected . . . . . . . . . . . . . 105
2.231LP_Execution via Windows Scripting Host Component Detected . . . . . 106
2.232LP_Exfiltration and Tunneling Tools Execution . . . . . . . . . . . . . . . . 106
2.233LP_Exim MTA Remote Code Execution Vulnerability Detected . . . . . . 107
2.234LP_Exim Remote Command Execution Detected . . . . . . . . . . . . . . 107
2.235LP_Existing Service Modification Detected . . . . . . . . . . . . . . . . . . 107
2.236LP_Exploit for CVE-2017-0261 Detected . . . . . . . . . . . . . . . . . . . 108
2.237LP_Exploit for CVE-2017-8759 Detected . . . . . . . . . . . . . . . . . . . 108
2.238LP_Exploiting SetupComplete CVE-2019-1378 Detected . . . . . . . . . . 109
2.239LP_External Disk Drive or USB Storage Device Detected . . . . . . . . . . 109
2.240LP_Fail2ban IP Banned . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
2.241LP_File and Directory Discovery Using PowerShell Detected . . . . . . . 110
2.242LP_File Creation by PowerShell Detected . . . . . . . . . . . . . . . . . . 110
2.243LP_File Deletion Detected . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
2.244LP_File or Folder Permissions Modifications . . . . . . . . . . . . . . . . . 111
2.245LP_File System Permissions Weakness . . . . . . . . . . . . . . . . . . . . 112
2.246LP_Fireball Archer Installation Detected . . . . . . . . . . . . . . . . . . . 112
2.247LP_Firewall Configuration Modification Detected . . . . . . . . . . . . . . 113
2.248LP_Firewall Disabled via Netsh Detected . . . . . . . . . . . . . . . . . . . 113
2.249LP_First Time Seen Remote Named Pipe . . . . . . . . . . . . . . . . . . . 114
2.250LP_FirstClass Failed Login Attempt . . . . . . . . . . . . . . . . . . . . . . 114
vi
2.251LP_FirstClass Failed Password Change Attempt . . . . . . . . . . . . . . . 115
2.252LP_Formbook Process Creation Detected . . . . . . . . . . . . . . . . . . 115
2.253LP_FortiGate Admin Login Disable . . . . . . . . . . . . . . . . . . . . . . 115
2.254LP_FortiGate Anomaly . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
2.255LP_FortiGate Antivirus Botnet Warning . . . . . . . . . . . . . . . . . . . . 116
2.256LP_FortiGate Antivirus Scan Engine Load Failed . . . . . . . . . . . . . . 117
2.257LP_FortiGate Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
2.258LP_FortiGate Critical Events . . . . . . . . . . . . . . . . . . . . . . . . . . 117
2.259LP_FortiGate Data Leak Protection . . . . . . . . . . . . . . . . . . . . . . 118
2.260LP_FortiGate IPS Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
2.261LP_FortiGate Malicious URL Attack . . . . . . . . . . . . . . . . . . . . . . 119
2.262LP_FortiGate Virus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
2.263LP_FortiGate VPN SSL User Login Failed . . . . . . . . . . . . . . . . . . . 119
2.264LP_FromBase64String Command Line Detected . . . . . . . . . . . . . . 120
2.265LP_FSecure File Infection . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
2.266LP_FSecure Virus Detection . . . . . . . . . . . . . . . . . . . . . . . . . . 121
2.267LP_Fsutil Suspicious Invocation Detected . . . . . . . . . . . . . . . . . . 121
2.268LP_GAC DLL Loaded Via Office Applications Detected . . . . . . . . . . . 122
2.269LP_Generic Password Dumper Activity on LSASS Detected . . . . . . . . 122
2.270LP_Grabbing Sensitive Hives via Reg Utility . . . . . . . . . . . . . . . . . 123
2.271LP_Hacktool Ruler Detected . . . . . . . . . . . . . . . . . . . . . . . . . . 123
2.272LP_HH Execution Detected . . . . . . . . . . . . . . . . . . . . . . . . . . 123
2.273LP_Hidden Cobra Affected Host . . . . . . . . . . . . . . . . . . . . . . . 124
2.274LP_Hidden Cobra Emails Sent to Attacker . . . . . . . . . . . . . . . . . . 124
2.275LP_Hidden Cobra Vulnerable Sources . . . . . . . . . . . . . . . . . . . . . 125
2.276LP_Hidden Files and Directories - VSS Detected . . . . . . . . . . . . . . 125
2.277LP_Hidden Files and Directories Detected . . . . . . . . . . . . . . . . . . 126
2.278LP_Hidden PowerShell Window Detected . . . . . . . . . . . . . . . . . . 126
2.279LP_Hiding Files with Attrib Detected . . . . . . . . . . . . . . . . . . . . . 127
2.280LP_Hurricane Panda Activity Detected . . . . . . . . . . . . . . . . . . . . 127
2.281LP_IIS Native-Code Module Command Line Installation . . . . . . . . . . 127
2.282LP_Image File Execution Options Injection . . . . . . . . . . . . . . . . . . 128
2.283LP_Service Stop Detected . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
2.284LP_In-memory PowerShell Detected . . . . . . . . . . . . . . . . . . . . . 129
2.285LP_Indicator Blocking - Driver Unloaded . . . . . . . . . . . . . . . . . . . 129
2.286LP_Indicator Blocking - Sysmon Registry Edited . . . . . . . . . . . . . . . 130
2.287LP_Indirect Command Execution Detected . . . . . . . . . . . . . . . . . 130
2.288LP_Install Root Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
2.289LP_Suspicious InstallUtil Execution . . . . . . . . . . . . . . . . . . . . . . 131
2.290LP_InvisiMole Malware Connection to Malicious Domains . . . . . . . . . 132
2.291LP_InvisiMole Malware Connection to Malicious Sources . . . . . . . . . . 132
2.292LP_InvisiMole Malware Exploitable Vulnerabilities Detected . . . . . . . . 132
2.293LP_InvisiMole Malware Infected Host Detected . . . . . . . . . . . . . . . 133
2.294LP_Invocation of Active Directory Diagnostic Tool Detected . . . . . . . . 133
2.295LP_Java Running with Remote Debugging . . . . . . . . . . . . . . . . . . 134
vii
2.296LP_Judgement Panda Exfil Activity . . . . . . . . . . . . . . . . . . . . . . 134
2.297LP_JunOS Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
2.298LP_JunOS Authentication Failed . . . . . . . . . . . . . . . . . . . . . . . . 135
2.299LP_JunOS Policy Violation . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
2.300LP_JunOS Security Log Clear . . . . . . . . . . . . . . . . . . . . . . . . . 136
2.301LP_Kaspersky Antivirus - Outbreak Detection . . . . . . . . . . . . . . . . 136
2.302LP_Kaspersky Antivirus - Update Fail . . . . . . . . . . . . . . . . . . . . . 137
2.303LP_Kaspersky Antivirus Extremely Out of Date Event . . . . . . . . . . . . 137
2.304LP_Kaspersky Antivirus Outbreak Detection by Source . . . . . . . . . . . 137
2.305LP_Kaspersky Antivirus Outbreak Detection by Virus . . . . . . . . . . . . 138
2.306LP_Kaspersky Antivirus Threat Affecting Multiple Host . . . . . . . . . . . 138
2.307LP_Kerberoasting via PowerShell Detected . . . . . . . . . . . . . . . . . 139
2.308LP_Kernel Firewall Connection Denied . . . . . . . . . . . . . . . . . . . . 139
2.309LP_Koadic Execution Detected . . . . . . . . . . . . . . . . . . . . . . . . 140
2.310LP_KRACK Vulnerable Source Detected . . . . . . . . . . . . . . . . . . . 140
2.311LP_Large ICMP Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
2.312LP_Local Account Creation on Workstation Detected . . . . . . . . . . . . 141
2.313LP_Local Accounts Discovery Detected . . . . . . . . . . . . . . . . . . . . 141
2.314LP_Local Port Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
2.315LP_LockCrypt Ransomware . . . . . . . . . . . . . . . . . . . . . . . . . . 142
2.316LP_LockerGoga Malware Affected Host . . . . . . . . . . . . . . . . . . . 143
2.317LP_LockerGoga Malware Emails Sent to Attacker . . . . . . . . . . . . . . 143
2.318LP_Log Files Creation of Dot-Net-to-JS Detected . . . . . . . . . . . . . . 144
2.319LP_Login with WMI Detected . . . . . . . . . . . . . . . . . . . . . . . . . 144
2.320LP_Logon Scripts Detected . . . . . . . . . . . . . . . . . . . . . . . . . . 144
2.321LP_LSASS Access from Non System Account Detected . . . . . . . . . . . 145
2.322LP_LSASS Memory Dump Detected . . . . . . . . . . . . . . . . . . . . . . 145
2.323LP_LSASS Memory Dump File Creation . . . . . . . . . . . . . . . . . . . . 146
2.324LP_LSSAS Memory Dump with MiniDumpWriteDump API Detected . . . 146
2.325LP_LSASS Memory Dumping Detected . . . . . . . . . . . . . . . . . . . . 147
2.326LP_Macro file Creation Detected . . . . . . . . . . . . . . . . . . . . . . . 147
2.327LP_Magecart Exploitable Vulnerabilities Detected . . . . . . . . . . . . . 148
2.328LP_Magecart Threat Connection to Malicious Domains . . . . . . . . . . . 148
2.329LP_Magecart Threat Connection to Malicious Sources . . . . . . . . . . . 148
2.330LP_Malicious Base64 Encoded PowerShell Keywords in Command Lines
Detected . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
2.331LP_Malicious File Execution Detected . . . . . . . . . . . . . . . . . . . . 150
2.332LP_Malicious PowerShell Commandlet Names Detected . . . . . . . . . . 150
2.333LP_Malicious Service Installations Detected . . . . . . . . . . . . . . . . . 151
2.334LP_Malware Shellcode in Verclsid Target Process . . . . . . . . . . . . . . 151
2.335LP_Malware Threat Affected Host . . . . . . . . . . . . . . . . . . . . . . . 152
2.336LP_Malware Threat Connection from Malicious Source . . . . . . . . . . . 152
2.337LP_Malware Threat Connection to Malicious Destination . . . . . . . . . . 152
2.338LP_Malware Threat Connection to Malicious URLs . . . . . . . . . . . . . 153
2.339LP_Malware Threat Emails Sent to Attacker . . . . . . . . . . . . . . . . . 153
viii
2.340LP_Masquerading Extension Detected . . . . . . . . . . . . . . . . . . . . 154
2.341LP_Masquerading File Location Detected . . . . . . . . . . . . . . . . . . 154
2.342LP_Matrix Encrypted Files . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
2.343LP_Matrix Vulnerable Sources . . . . . . . . . . . . . . . . . . . . . . . . . 155
2.344LP_Maze Ransomware Connection to Malicious Domains . . . . . . . . . 155
2.345LP_Maze Ransomware Connection to Malicious Sources . . . . . . . . . . 156
2.346LP_Maze Ransomware Exploitable Vulnerabilities Detected . . . . . . . . 156
2.347LP_Maze Ransomware Infected Host Detected . . . . . . . . . . . . . . . 157
2.348LP_Meltdown and Spectre Vulnerabilities . . . . . . . . . . . . . . . . . . 157
2.349LP_Meterpreter or Cobalt Strike Getsystem Service Start Detected . . . 158
2.350LP_Microsoft ActiveX Control Code Execution Vulnerability Detected . . 158
2.351LP_Microsoft Binary Github Communication Detected . . . . . . . . . . . 159
2.352LP_Microsoft DotNET Framework Remote Code Execution Detected . . 159
2.353LP_Microsoft Office Memory Corruption Vulnerability CVE-2015-1641
Detected . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
2.354LP_Microsoft Office Memory Corruption Vulnerability CVE-2017-0199
Detected . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
2.355LP_Microsoft Office Memory Corruption Vulnerability CVE-2017-11882
Detected . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
2.356LP_Microsoft Office Product Spawning Windows Shell . . . . . . . . . . . 161
2.357LP_Mimikatz Command Line Detected . . . . . . . . . . . . . . . . . . . . 161
2.358LP_Mitre - Initial Access - Hardware Addition - Removable Storage
Connected . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
2.359LP_Mitre - Initial Access - Valid Accounts - Impossible Travel . . . . . . . . 162
2.360LP_Mitre - Initial Access - Valid Accounts - Inactive User Accounts . . . . 163
2.361LP_Mitre Command and Control Using Uncommonly used Port Detected 163
2.362LP_Mitre Credential Access Using Credentials from Web Browsers
Detected . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
2.363LP_Mitre Credential Access Using Credentials in File Detected . . . . . . 164
2.364LP_Mitre Defense Evasion Using Decode Files or Information Detected . 165
2.365LP_Mitre Defense Evasion Using File Deletion Detected . . . . . . . . . . 165
2.366LP_Mitre Discovery Using Account Discovery Detected . . . . . . . . . . 166
2.367LP_Mitre Discovery Using File and Directory Discovery Detected . . . . . 166
2.368LP_Mitre Discovery Using Network Service Scanning Detected . . . . . . 167
2.369LP_Mitre Discovery Using Network Sniffing Detected . . . . . . . . . . . 167
2.370LP_Mitre Discovery Using Password Policy Discovery Detected . . . . . . 168
2.371LP_Mitre Discovery Using Permission Groups Discovery Detected . . . . 168
2.372LP_Mitre Discovery Using Query Registry Detected . . . . . . . . . . . . 169
2.373LP_Mitre Discovery Using Security Software Discovery Detected . . . . . 169
2.374LP_Mitre Discovery Using System Information Discovery Detected . . . . 170
2.375LP_Mitre Discovery Using System Network Configuration Discovery
Detected . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
2.376LP_Mitre Discovery Using System Owner or User Discovery Detected . . 171
2.377LP_Mitre Discovery Using System Service Discovery Detected . . . . . . 171
2.378LP_Mitre Exfiltration Over Alternative Protocol Detected . . . . . . . . . 172
ix
2.379LP_Mitre Lateral Movement Using Remote Services Detected . . . . . . . 172
2.380LP_Mitre Persistence Attack through Accessibility Process Feature . . . . 173
2.381LP_Mitre Persistence Attack through AppInit DLLs . . . . . . . . . . . . . 173
2.382LP_Mitre Persistence Using Account Creation Detected . . . . . . . . . . 173
2.383LP_Mitre Persistence Using Account Manipulation Detected . . . . . . . 174
2.384LP_Mitre Persistence via Winlogon Helper DLL Detected . . . . . . . . . 174
2.385LP_Mitre Possible Privilege Escalation using Application Shimming . . . . 175
2.386LP_Mitre Privilege Escalation Using Bypass User Access Control Detected 175
2.387LP_MMC Spawning Windows Shell Detected . . . . . . . . . . . . . . . . 176
2.388LP_Most Exploitable Vulnerabilities Detected . . . . . . . . . . . . . . . . 176
2.389LP_MS Office Product Spawning Exe in User Dir . . . . . . . . . . . . . . 177
2.390LP_MSHTA - File Access Detected . . . . . . . . . . . . . . . . . . . . . . 177
2.391LP_MSHTA - Activity Detected . . . . . . . . . . . . . . . . . . . . . . . . 177
2.392LP_Mshta JavaScript Execution Detected . . . . . . . . . . . . . . . . . . 178
2.393LP_MSHTA Spawning Windows Shell Detected . . . . . . . . . . . . . . . 178
2.394LP_MSHTA Spwaned by SVCHOST Detected . . . . . . . . . . . . . . . . 179
2.395LP_MSHTA Suspicious Execution Detected . . . . . . . . . . . . . . . . . 179
2.396LP_MsiExec Web Install Detected . . . . . . . . . . . . . . . . . . . . . . . 180
2.397LP_MSTSC Shadowing Detected . . . . . . . . . . . . . . . . . . . . . . . 180
2.398LP_Multiple Failed Login Followed by Successful Login Followed by Logoff180
2.399LP_Mustang Panda Dropper Detected . . . . . . . . . . . . . . . . . . . . 181
2.400LP_Named Pipe added to Null Session Detected . . . . . . . . . . . . . . 181
2.401LP_Narrators Feedback-Hub Persistence Detected . . . . . . . . . . . . . 182
2.402LP_Nefilim Ransomware Infected Host Detected . . . . . . . . . . . . . . 182
2.403LP_Net exe Execution Detected . . . . . . . . . . . . . . . . . . . . . . . . 183
2.404LP_Net exe User Account Creation . . . . . . . . . . . . . . . . . . . . . . 183
2.405LP_NetNTLM Downgrade Attack Detected . . . . . . . . . . . . . . . . . 183
2.406LP_Firewall Addition via Netsh Detected . . . . . . . . . . . . . . . . . . . 184
2.407LP_Netsh Helper DLL - Process Detected . . . . . . . . . . . . . . . . . . 184
2.408LP_Netsh Helper DLL - Registry Detected . . . . . . . . . . . . . . . . . . 185
2.409LP_Netsh Port Forwarding Detected . . . . . . . . . . . . . . . . . . . . . 185
2.410LP_Netsh RDP Port Forwarding Detected . . . . . . . . . . . . . . . . . . 186
2.411LP_Network Share Connection Removed . . . . . . . . . . . . . . . . . . . 186
2.412LP_Network Share Discovery . . . . . . . . . . . . . . . . . . . . . . . . . 187
2.413LP_Network Sniffing Detected . . . . . . . . . . . . . . . . . . . . . . . . . 187
2.414LP_New Driver File Creation Detected . . . . . . . . . . . . . . . . . . . . 188
2.415LP_New Firewall Port Opening Detected . . . . . . . . . . . . . . . . . . . 188
2.416LP_New RUN Key Pointing to Suspicious Folder Detected . . . . . . . . . 188
2.417LP_New Service Creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
2.418LP_Non Interactive PowerShell Execution . . . . . . . . . . . . . . . . . . 189
2.419LP_NoPowerShell Tool Activity Detected . . . . . . . . . . . . . . . . . . . 190
2.420LP_NotPetya Ransomware Activity Detected . . . . . . . . . . . . . . . . 190
2.421LP_OceanLotus Registry Activity Detected . . . . . . . . . . . . . . . . . . 191
2.422LP_Office365 Multiple Failed Login from Different Host by Single User . 191
2.423LP_Office365 Multiple Failed Login from Same Host . . . . . . . . . . . . 192
x
2.424LP_Office365 Multiple Successful Login from Different Country by Single
User . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
2.425LP_Office365 Multiple Successful Login From Different Host by Single User193
2.426LP_Office365 Password Resets . . . . . . . . . . . . . . . . . . . . . . . . 193
2.427LP_OpenWith Execution of Specified Binary Detected . . . . . . . . . . . 194
2.428LP_Possible Operation Wocao Activity Detected . . . . . . . . . . . . . . 194
2.429LP_Pandemic Registry Key Detected . . . . . . . . . . . . . . . . . . . . . 195
2.430LP_Password Change on DSRM Account Detected . . . . . . . . . . . . . 195
2.431LP_Password Dumper Remote Thread in LSASS . . . . . . . . . . . . . . . 195
2.432LP_Password Spraying Attack Detected . . . . . . . . . . . . . . . . . . . 196
2.433LP_Persistence and Execution at Scale via GPO Scheduled Task . . . . . . 196
2.434LP_Petya Affected Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
2.435LP_Petya Compromised Files . . . . . . . . . . . . . . . . . . . . . . . . . 197
2.436LP_Ping Hex IP Detected . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
2.437LP_Ping of Death Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
2.438LP_Possible Access to ADMIN Share . . . . . . . . . . . . . . . . . . . . . 198
2.439LP_Possible Account Misuse-Abnormal Login . . . . . . . . . . . . . . . . 199
2.440LP_Possible Account Misuse-Privilege Escalation . . . . . . . . . . . . . . 200
2.441LP_Possible Applocker Bypass Detected . . . . . . . . . . . . . . . . . . . 200
2.442LP_Possible Bitsadmin Download Detected . . . . . . . . . . . . . . . . . 201
2.443LP_Possible Botnet Connection-DNS Server Modified . . . . . . . . . . . 201
2.444LP_Possible Botnet Connection-IRC Port . . . . . . . . . . . . . . . . . . . 202
2.445LP_Possible Botnet Connection-Outbound DDOS . . . . . . . . . . . . . . 202
2.446LP_Possible Botnet Connection-Outbound Spam . . . . . . . . . . . . . . 202
2.447LP_Possible CLR DLL Loaded Via Office Applications . . . . . . . . . . . . 203
2.448LP_Possible Credential Dump-Tools Named Pipes Detected . . . . . . . . 203
2.449LP_Possible Data Breach . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
2.450LP_Possible Data Breach-Off Hour Transfer . . . . . . . . . . . . . . . . . 204
2.451LP_Possible DDOS Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
2.452LP_Possible Detection of SafetyKatz . . . . . . . . . . . . . . . . . . . . . 205
2.453LP_Possible DNS Rebinding Detected . . . . . . . . . . . . . . . . . . . . 205
2.454LP_Possible DoS Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
2.455LP_Possible Empire Monkey Detected . . . . . . . . . . . . . . . . . . . . 206
2.456LP_Possible Executable Used by PlugX in Uncommon Location . . . . . . 207
2.457LP_Possible Exploitation for CVE-2015-1641 Detected . . . . . . . . . . . 207
2.458LP_Possible Hijack of Legit RDP Session to Move Laterally . . . . . . . . . 208
2.459LP_Possible Impacket Lateralization Detected . . . . . . . . . . . . . . . . 208
2.460LP_Possible Impacket SecretDump Remote Activity . . . . . . . . . . . . 209
2.461LP_Possible Inbound Spamming Detected . . . . . . . . . . . . . . . . . . 209
2.462LP_Possible Insider Threat . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
2.463LP_Possible Land Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
2.464LP_Possible Malicious Payload Download via Office Binaries Detected . . 210
2.465LP_Possible Malware Detected . . . . . . . . . . . . . . . . . . . . . . . . 211
2.466LP_Possible Modification of Boot Configuration . . . . . . . . . . . . . . . 211
2.467LP_Possible Outbound Spamming Detected . . . . . . . . . . . . . . . . . 212
xi
2.468LP_Possible Pass the Hash Activity Detected . . . . . . . . . . . . . . . . 212
2.469LP_Possible Privilege Escalation via Weak Service Permissions . . . . . . 213
2.470LP_Possible Process Hollowing Image Loading . . . . . . . . . . . . . . . 213
2.471LP_Possible SPN Enumeration Detected . . . . . . . . . . . . . . . . . . . 213
2.472LP_Possible SquiblyTwo Detected . . . . . . . . . . . . . . . . . . . . . . . 214
2.473LP_Possible Taskmgr run as LOCAL_SYSTEM Detected . . . . . . . . . . 214
2.474LP_Potential RDP Exploit CVE-2019-0708 Detected . . . . . . . . . . . . 215
2.475LP_Powershell AMSI Bypass via dotNET Reflection . . . . . . . . . . . . . 215
2.476LP_PowerShell Base64 Encoded Shellcode Detected . . . . . . . . . . . . 216
2.477LP_PowerShell Network Connections Detected . . . . . . . . . . . . . . . 216
2.478LP_PowerShell Profile Modification . . . . . . . . . . . . . . . . . . . . . . 216
2.479LP_PowerShell Rundll32 Remote Thread Creation Detected . . . . . . . . 217
2.480LP_PowerShell Script Run in AppData Detected . . . . . . . . . . . . . . . 217
2.481LP_PowerShell Version Downgrade Detected . . . . . . . . . . . . . . . . 218
2.482LP_Process Dump via Comsvcs DLL Detected . . . . . . . . . . . . . . . . 218
2.483LP_Process Dump via Rundll32 and Comsvcs Detected . . . . . . . . . . . 219
2.484LP_Process Hollowing Detected . . . . . . . . . . . . . . . . . . . . . . . . 219
2.485LP_Process Injection Detected . . . . . . . . . . . . . . . . . . . . . . . . . 220
2.486LP_Protected Storage Service Access Detected . . . . . . . . . . . . . . . 220
2.487LP_Prowli Malware Affected Host . . . . . . . . . . . . . . . . . . . . . . . 220
2.488LP_Prowli Malware Connection to Malicious Destination . . . . . . . . . . 221
2.489LP_Prowli Malware Emails Sent to Attacker . . . . . . . . . . . . . . . . . 221
2.490LP_PsExec Tool Execution Detected . . . . . . . . . . . . . . . . . . . . . 222
2.491LP_Psr Capture Screenshots Detected . . . . . . . . . . . . . . . . . . . . 222
2.492LP_Pulse Secure Arbitrary File Reading Detected . . . . . . . . . . . . . . 222
2.493LP_QBot Process Creation Detected . . . . . . . . . . . . . . . . . . . . . 223
2.494LP_QuarksPwDump Clearing Access History Detected . . . . . . . . . . . 223
2.495LP_QuarksPwDump Dump File Detected . . . . . . . . . . . . . . . . . . . 224
2.496LP_Query Registry Network . . . . . . . . . . . . . . . . . . . . . . . . . . 224
2.497LP_Rare Scheduled Task Creations Detected . . . . . . . . . . . . . . . . . 225
2.498LP_RDP Login from Localhost Detected . . . . . . . . . . . . . . . . . . . 225
2.499LP_RDP Over Reverse SSH Tunnel Detected . . . . . . . . . . . . . . . . . 225
2.500LP_RDP over Reverse SSH Tunnel WFP . . . . . . . . . . . . . . . . . . . . 226
2.501LP_RDP Registry Modification . . . . . . . . . . . . . . . . . . . . . . . . . 226
2.502LP_RDP Sensitive Settings Changed . . . . . . . . . . . . . . . . . . . . . 227
2.503LP_Reconnaissance Activity with Net Command . . . . . . . . . . . . . . 227
2.504LP_RedSocks Backdoor Connection . . . . . . . . . . . . . . . . . . . . . . 228
2.505LP_RedSocks Bad Neighborhood Detection . . . . . . . . . . . . . . . . . 228
2.506LP_RedSocks Blacklist URL Detection . . . . . . . . . . . . . . . . . . . . . 229
2.507LP_RedSocks FileSharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
2.508LP_RedSocks Ransomware Connection . . . . . . . . . . . . . . . . . . . . 229
2.509LP_RedSocks Sinkhole Detection . . . . . . . . . . . . . . . . . . . . . . . 230
2.510LP_RedSocks Tor Connection . . . . . . . . . . . . . . . . . . . . . . . . . 230
2.511LP_RedSocks Trojan Connection . . . . . . . . . . . . . . . . . . . . . . . . 231
2.512LP_Register new Logon Process by Rubeus . . . . . . . . . . . . . . . . . 231
xii
2.513LP_Registry Persistence Mechanisms Detected . . . . . . . . . . . . . . . 231
2.514LP_Registry Persistence via Explorer Run Key Detected . . . . . . . . . . 232
2.515LP_Regsvcs-Regasm Detected . . . . . . . . . . . . . . . . . . . . . . . . . 232
2.516LP_Remote PowerShell Session . . . . . . . . . . . . . . . . . . . . . . . . 233
2.517LP_Remote System Discovery . . . . . . . . . . . . . . . . . . . . . . . . . 233
2.518LP_Renamed Binary Detected . . . . . . . . . . . . . . . . . . . . . . . . . 234
2.519LP_Renamed ProcDump Detected . . . . . . . . . . . . . . . . . . . . . . 234
2.520LP_Renamed PsExec Detected . . . . . . . . . . . . . . . . . . . . . . . . 235
2.521LP_Renamed ZOHO Dctask64 Detected . . . . . . . . . . . . . . . . . . . 235
2.522LP_REvil-Sodinokibi Ransomware Connection to Malicious Domains . . . 235
2.523LP_REvil-Sodinokibi Ransomware Connection to Malicious Sources . . . . 236
2.524LP_REvil-Sodinokibi Ransomware Exploitable Vulnerabilities Detected . . 236
2.525LP_REvil-Sodinokibi Ransomware Infected Host Detected . . . . . . . . . 237
2.526LP_RobbinHood Ransomware Exploitable Vulnerabilities Detected . . . . 237
2.527LP_Robbinhood Ransomware Infected Host Detected . . . . . . . . . . . 238
2.528LP_Rogue Access Point Detected . . . . . . . . . . . . . . . . . . . . . . . 238
2.529LP_RSA SecurID Account Lockout . . . . . . . . . . . . . . . . . . . . . . . 239
2.530LP_RSA SecurID Account Lockout . . . . . . . . . . . . . . . . . . . . . . . 239
2.531LP_Rubeus Hack Tool Detected . . . . . . . . . . . . . . . . . . . . . . . . 239
2.532LP_Run PowerShell Script from ADS Detected . . . . . . . . . . . . . . . . 240
2.533LP_Rundll32 Internet Connection Detected . . . . . . . . . . . . . . . . . 240
2.534LP_Ryuk Ransomware Affected Host . . . . . . . . . . . . . . . . . . . . . 241
2.535LP_SAM Registry Hive Dump via Reg Utility . . . . . . . . . . . . . . . . . 241
2.536LP_SAM Registry Hive Handle Request Detected . . . . . . . . . . . . . . 242
2.537LP_Scheduled Task Creation Detected . . . . . . . . . . . . . . . . . . . . 242
2.538LP_SCM Database Handle Failure Detected . . . . . . . . . . . . . . . . . 242
2.539LP_SCM Database Privileged Operation Detected . . . . . . . . . . . . . 243
2.540LP_Screensaver Activities Detected . . . . . . . . . . . . . . . . . . . . . . 243
2.541LP_Secure Deletion with SDelete . . . . . . . . . . . . . . . . . . . . . . . 244
2.542LP_SecurityXploded Tool Detected . . . . . . . . . . . . . . . . . . . . . . 244
2.543LP_Shadow Copy Creation Using OS Utilities Detected . . . . . . . . . . 244
2.544LP_Signed Binary Proxy Execution - Network Detected . . . . . . . . . . 245
2.545LP_Signed Binary Proxy Execution - Process Detected . . . . . . . . . . . 245
2.546LP_Signed Script Proxy Execution . . . . . . . . . . . . . . . . . . . . . . . 246
2.547LP_SILENTTRINITY Stager Execution Detected . . . . . . . . . . . . . . . 246
2.548LP_smbexec Service Installation Detected . . . . . . . . . . . . . . . . . . 247
2.549LP_SolarisLDAP Group Remove from LDAP Detected . . . . . . . . . . . 247
2.550LP_SolarisLDAP Possible Bruteforce Attack Detected . . . . . . . . . . . 248
2.551LP_SolarisLDAP User Account Lockout Detected . . . . . . . . . . . . . . 248
2.552LP_Sophos XG Firewall - Inbound Attack Detected by IDP . . . . . . . . . 248
2.553LP_Sophos XG Firewall - Outbound Attack Detected by IDP . . . . . . . 249
2.554LP_SophosUTM Policy Violation . . . . . . . . . . . . . . . . . . . . . . . . 249
2.555LP_SourceFire DNS Tunneling Detection - Multiple domains . . . . . . . . 250
2.556LP_SSHD Connection Denied . . . . . . . . . . . . . . . . . . . . . . . . . 250
2.557LP_Stealthy Scheduled Task Creation via VBA Macro Detected . . . . . . 251
xiii
2.558LP_Sticky Key Like Backdoor Usage Detected . . . . . . . . . . . . . . . . 251
2.559LP_StoneDrill Service Install Detected . . . . . . . . . . . . . . . . . . . . 252
2.560LP_Stop Windows Service Detected . . . . . . . . . . . . . . . . . . . . . 252
2.561LP_Successful Lateral Movement to Administrator via Pass the Hash
using Mimikatz Detected . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
2.562LP_Successful Overpass the Hash Attempt . . . . . . . . . . . . . . . . . . 253
2.563LP_Suspect Svchost Activity Detected . . . . . . . . . . . . . . . . . . . . 254
2.564LP_Suspect Svchost Memory Access . . . . . . . . . . . . . . . . . . . . . 254
2.565LP_Suspicious Access to Sensitive File Extensions . . . . . . . . . . . . . . 255
2.566LP_Suspicious Calculator Usage Detected . . . . . . . . . . . . . . . . . . 255
2.567LP_Suspicious Call by Ordinal Detected . . . . . . . . . . . . . . . . . . . 255
2.568LP_Suspicious Certutil Command Detected . . . . . . . . . . . . . . . . . 256
2.569LP_Suspicious Code Page Switch Detected . . . . . . . . . . . . . . . . . 256
2.570LP_Suspicious Commandline Escape Detected . . . . . . . . . . . . . . . 257
2.571LP_Suspicious Compression Tool Parameters . . . . . . . . . . . . . . . . 257
2.572LP_Suspicious Control Panel DLL Load Detected . . . . . . . . . . . . . . 258
2.573LP_Suspicious Csc Source File Folder Detected . . . . . . . . . . . . . . . 258
2.574LP_Suspicious Debugger Registration Detected . . . . . . . . . . . . . . . 258
2.575LP_Suspicious Double Extension Detected . . . . . . . . . . . . . . . . . . 259
2.576LP_Suspicious Driver Load from Temp . . . . . . . . . . . . . . . . . . . . 259
2.577LP_Suspicious Eventlog Clear or Configuration Using Wevtutil Detected . 260
2.578LP_Suspicious Execution from Outlook . . . . . . . . . . . . . . . . . . . . 260
2.579LP_Suspicious GUP Usage Detected . . . . . . . . . . . . . . . . . . . . . 261
2.580LP_Suspicious HWP Sub Processes Detected . . . . . . . . . . . . . . . . 261
2.581LP_Suspicious In-Memory Module Execution Detected . . . . . . . . . . . 262
2.582LP_Suspicious Kerberos RC4 Ticket Encryption . . . . . . . . . . . . . . . 262
2.583LP_Suspicious Keyboard Layout Load Detected . . . . . . . . . . . . . . . 262
2.584LP_Suspicious MsiExec Directory Detected . . . . . . . . . . . . . . . . . 263
2.585LP_Suspicious Named Pipes Detected . . . . . . . . . . . . . . . . . . . . 263
2.586LP_Suspicious Outbound Kerberos Connection . . . . . . . . . . . . . . . 264
2.587LP_Suspicious Outbound RDP Connections Detected . . . . . . . . . . . 264
2.588LP_Suspicious Parent of Csc Detected . . . . . . . . . . . . . . . . . . . . 265
2.589LP_Suspicious PowerShell Invocation Based on Parent Process . . . . . . 265
2.590LP_Suspicious PowerShell Parameter Substring Detected . . . . . . . . . 266
2.591LP_Suspicious Process Start Locations Detected . . . . . . . . . . . . . . 266
2.592LP_Suspicious Program Location with Network Connections . . . . . . . 267
2.593LP_Suspicious PsExec Execution Detected . . . . . . . . . . . . . . . . . . 267
2.594LP_Suspicious RDP Redirect Using TSCON Detected . . . . . . . . . . . . 268
2.595LP_Suspicious Remote Thread Created . . . . . . . . . . . . . . . . . . . . 268
2.596LP_Suspicious RUN Key from Download Detected . . . . . . . . . . . . . 269
2.597LP_Suspicious Rundll32 Activity Detected . . . . . . . . . . . . . . . . . . 269
2.598LP_Suspicious Scripting in a WMI Consumer . . . . . . . . . . . . . . . . . 270
2.599LP_Suspicious Service Path Modification Detected . . . . . . . . . . . . . 270
2.600LP_Suspicious Svchost Process Detected . . . . . . . . . . . . . . . . . . . 271
2.601LP_Suspicious SYSVOL Domain Group Policy Access . . . . . . . . . . . . 271
xiv
2.602LP_Suspicious TSCON Start . . . . . . . . . . . . . . . . . . . . . . . . . . 272
2.603LP_Suspicious Typical Malware Back Connect Ports Detected . . . . . . . 272
2.604LP_Suspicious CSharp or FSharp Interactive Console Execution . . . . . . 273
2.605LP_Suspicious Userinit Child Process . . . . . . . . . . . . . . . . . . . . . 273
2.606LP_Suspicious Windows ANONYMOUS LOGON Local Account Creation 273
2.607LP_Suspicious WMI Execution Detected . . . . . . . . . . . . . . . . . . . 274
2.608LP_Svchost DLL Search Order Hijack Detected . . . . . . . . . . . . . . . 274
2.609LP_SysKey Registry Keys Access . . . . . . . . . . . . . . . . . . . . . . . 275
2.610LP_Sysmon Configuration Modification Detected . . . . . . . . . . . . . . 275
2.611LP_Sysmon Driver Unload Detected . . . . . . . . . . . . . . . . . . . . . 276
2.612LP_Sysmon Error Event Detected . . . . . . . . . . . . . . . . . . . . . . . 276
2.613LP_System File Execution Location Anomaly Detected . . . . . . . . . . . 277
2.614LP_System Information Discovery . . . . . . . . . . . . . . . . . . . . . . . 277
2.615LP_System Owner or User Discovery . . . . . . . . . . . . . . . . . . . . . 278
2.616LP_System Service Discovery . . . . . . . . . . . . . . . . . . . . . . . . . 278
2.617LP_System Time Discovery . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
2.618LP_Tap Driver Installation Detected . . . . . . . . . . . . . . . . . . . . . . 279
2.619LP_Taskmgr as Parent Detected . . . . . . . . . . . . . . . . . . . . . . . . 279
2.620LP_Tasks Folder Evasion Detected . . . . . . . . . . . . . . . . . . . . . . 280
2.621LP_Terminal Service Process Spawn Detected . . . . . . . . . . . . . . . . 280
2.622LP_Threat Intel Allowed Connections from Suspicious Sources . . . . . . 281
2.623LP_Threat Intel Connections with Suspicious Domains . . . . . . . . . . . 281
2.624LP_Threat Intel Excessive Denied Connections Attempt from IOC . . . . 282
2.625LP_Threat Intel Internal Machine Connecting to Multiple IOCs . . . . . . 282
2.626LP_Threat Intel IOC Connecting to Multiple Internal Machines . . . . . . 283
2.627LP_Time-Stomping of Users Directory Files Detected . . . . . . . . . . . . 283
2.628LP_Transfering Files with Credential Data via Network Shares . . . . . . . 284
2.629LP_TrendMicroDeepSecurity Virus Quarantined . . . . . . . . . . . . . . . 284
2.630LP_UAC Bypass via Event Viewer Detected . . . . . . . . . . . . . . . . . 284
2.631LP_Unix Possible Bruteforce Attack . . . . . . . . . . . . . . . . . . . . . . 285
2.632LP_Unix User Deleted . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
2.633LP_Unsigned Driver Loading Detected . . . . . . . . . . . . . . . . . . . . 286
2.634LP_Possible Ursnif Registry Activity . . . . . . . . . . . . . . . . . . . . . . 286
2.635LP_Valak Malware Connection to Malicious Domains . . . . . . . . . . . . 286
2.636LP_Valak Malware Infected Host Detected . . . . . . . . . . . . . . . . . . 287
2.637LP_VBA DLL Loaded by Office . . . . . . . . . . . . . . . . . . . . . . . . . 287
2.638LP_VM - High Risk Vulnerability on High Impact Assets . . . . . . . . . . . 288
2.639LP_VM - High Risk Vulnerability on Low Impact Assets . . . . . . . . . . . 288
2.640LP_VM - High Risk Vulnerability on Medium Impact Assets . . . . . . . . . 288
2.641LP_VM - Medium Risk Vulnerability on High Impact Assets . . . . . . . . . 289
2.642LP_VM - Medium Risk Vulnerability on Low Impact Assets . . . . . . . . . 289
2.643LP_VM - Medium Risk Vulnerability on Medium Impact Assets . . . . . . . 290
2.644LP_WannaCry File Encryption . . . . . . . . . . . . . . . . . . . . . . . . . 290
2.645LP_WannaCry MS17-010 Vulnerable Sources . . . . . . . . . . . . . . . . . 291
2.646LP_WannaCry Sources in Connections to Sinkhole Domain . . . . . . . . . 291
xv
2.647LP_WastedLocker Ransomware Connection to Malicious Domains . . . . 291
2.648LP_WastedLocker Ransomware Connection to Malicious Sources . . . . . 292
2.649LP_WastedLocker Ransomware Infected Host Detected . . . . . . . . . . 292
2.650LP_WCE wceaux dll Access Detected . . . . . . . . . . . . . . . . . . . . . 293
2.651LP_Wdigest Registry Modification . . . . . . . . . . . . . . . . . . . . . . . 293
2.652LP_Weak Encryption Enabled for User . . . . . . . . . . . . . . . . . . . . 293
2.653LP_Webshell Detection With Command Line Keywords . . . . . . . . . . 294
2.654LP_Windows 10 Scheduled Task SandboxEscaper 0 day Detected . . . . 294
2.655LP_Windows Admin Shares - Process . . . . . . . . . . . . . . . . . . . . . 295
2.656LP_Windows Audit Logs Cleared . . . . . . . . . . . . . . . . . . . . . . . 295
2.657LP_Windows Credential Editor Detected . . . . . . . . . . . . . . . . . . . 296
2.658LP_Windows Data Copied to Removable Device . . . . . . . . . . . . . . 296
2.659LP_Windows Defender Exclusion Set Detected . . . . . . . . . . . . . . . 296
2.660LP_Windows Domain Policy Change . . . . . . . . . . . . . . . . . . . . . 297
2.661LP_Windows Excessive Amount of Files Copied to Removable Device . . 297
2.662LP_Windows Failed Login Attempt Using Service Account . . . . . . . . . 298
2.663LP_Windows Failed Login Followed by Lockout Event . . . . . . . . . . . 298
2.664LP_Windows Local User Management . . . . . . . . . . . . . . . . . . . . 299
2.665LP_WMI DLL Loaded by Office . . . . . . . . . . . . . . . . . . . . . . . . 299
2.666LP_Windows Multiple Password Changed by User . . . . . . . . . . . . . 300
2.667LP_Windows Processes Suspicious Parent Directory Detected . . . . . . . 300
2.668LP_Windows Registry Persistence COM Key Linking Detected . . . . . . 301
2.669LP_Windows Shell Spawning Suspicious Program . . . . . . . . . . . . . . 301
2.670LP_Windows SMB Remote Code Execution Vulnerability CVE-2017-0143
Detected . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
2.671LP_Windows Suspicious Creation of User Accounts . . . . . . . . . . . . . 302
2.672LP_Windows User Account Created via Command Line . . . . . . . . . . 303
2.673LP_Windows Unusual User Access to an Object . . . . . . . . . . . . . . . 303
2.674LP_Windows User Account Change to End with Dollar Sign . . . . . . . . 304
2.675LP_Windows Webshell Creation Detected . . . . . . . . . . . . . . . . . . 304
2.676LP_Winlogon Helper DLL . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
2.677LP_WMI - Network Connection . . . . . . . . . . . . . . . . . . . . . . . . 305
2.678LP_WMI Backdoor Exchange Transport Agent . . . . . . . . . . . . . . . . 305
2.679LP_WMI Modules Loaded by Suspicious Process . . . . . . . . . . . . . . 306
2.680LP_WMI Persistence - Script Event Consumer Detected . . . . . . . . . . 306
2.681LP_WMI Persistence - Script Event Consumer File Write . . . . . . . . . . 307
2.682LP_WMI Process Execution . . . . . . . . . . . . . . . . . . . . . . . . . . 307
2.683LP_WMI Spawning Windows Shell . . . . . . . . . . . . . . . . . . . . . . . 308
2.684LP_WMIExec VBS Script Detected . . . . . . . . . . . . . . . . . . . . . . 308
2.685LP_Wmiprvse Spawning Process . . . . . . . . . . . . . . . . . . . . . . . 309
2.686LP_WScript or CScript Dropper Detected . . . . . . . . . . . . . . . . . . 309
2.687LP_Wsreset UAC Bypass Detected . . . . . . . . . . . . . . . . . . . . . . 309
2.688LP_XSL Script Processing Detected . . . . . . . . . . . . . . . . . . . . . . 310
2.689LP_ZOHO Dctask64 Process Injection Detected . . . . . . . . . . . . . . . 310
2.690LP_ZxShell Malware Detected . . . . . . . . . . . . . . . . . . . . . . . . . 311
xvi
2.691LP_APT 34 Initial Access Using Spearphishing Link Detected . . . . . . . 311
2.692LP_Automated Collection Detected . . . . . . . . . . . . . . . . . . . . . . 312
2.693LP_Screenshot Capture Detected . . . . . . . . . . . . . . . . . . . . . . . 312
2.694LP_APT 34 Command and Control Using Commonly used Ports Detected 313
2.695LP_APT 34 Command and Control Using Standard Application Layer
Protocol Detected . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
2.696LP_APT 34 Command and Control Using Uncommonly used Port Detected314
2.697LP_Credential Dumping using procdump Detected . . . . . . . . . . . . . 314
2.698LP_Access Using Browser Stored Credential Detected . . . . . . . . . . . 315
2.699LP_GUI Input Capture Detected . . . . . . . . . . . . . . . . . . . . . . . . 315
2.700LP_Files and Directory Discovery Process Detected . . . . . . . . . . . . . 316
2.701LP_Account Discovery Process Detected . . . . . . . . . . . . . . . . . . . 316
2.702LP_Suspicious File Deletion Detected . . . . . . . . . . . . . . . . . . . . . 316
2.703LP_File or Information Decode Process Detected . . . . . . . . . . . . . . 317
2.704LP_Access of Password Policy Detected . . . . . . . . . . . . . . . . . . . 317
2.705LP_Access of Permission Groups Detected . . . . . . . . . . . . . . . . . . 318
2.706LP_Security Software Discovery Process Detected . . . . . . . . . . . . . 318
2.707LP_System Network Configuration Discovery . . . . . . . . . . . . . . . . 319
2.708LP_System Network Connections Discovery . . . . . . . . . . . . . . . . . 319
2.709LP_Exfiltration over Cloud Application Detected . . . . . . . . . . . . . . 320
2.710LP_Remote File Copy Detected . . . . . . . . . . . . . . . . . . . . . . . . 320
2.711LP_Account Created for Persistence Detected . . . . . . . . . . . . . . . 320
2.712LP_Account Manipulated for Persistence Detected . . . . . . . . . . . . . 321
2.713LP_Privilege Escalation - Bypassing User Account Control Detected . . . 321
2.714LP_Executable Dropped in Suspicious Location . . . . . . . . . . . . . . . 322
2.715LP_Process Execution from Suspicious Location . . . . . . . . . . . . . . . 322
2.716LP_Active Directory Enumeration via ADFind . . . . . . . . . . . . . . . . 323
2.717LP_Antivirus Software Discovery via WMI . . . . . . . . . . . . . . . . . . 323
2.718LP_Possible Command Prompt Process Hollowing . . . . . . . . . . . . . 324
2.719LP_Suspicious Taskkill Activity . . . . . . . . . . . . . . . . . . . . . . . . . 324
2.720LP_Suspicious File or Directory Permission Modification . . . . . . . . . . 325
2.721LP_Ryuk Wake-On-LAN Activity . . . . . . . . . . . . . . . . . . . . . . . . 325
2.722LP_EXE or DLL Dropped in Perflogs Folder . . . . . . . . . . . . . . . . . 325
2.723LP_Credential Access via LaZagne . . . . . . . . . . . . . . . . . . . . . . 326
2.724LP_RDP Connection Inititated from Domain Controller . . . . . . . . . . . 326
2.725LP_Active Directory Module Load in PowerShell . . . . . . . . . . . . . . 327
2.726LP_Possible Active Directory Enumeration via AD Module . . . . . . . . . 327
2.727LP_Microsoft Defender Disabling Attempt via PowerShell . . . . . . . . . 327
2.728LP_Possible Kerberoasting via Rubeus . . . . . . . . . . . . . . . . . . . . 328
2.729LP_Suspicious Scheduled Task Creation . . . . . . . . . . . . . . . . . . . 328
2.730LP_RDP Connection Inititated from Suspicious Country . . . . . . . . . . 329
2.731LP_Scheduled Task Deletion . . . . . . . . . . . . . . . . . . . . . . . . . . 329
2.732LP_Possible GootKit WScript Execution . . . . . . . . . . . . . . . . . . . 330
2.733LP_Winnti IoC Domain Match . . . . . . . . . . . . . . . . . . . . . . . . . 330
2.734LP_Winnti IoC Hash Match . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
xvii
2.735LP_Zerologon CVE-2020-1472 Exploitation Detected . . . . . . . . . . . . 331
2.736LP_Allowed NetLogon Connections - CVE-2020-1472 . . . . . . . . . . . 332
2.737LP_Denied NetLogon Connections - CVE-2020-1472 . . . . . . . . . . . . 332
2.738LP_Allowed NetLogon Connections via Group Policy - CVE-2020-1472 . . 332
2.739LP_Exchange Remote Code Execution CVE-2020-0688 Attempt . . . . . 333
2.740LP_BlueKeep Vulnerability CVE-2019-0708 Exploitation . . . . . . . . . . 333
2.741LP_Confluence Remote Code Execution CVE-2019-3398 Attempt . . . . 334
2.742LP_ZoHo ManageEngine Pre-Auth File Upload CVE-2019-8394
Exploitation Attempt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
2.743LP_ZoHo ManageEngine Desktop Central CVE-2020-10189 Exploitation
Attempt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
2.744LP_Atlassian Crowd Remote Code Execution CVE-2019-11580
Exploitation Attempt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
2.745LP_Fortinet Pre-Auth File Read CVE-2018-13379 Exploitation Attempt . 336
2.746LP_Adobe ColdFusion Remote Code Execution CVE-2018-15961 Attempt 336
2.747LP_Creation of Encrypted Winrar archive via CLI . . . . . . . . . . . . . . 337
2.748LP_Default Hard disk Usage Status . . . . . . . . . . . . . . . . . . . . . . 337
2.749LP_Default License Grace State . . . . . . . . . . . . . . . . . . . . . . . . 337
2.750LP_Default License Invalid . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
2.751LP_Microsoft Build Engine Loading Credential Libraries . . . . . . . . . . 338
2.752LP_Microsoft Build Engine started by Office . . . . . . . . . . . . . . . . . 339
2.753LP_Potential Botnet Infected Host Detected . . . . . . . . . . . . . . . . . 339
2.754LP_Potential Phishing Attack Detected . . . . . . . . . . . . . . . . . . . . 339
2.755LP_Potential Malware Infected Host Detected . . . . . . . . . . . . . . . . 340
2.756LP_PowerShell Module Logging Setting Discovery . . . . . . . . . . . . . 340
2.757LP_PowerShell Module Logging Setting Discovery . . . . . . . . . . . . . 341
2.758LP_Safe DLL Search Mode Disabled . . . . . . . . . . . . . . . . . . . . . . 341
2.759LP_Potential Intrusion Detected . . . . . . . . . . . . . . . . . . . . . . . . 342
2.760LP_Windows Crash Dump Disabled . . . . . . . . . . . . . . . . . . . . . . 342
2.761LP_Suspicious Shells Spawn by SQL Server . . . . . . . . . . . . . . . . . 342
2.762LP_HermeticWiper Driver Load . . . . . . . . . . . . . . . . . . . . . . . . 343
2.763LP_UltraVNC Execution via Command Line . . . . . . . . . . . . . . . . . 343
2.764LP_Office Security Settings Changed . . . . . . . . . . . . . . . . . . . . . 344
2.765LP_HermeticWiper IoC Hashes Detected . . . . . . . . . . . . . . . . . . . 344
2.766LP_IsaacWiper IoC Hashes Detected . . . . . . . . . . . . . . . . . . . . . 345
2.767LP_Actinium IoC Hashes Detected . . . . . . . . . . . . . . . . . . . . . . 345
2.768LP_WhisperGate IoC Hashes Detected . . . . . . . . . . . . . . . . . . . . 345
2.769LP_GhostWriter IoC Detected . . . . . . . . . . . . . . . . . . . . . . . . . 346
2.770LP_Actinium IoC Domains Detected . . . . . . . . . . . . . . . . . . . . . 346
2.771LP_Suspicious VMToolsd Child Process . . . . . . . . . . . . . . . . . . . . 347
2.772LP_Credential Access via Pypykatz . . . . . . . . . . . . . . . . . . . . . . 347
2.773LP_Atlassian Confluence CVE-2021-26084 Exploitation . . . . . . . . . . . 348
2.774LP_Impacket PsExec Execution . . . . . . . . . . . . . . . . . . . . . . . . 348
2.775LP_Oracle WebLogic CVE-2021-2109 Exploitation . . . . . . . . . . . . . 349
2.776LP_Possible JSP Webshell Detected . . . . . . . . . . . . . . . . . . . . . 349
xviii
2.777LP_PowerShell ADRecon Execution . . . . . . . . . . . . . . . . . . . . . . 349
2.778LP_PowerView PowerShell Commandlets . . . . . . . . . . . . . . . . . . 350
2.779LP_PowerView PowerShell Commandlets . . . . . . . . . . . . . . . . . . 351
2.780LP_SpringShell Indicators of Compromise Detected . . . . . . . . . . . . 352
2.781LP_SpringShell Indicators of Compromise Detected . . . . . . . . . . . . 352
2.782LP_SpringShell Webshell Detected in URL . . . . . . . . . . . . . . . . . . 353
2.783LP_Stealthy VSTO Persistence . . . . . . . . . . . . . . . . . . . . . . . . . 353
2.784LP_Suspicious DLL or VBS Files being created in ProgramData . . . . . . 353
2.785LP_Suspicious VMToolsd Child Process . . . . . . . . . . . . . . . . . . . . 354
2.786LP_Suspicious WMPRVSE Child Process . . . . . . . . . . . . . . . . . . . 354
2.787LP_TerraMaster TOS CVE-2020-28188 Exploitation . . . . . . . . . . . . . 355
2.788LP_VMware VSphere CVE-2021-21972 Exploitation . . . . . . . . . . . . . 355
2.789LP_VMware View Planner CVE-2021-21978 Exploitation . . . . . . . . . . 356
2.790LP_Zoho ManageEngine ADSelfService Plus CVE-2021-40539 Exploitation356
2.791LP_Possible Access to ADMIN Share . . . . . . . . . . . . . . . . . . . . . 356
2.792LP_PsExec Tool Execution Detected . . . . . . . . . . . . . . . . . . . . . 357
2.793LP_Screensaver Activities Detected . . . . . . . . . . . . . . . . . . . . . . 357
2.794LP_Suspect Svchost Activity Detected . . . . . . . . . . . . . . . . . . . . 358
2.795LP_Time-Stomping of Users Directory Files Detected . . . . . . . . . . . . 358
2.796LP_Windows Defender Exclusion Set Detected . . . . . . . . . . . . . . . 359
2.797LP_Suspicious Netsh DLL Persistence Detected . . . . . . . . . . . . . . . 359
2.798LP_Suspicious Use of Procdump Detected . . . . . . . . . . . . . . . . . . 360
2.799LP_Usage of Procdump Detected . . . . . . . . . . . . . . . . . . . . . . . 360
2.800LP_Conhost Spawning Suspicious Processes . . . . . . . . . . . . . . . . . 360
2.801LP_Proxy Execution via Explorer . . . . . . . . . . . . . . . . . . . . . . . 361
2.802LP_Wlrmdr Lolbin Use as Launcher . . . . . . . . . . . . . . . . . . . . . . 361
2.803LP_Suspicious Process Execution via Pester Detected . . . . . . . . . . . 361
2.804LP_Root Certificate Installation Detected . . . . . . . . . . . . . . . . . . 362
2.805LP_Suspicious process spawned by FTP . . . . . . . . . . . . . . . . . . . 362
2.806LP_ChromeLoader IoC Domains Detected . . . . . . . . . . . . . . . . . . 363
2.807LP_ChromeLoader IoC Hashes Detected . . . . . . . . . . . . . . . . . . . 363
2.808LP_Chromeloader Cross-Process Injection to Load Extention . . . . . . . 364
2.809LP_Proxy Execution via Explorer . . . . . . . . . . . . . . . . . . . . . . . 364
2.810LP_Suspicious Root Certificate installation Detected . . . . . . . . . . . . 364
2.811LP_Windows Logon Reminder Usage as Launcher . . . . . . . . . . . . . . 365
2.812LP_Suspicious File Transfer Using Replace . . . . . . . . . . . . . . . . . . 365
2.813LP_Proxy Execution via Program Compatibility Wizard . . . . . . . . . . . 366
2.814LP_Suspicious Driver Installation via PnPUtil . . . . . . . . . . . . . . . . . 366
2.815LP_Application Whitelisting Bypass via PresentationHost . . . . . . . . . 367
2.816LP_Suspicious File Extraction via Expand Detected . . . . . . . . . . . . . 367
2.817LP_Shell spawn via HTML Help Detected . . . . . . . . . . . . . . . . . . . 368
2.818LP_DLL Injection with Tracker Detected . . . . . . . . . . . . . . . . . . . 368
2.819LP_Powershell Code Execution via SyncAppvPublishingServer . . . . . . 369
2.820LP_Malicious PE Execution by Microsoft Visual Studio Debugger . . . . . 369
2.821LP_Suspicious Atbroker Registry Change Detected . . . . . . . . . . . . . 370
xix
2.822LP_DLL loaded Via Certoc Binary Detected . . . . . . . . . . . . . . . . . 370
2.823LP_Suspicious Remote Binary Usage Detected . . . . . . . . . . . . . . . 371
2.824LP_Suspicious File Execution Using wscript or cscript . . . . . . . . . . . . 371
2.825LP_Suspicious ASP NET Compiler Execution Detected . . . . . . . . . . . 372
2.826LP_Suspicious LoadAssembly PowerShell Diagnostic Script Execution . . 372
2.827LP_Suspicious Invocation PowerShell Diagnostic Script Execution . . . . . 373
2.828LP_Registry Configured RunOnce Task Execution . . . . . . . . . . . . . . 373
2.829LP_RunOnce Registry Key Configuration Change . . . . . . . . . . . . . . 374
2.830LP_Suspicious WSL Bash Execution . . . . . . . . . . . . . . . . . . . . . . 374
2.831LP_WSL Execution Detected . . . . . . . . . . . . . . . . . . . . . . . . . . 374
2.832LP_Supsicious Usage of Csharp or Roslyn Csharp Interactive Console . . 375
2.833LP_Suspicious Use of CSharp Interactive Console Detected . . . . . . . . 375
2.834LP_Suspicious File Download via Certreq . . . . . . . . . . . . . . . . . . . 376
2.835LP_Process Dump via Rundll32 and Comsvcs . . . . . . . . . . . . . . . . 376
2.836LP_Registry Key Import Detected . . . . . . . . . . . . . . . . . . . . . . . 377
2.837LP_Suspicious MachineGUID Query Detected . . . . . . . . . . . . . . . . 377
2.838LP_Process Injection Via Mavinject Detected . . . . . . . . . . . . . . . . 378
2.839Possible File Transfer Using Finger Detected . . . . . . . . . . . . . . . . 378
2.840LP_Suspicious Use of Findstr Detected . . . . . . . . . . . . . . . . . . . . 379
2.841LP_Suspicious File Overwrite Using extrac32 Detected . . . . . . . . . . . 379
2.842LP_Suspicious Sysmon Driver Unload Detected . . . . . . . . . . . . . . . 380
2.843LP_Windows Packet Monitoring Tool Usage Detected . . . . . . . . . . . 380
2.844LP_Suspicious Execution via IE per User Utility . . . . . . . . . . . . . . . 381
2.845LP_Proxy Execution via xWizard . . . . . . . . . . . . . . . . . . . . . . . . 381
2.846LP_Suspicious MSHTA Process Pattern . . . . . . . . . . . . . . . . . . . . 382
2.847LP_COM Object Execution via Shell Extension CLSID Verification Host . 382
2.848LP_Suspicious Setup Information File Invoked via DefaultInstall . . . . . . 383
2.849LP_Creation of Alternate Data Stream . . . . . . . . . . . . . . . . . . . . 383
2.850LP_Alternate Data Stream Created using Findstr . . . . . . . . . . . . . . 384
2.851LP_Suspicious Download Using Diantz . . . . . . . . . . . . . . . . . . . . 384
2.852LP_Ngrok RDP Tunnel Detected . . . . . . . . . . . . . . . . . . . . . . . . 385
2.853LP_Ngrok Execution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385
2.854LP_AD Privesc CVE-2022-26923 Exploitation . . . . . . . . . . . . . . . . 386
2.855LP_Possible Ransomware Deletion Volume Shadow Copies Detected . . 386
2.856LP_Windows Defender Uninstall via PowerShell . . . . . . . . . . . . . . . 387
2.857LP_Hijacked Binary Execution via Settings Synchronizer . . . . . . . . . . 387
2.858LP_Suspicious Execution of Dump64 . . . . . . . . . . . . . . . . . . . . . 388
2.859LP_Code Compilation via Visual Basic Command Line Compiler . . . . . . 388
2.860LP_File Downloaded from Suspicious URL Using GfxDownloadWrapper . 389
2.861LP_Suspicious CLR Logs File Creation . . . . . . . . . . . . . . . . . . . . 389
2.862LP_CLR DLL Loaded via Scripting Application . . . . . . . . . . . . . . . . 390
2.863LP_Obfuscation Script Usage via MSHTA to Execute Vbscript . . . . . . . 390
2.864LP_Microsoft Defender Logging Disabled . . . . . . . . . . . . . . . . . . 391
2.865LP_UAC Bypass via CMLUA or CMSTPLUA . . . . . . . . . . . . . . . . . 391
2.866LP_High Number of Service Stop or Task Kill in Short Span . . . . . . . . 391
xx
2.867LP_LSA Protected Process Light Disabled . . . . . . . . . . . . . . . . . . 392
2.868LP_Suspicious Invocation of Microsoft Workflow Compiler . . . . . . . . . 393
2.869LP_Process Dump via Sqldumper Detected . . . . . . . . . . . . . . . . . 393
2.870LP_Suspicious Usage of SQLToolsPS Detected . . . . . . . . . . . . . . . . 394
2.871LP_Proxy Execution of Malicious Payload via Pubprn . . . . . . . . . . . . 394
2.872LP_File Download via IMEWDBLD . . . . . . . . . . . . . . . . . . . . . . . 395
2.873LP_Memory Dump via Adplus . . . . . . . . . . . . . . . . . . . . . . . . . 395
2.874LP_TTDInject Usage Detected . . . . . . . . . . . . . . . . . . . . . . . . . 396
2.875LP_Remote Thread Created via Ttdinject . . . . . . . . . . . . . . . . . . . 396
2.876LP_Proxy Download via OneDriveStandaloneUpdater . . . . . . . . . . . 396
2.877LP_Suspicious WMIC ActiveScriptEventConsumer Created . . . . . . . . 397
2.878LP_Remote Connection Established via Msbuild . . . . . . . . . . . . . . . 397
2.879LP_Executables Started in Suspicious Folder . . . . . . . . . . . . . . . . . 398
2.880LP_Windows RDP Port Modified . . . . . . . . . . . . . . . . . . . . . . . 398
2.881LP_Binary Creation in System Folder Detected . . . . . . . . . . . . . . . 399
2.882LP_Curl Silent Mode Execution Detected . . . . . . . . . . . . . . . . . . 399
2.883LP_High Volume of File Modification or Deletion in Short Span . . . . . . 400
2.884LP_Non-Existent User Login Attempt Detected . . . . . . . . . . . . . . . 400
2.885LP_Execution of Temporary Files Via Office Application . . . . . . . . . . 401
2.886LP_Execution of Temporary Files Via Office Application . . . . . . . . . . 401
2.887LP_Malicious Image Loaded Via Excel . . . . . . . . . . . . . . . . . . . . 402
2.888LP_Malicious Chrome Extension Detected . . . . . . . . . . . . . . . . . . 402
2.889LP_Chrome Extension Installed Outside of the Webstore . . . . . . . . . 402
2.890LP_Chrome Extension Installed with DevTools Permission . . . . . . . . . 403
2.891LP_Defender SpyNet Reporting Disabled . . . . . . . . . . . . . . . . . . 403
2.892LP_Suspicious WMIC Process Creation . . . . . . . . . . . . . . . . . . . . 404
2.893LP_Browser Credential Files Accessed . . . . . . . . . . . . . . . . . . . . 404
2.894LP_Windows Defender Antivirus Definitions Removal Detected . . . . . . 405
2.895LP_Exchange ProxyShell Pattern Detected . . . . . . . . . . . . . . . . . . 405
2.896LP_Successful Exchange ProxyShell Attack . . . . . . . . . . . . . . . . . . 406
2.897LP_Malicious Base64 Encoded PowerShell Keywords in Command Lines
Detected . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 406
2.898LP_DLL Loaded Via AllocConsole and RunDLL32 . . . . . . . . . . . . . . 407
2.899LP_Active Directory Database Dump Attempt . . . . . . . . . . . . . . . . 408
2.900LP_Suspicious Child Process Creation via OneNote . . . . . . . . . . . . . 408
2.901LP_Usage of Web Request Command . . . . . . . . . . . . . . . . . . . . 409
2.902LP_Reconnaissance Activity with Nltest . . . . . . . . . . . . . . . . . . . . 409
2.903LP_Regsvr32 Network Activity Detected . . . . . . . . . . . . . . . . . . . 410
2.904LP_Possible Reconnaissance Activity . . . . . . . . . . . . . . . . . . . . . 410
2.905LP_Privilege Escalation via Kerberos KrbRelayUp . . . . . . . . . . . . . . 411
2.906LP_Suspicious Execution of LNK File . . . . . . . . . . . . . . . . . . . . . 411
2.907LP_Insecure Policy Set via Set-ExecutionPolicy . . . . . . . . . . . . . . . 412
2.908LP_Network Connection to Suspicious Server . . . . . . . . . . . . . . . . 413
xxi
3.1 LP_Windows Login Attempt on Disabled Account . . . . . . . . . . . . . 414
3.2 LP_VMware Link Up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414
3.3 LP_VMware Link Down . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415
3.4 LP_LogPoint License Expiry Status . . . . . . . . . . . . . . . . . . . . . . 415
3.5 LP_Mitre Initial Access Using Spearphishing link Detected . . . . . . . . . 415
3.6 LP_Mitre Command and Control Using Standard Application Layer
Protocol Detected . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416
3.7 LP_Endpoint Protect Threat Content Detected . . . . . . . . . . . . . . . 416
3.8 LP_Endpoint Protect Device Disconnect . . . . . . . . . . . . . . . . . . . 417
3.9 LP_Endpoint Protect File Delete . . . . . . . . . . . . . . . . . . . . . . . . 417
3.10 LP_Endpoint Protect File Copied To USB Device . . . . . . . . . . . . . . 417
3.11 LP_System Owner or User Discovery Process Detected . . . . . . . . . . 418
3.12 LP_System Services Discovery Detected . . . . . . . . . . . . . . . . . . . 418
3.13 LP_SolarisLDAP Password Spraying Attack Detected . . . . . . . . . . . . 419
3.14 LP_Bumblebee IoC Domains Detected . . . . . . . . . . . . . . . . . . . . 419
3.15 LP_Bumblebee IoC Hashes Detected . . . . . . . . . . . . . . . . . . . . . 420
3.16 LP_Bumblebee User Agent Detected . . . . . . . . . . . . . . . . . . . . . 420
3.17 LP_Microsoft Defender AMSI Trigger . . . . . . . . . . . . . . . . . . . . . 420
3.18 LP_Petitpotam - Anonymous RPC and File Share . . . . . . . . . . . . . . 421
3.19 LP_RDP Sensitive Settings Changed . . . . . . . . . . . . . . . . . . . . . 421
3.20 LP_Secure Deletion with SDelete . . . . . . . . . . . . . . . . . . . . . . . 422
3.21 LP_Suspicious Keyboard Layout Load Detected . . . . . . . . . . . . . . . 422
3.22 LP_Remote Code Execution using WMI Win32_Process Class over WinRM422
3.23 LP_Remote Code Execution using WMI Win32_Service Class over WinRM 423
3.24 LP_Suspicious Microsoft SQL Server PowerShell Module Use Detected . 423
3.25 LP_Shadow Copy Deletion Using OS Utilities Detected . . . . . . . . . . 424
3.26 LP_Child Process Spawned via Diskshadow Detected . . . . . . . . . . . 425
3.27 LP_Code Execution Via Diskshadow Detected . . . . . . . . . . . . . . . . 425
3.28 LP_Process Pattern Match For CVE-2021-40444 Exploitation . . . . . . . 426
3.29 LP_Suspicious Extexport Execution Detected . . . . . . . . . . . . . . . . 426
3.30 LP_Proxy Execution via Workfolders . . . . . . . . . . . . . . . . . . . . . 427
3.31 LP_Proxy Execution via Windows Update Client . . . . . . . . . . . . . . . 427
3.32 LP_Suspicious DLL Execution Using Windows Address Book . . . . . . . 428
3.33 LP_Suspicious Use of Dotnet Detected . . . . . . . . . . . . . . . . . . . . 428
3.34 LP_Execution of Arbitrary Executable Using Stordiag . . . . . . . . . . . . 429
3.35 LP_Process Creation via Time Travel Tracer . . . . . . . . . . . . . . . . . 429
3.36 LP_Time Travel Debugging Utility DLL Loaded . . . . . . . . . . . . . . . 430
3.37 LP_File Execution via Msdeploy . . . . . . . . . . . . . . . . . . . . . . . . 430
3.38 LP_CVE-2022-40684 Exploitation Detected . . . . . . . . . . . . . . . . . 430
3.39 LP_Possible Proxy Execution of Malicious Code . . . . . . . . . . . . . . . 431
3.40 LP_Suspicious Usage of BitLocker Management Script . . . . . . . . . . . 431
3.41 LP_Proxy Execution of Payloads via Microsoft Signed Script . . . . . . . . 432
3.42 LP_Execution of Windows Defender Offline Shell from Suspicious Folder 432
3.43 LP_DLL Loaded Via AccCheckConsole . . . . . . . . . . . . . . . . . . . . 433
3.44 LP_Proxy Execution via Appvlp . . . . . . . . . . . . . . . . . . . . . . . . 433
xxii
3.45 LP_Proxy DLL Execution via UtilityFunctions . . . . . . . . . . . . . . . . . 434
3.46 LP_Suspicious Usage of Squirrel Binary . . . . . . . . . . . . . . . . . . . . 434
3.47 LP_Suspicious File Share Permission . . . . . . . . . . . . . . . . . . . . . 435
3.48 LP_Legitimate Application Dropping Script File . . . . . . . . . . . . . . . 435
5 KB-Lists 440
6 Appendix 446
xxiii
CHAPTER
ONE
ALERT RULES
Alert Rules consists of alert packages, a dashboard package and Knowledge Base
(KB) lists for analytics integrated into Logpoint. It provides a compliance and triage
dashboard, enabling you to analyze trends and behaviors of entities and users within the
organization and perform defensive gap assessment with MITRE ATT&CK. The alerts
triggered by Logpoint are categorized based on the MITRE ATT&CK framework and
are the starting point to build various detection techniques. When Logpoint identifies
threats within your environment, it triggers security alerts based on predetermined
rules, allowing you to detect the malicious activity, advanced malware and their
Techniques, Tactics and Procedures (TTPs) early, so you can take corrective actions
against them. You can customize dashboards and alerts to suit your needs and perform
in-depth analysis with customized data and searches.
Logpoint’s ATT&CK navigator shows the coverage of the ATT&CK framework in Logoint.
You can use the navigator to match Logpoint alerts with the relevant ATT&CK techniques
and tactics. Read more about MITRE ATT&CK techniques and tactics in addition to their
integration in Logpoint on the Logpoint website.
Alert Rules consists of the following components:
1. Dashboard Package
2. Alert Packages
Details of the Alert Rules are discussed in the chapter MITRE ATT&CK
Analytics and NON-MITRE ATT&CK Analytics.
3. KB-Lists
1
Alert Rules Documentation, Release latest
• Windows Sysmon
TWO
• ATT&CK Tag: -
• ATT&CK ID: -
• Query:
,→"]
• ATT&CK Tag: -
• ATT&CK ID: -
3
Alert Rules Documentation, Release latest
• Query:
• Query:
,→"*:\ProgramData\OEM\UpgradeTool\CareCenter_*\BUnzip\Setup_msi.exe",
,→command = "*:\\WINDOWS\\Installer\\MSI*.tmp,
,→zzzzInvokeManagedCustomActionOutOfProc" ))
• ATT&CK Tag: CMSTP, Abuse Elevation Control Mechanism, Bypass User Account
Control
• Query:
• Query:
• Query:
,→image
• Query:
,→EXCLUDED_USERS
• Query:
• Query:
• Query:
• Query:
files, hiding them from users and making them difficult to detect or remove.
attrib.exe is a Windows command-line utility that allows users to adjust file or folder
attributes such as read-only, hidden and system.
• Query:
• ATT&CK Tag: Abuse Elevation Control Mechanism, Bypass User Account Control
• Query:
,→"C:\ Windows*\SysWOW64\*.exe"]
• Query:
• Query:
• Query:
,→"HKU\*Classes\Folder\shell\open\command"]
• Query:
• Query:
• Query:
request_method=POST (url='*_layouts/15/Picker.aspx*WebControls.ItemPickerDialog*'�
,→OR resource='*_layouts/15/Picker.aspx*WebControls.ItemPickerDialog*')
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
,→Panel\Desktop\SCRNSAVE.EXE"
• Query:
• Query:
,→Defender\Platform\*"] image="*\mpclient.dll"
• Query:
• Query:
,→"))
• Query:
• Query:
• Query:
• Query:
• Query:
,→user IN EXCLUDED_USERS
• Query:
• ATT&CK Category: -
• Query:
,→user IN EXCLUDED_USERS
• Query:
,→user IN EXCLUDED_USERS
• Query:
service="*GC/*"))-user IN EXCLUDED_USERS
• ATT&CK Tag: File and Directory Permissions Modification, Windows File and
Directory Permissions Modification
• Query:
,→USERS
• ATT&CK Tag: Create or Modify System Process, Windows Service, Exploitation for
Credential Access, Exploitation for Privilege Escalation
• Query:
,→USERS
• Query:
• Query:
,→EXCLUDED_USERS
• Query:
• Query:
• Query:
• Query:
• Query:
,→"HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run*" detail="%AppData
,→%\Roaming\Oracle\bin\*")
• Query:
• Query:
• Query:
• Query:
• Query:
,→EXCLUDED_USERS
• Query:
,→target_object="*\SOFTWARE\Microsoft\Windows�
• Query:
• Query:
,→EXCLUDED_USERS
• Query:
• Query:
,→"*C:\WINDOWS\system32\lsass.exe","*C:\Windows\system32\svchost.exe",
,→"*C:\Windows\system32\services.exe","C:\Windows\system32\msiexec.exe",
,→"C:\Windows\system32\Msiexec.exe"]
-user IN EXCLUDED_USERS
,→"*\software\Microsoft\Windows\CurrentVersion\RunOnce*",
,→"*\software\Microsoft\Windows\CurrentVersion\RunOnceEx*",
,→"*\software\Microsoft\Windows\CurrentVersion\RunServices*",
,→"*\software\Microsoft\Windows\CurrentVersion\RunServicesOnce*",
(continues on next page)
,→"*\software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit*",
,→"*\software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell*",
2.64. ,→LP_Authentication Package Detected
"*\software\Microsoft\Windows NT\CurrentVersion\Windows*", 32
,→"*\software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders*"] -user IN�
,→EXCLUDED_USERS
Alert Rules Documentation, Release latest
• Query:
• Query:
• Query:
• Query:
,→user IN EXCLUDED_USERS
• Query:
• Query:
• Query:
• Query:
• Query:
,→<target_manager:all>@<domain:string> |
,→USERS
• Query:
,→USERS
• Query:
,→EXCLUDED_USERS
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
,→image="*\cmstp.exe")
• ATT&CK Tag: Abuse Elevation Control Mechanism, Bypass User Access Control,
Signed Binary Proxy Execution, CMSTP
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
,→country
• Query:
,→USERS
• Query:
• Query:
,→" or target_object="*\Software\Microsoft\Windows\CurrentVersion\Controls�
,→Folder\*\Shellex\PropertySheetHandlers\*" or target_object=
,→USERS
• Query:
• Query:
• Query:
• Query:
,→<domain:string>
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
,→command_match=*
• Query:
,→as script_block
• Query:
• Query:
,→USERS
• Query:
,→EXCLUDED_USERS
• Query:
• Query:
• Query:
,→EXCLUDED_USERS
• Query:
,→command="*Get-CachedGPPPassword*" or command="*Get-RegistryAutoLogon*") -
,→user IN EXCLUDED_USERS
• Query:
• Query:
• Query:
,→EXCLUDED_USERS
• Query:
,→USERS
• Query:
• Query:
• Query:
• Query:
2.121. LP_Default Account privilege elevation followed by restoration of previous account state 57
Alert Rules Documentation, Release latest
,→source_address as source
,→address IN HOMENET]
• Query:
• Query:
• Query:
,→user as User
• Query:
• Query:
• Query:
,→time>1800
• ATT&CK Tag: Application Layer Protocol, DNS, Data Transfer Size Limits
• Query:
• Query:
• Query:
,→|search uniqueSubdomain>10
• Query:
• Query:
• Query:
• Query:
• Query:
,→"*\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\GlobalAssocChangedCounter*
• Query:
,→name
• Query:
• Query:
• Query:
• Query:
• Query:
,→Event>100
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• ATT&CK Tag: Boot or Logon Autostart Execution, Port Monitors, Traffic Signaling,
Port Knocking
• Query:
,→as port
• Query:
• Query:
,→user IN EXCLUDED_USERS
• Query:
• Query:
• Query:
• Query:
• ATT&CK Tag: Boot or Logon Autostart Execution, Registry Run Keys/tartup Folder
• Query:
,→"*\software\Microsoft\Windows\CurrentVersion\RunOnce*",
,→"*\software\Microsoft\Windows\CurrentVersion\RunOnceEx*",
,→"*\software\Microsoft\Windows\CurrentVersion\RunServices*",
,→"*\software\Microsoft\Windows\CurrentVersion\RunServicesOnce*",
,→"*\software\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit*",
,→"*\software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell*",
,→"*\software\Microsoft\Windows NT\CurrentVersion\Windows*",
,→USERS
• Query:
,→(command="*Remove-EtwTraceProvider*" command="*EventLog-Microsoft-Windows-
,→(command="*Set-EtwTraceProvider*" command="*{1418ef04-b0b4-4623-bf7e-
,→d74ab47bbdaa}*" command="*EventLog-Microsoft-Windows-WMI-Activity-Trace*"�
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
,→"*\CurrentControlSet\Services\NTDS\LsaDbExtPt*"]
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
norm_id=VulnerabilityManagement cve_id="*CVE-2019-19781*"
• Query:
• Query:
,→EXCLUDED_USERS
• Query:
• Query:
• ATT&CK Tag: Exploitation for Defense Evasion, Exploitation for Credential Access,
Exploitation for Privilege Escalation, Exploitation for Defense Evasion
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
,→(command in ["*\AppData\Roaming\MICROS~1\Windows\Caches\NavShExt.dll",
,→"*\AppData\Roaming\Microsoft\Windows\Caches\NavShExt.dll"] command="*,Setting*
,→")
• Query:
• Query:
• Query:
,→"*QAZQBuAHYAOgB1AHMAZQByAHAAcgBvAGYAaQBsAGUA*",
,→"*kAGUAbgB2ADoAdQBzAGUAcgBwAHIAbwBmAGkAbABlA*",
,→"*IgAoACcAKgAnACkAOwAkA*",
"*IAKAAnACoAJwApADsAJA*", "*iACgAJwAqACcAKQA7ACQA*",
,→"*JABGAGwAeAByAGgAYwBmAGQ*"] -user IN EXCLUDED_USERS
• Query:
,→USERS
• ATT&CK Tag: Abuse Elevation Control Mechanism, Bypass User Access Control
• Query:
• Query:
• Query:
,→EXCLUDED_USERS
• Query:
• Query:
• Query:
,→search "CNT">5
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
,→USERS
• Query:
• Query:
• Query:
,→"dfd6aa3f7b2b1035b76b718f1ddc689f", "1a6cca4d5460b1710a12dea39e4a592c"] -
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
norm_id=VulnerabilityManagement cve_id="*CVE-2019-10149*"
• Query:
norm_id=* receiver="*${run*"
• Query:
,→USERS
• Query:
• Query:
• Query:
,→C:\Windows\Setup\Scripts\PartnerSetupComplete.cmd"] -image IN [
• Query:
• Query:
,→mui"]
• Query:
,→USERS
• Query:
,→user IN EXCLUDED_USERS
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
,→as destination_country
• Query:
,→geoip(destination_address) as destination_country
• Query:
,→destination_location
• Query:
• Query:
• Query:
• Query:
• Query:
,→as destination_country
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• ATT&CK Tag: Account Discovery, Use Alternate Authentication Material, Pass the
Hash, Email Collection, Command-Line Interface + ATT&CK ID: T1087, T1550,
T1550.002, T1114, T1059
• Query:
potentially trigger the alert. It is essential to carefully review and investigate any
instances of this alert before taking any action to ensure that the activity being
detected is truly malicious.
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• ATT&CK Tag: Event Triggered Execution, Image File Execution Options Injection
• Query:
• Query:
• Query:
,→"*\WINDOWS\System32\RemoteFXvGPUDisablement.exe"] -user="NT�
• Query:
• Query:
,→"*HKLM\System\CurrentControlSet\Services\Sysmon\*",
• Query:
• Query:
,→"*\SOFTWARE\Microsoft\EnterpriseCertificates\Root\Certificates\*" or target_object=
• Query:
• Query:
• Query:
• Query:
• Query:
,→EXCLUDED_USERS
• Query:
,→EXCLUDED_USERS
• Query:
• Query:
• ATT&CK Tag: Bypass User Access Control, Exploitation for Credential Access,
Exploitation for Privilege Escalation
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
,→command
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
,→file
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
2.323.,→"*Visual
LP_LSASS Memory -user
Studio*") DumpINFile Creation
EXCLUDED_USERS 146
Alert Rules Documentation, Release latest
• Query:
• Query:
,→USERS
• Query:
norm_id=VulnerabilityManagement cve_id="*CVE-2016-4010*"
• Query:
,→"*aXRzYWRtaW4gL3RyYW5zZmVy*",
"*IAaQB0AHMAYQBkAG0AaQBuACAALwB0AHIAYQBuAHMAZgBlAHIA*",
,→"*JpdHNhZG1pbiAvdHJhbnNmZX*",
,→"*YgBpAHQAcwBhAGQAbQBpAG4AIAAvAHQAcgBhAG4AcwBmAGUAcg*",
,→"*Yml0c2FkbWluIC90cmFuc2Zlc*",
"*AGMAaAB1AG4AawBfAHMAaQB6AGUA*", "*JABjAGgAdQBuAGsAXwBzAGkAegBlA*
,→", "*JGNodW5rX3Npem*","*QAYwBoAHUAbgBrAF8AcwBpAHoAZQ*",
,→"*RjaHVua19zaXpl*", "*Y2h1bmtfc2l6Z*",
"*AE8ALgBDAG8AbQBwAHIAZQBzAHMAaQBvAG4A*",
,→"*kATwAuAEMAbwBtAHAAcgBlAHMAcwBpAG8Abg*", "*lPLkNvbXByZXNzaW9u*",
"*SQBPAC4AQwBvAG0AcAByAGUAcwBzAGkAbwBuA*", "*SU8uQ29tcHJlc3Npb2*",
,→"*Ty5Db21wcmVzc2lvb*", "*AE8ALgBNAGUAbQBvAHIAeQBTAHQAcgBlAGEAbQ*",
,→"*kATwAuAE0AZQBtAG8AcgB5AFMAdAByAGUAYQBtA*",
"*lPLk1lbW9yeVN0cmVhb*","*SQBPAC4ATQBlAG0AbwByAHkAUwB0AHIAZQBhAG0A*",
,→ "*SU8uTWVtb3J5U3RyZWFt*", "*Ty5NZW1vcnlTdHJlYW*",
,→"*4ARwBlAHQAQwBoAHUAbgBrA*", "*5HZXRDaHVua*",
,→"*AEcAZQB0AEMAaAB1AG4Aaw*",
"*LgBHAGUAdABDAGgAdQBuAGsA*", "*LkdldENodW5r*","*R2V0Q2h1bm*",
,→"*AEgAUgBFAEEARABfAEkATgBGAE8ANgA0A*",
(continues on next page)
,→"*QASABSAEUAQQBEAF8ASQBOAEYATwA2ADQA*", "*RIUkVBRF9JTkZPNj*",
2.330. LP_Malicious Base64 Encoded PowerShell Keywords in Command Lines Detected 149
Alert Rules Documentation, Release latest
"*AHIAZQBhAHQAZQBSAGUAbQBvAHQAZQBUAGgAcgBlAGEAZA*",
,→"*cmVhdGVSZW1vdGVUaHJlYW*",
,→"*MAcgBlAGEAdABlAFIAZQBtAG8AdABlAFQAaAByAGUAYQBkA*",
,→"*NyZWF0ZVJlbW90ZVRocmVhZ*", "*Q3JlYXRlUmVtb3RlVGhyZWFk*",
"*QwByAGUAYQB0AGUAUgBlAG0AbwB0AGUAVABoAHIAZQBhAGQA*",
,→"*0AZQBtAG0AbwB2AGUA*", "*1lbW1vdm*", "*AGUAbQBtAG8AdgBlA*",
,→USERS
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• ATT&CK Tag: Data Encrypted for Impact, Data Encrypted, Data Destruction
• Query:
,→<OriginalFileName:string>
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
,→USERS
• Query:
,→"*\MSACCESS.EXE","*EQNEDT32.EXE", "*\Onenote.exe"]
,→"*\msbuild.exe"]
• Query:
• Query:
• Query:
2.358. LP_Mitre - Initial Access - Hardware Addition - Removable Storage Connected 162
Alert Rules Documentation, Release latest
,→DC>1
2.360. LP_Mitre - Initial Access - Valid Accounts - Inactive User Accounts 163
Alert Rules Documentation, Release latest
• ATT&CK Tag: Credentials from Password Stores, Credentials from Web Browsers
• Query:
,→") | chart count() by user, domain, host, log_ts, path, file, attack_class, technique order�
• Query:
2.362. LP_Mitre Credential Access Using Credentials from Web Browsers Detected 164
Alert Rules Documentation, Release latest
• Query:
• Query:
,→as file
2.364. LP_Mitre Defense Evasion Using Decode Files or Information Detected 165
Alert Rules Documentation, Release latest
• Query:
• Query:
• Query:
• Query:
• Query:
,→count() by user, host, domain, log_ts, command, attack_class, technique order by count()�
,→desc limit 10
• Query:
• Query:
• Query:
,→commandline as command |
chart count() by user, host, domain, log_ts, command, attack_class, technique order by�
,→count() desc limit 10
• Query:
,→chart count() by user, host, domain, log_ts, command, attack_class, technique order by�
• Query:
• Query:
,→user, host, domain, log_ts, command, attack_class, technique order by count() desc limit�
,→10
• Query:
2.376. LP_Mitre Discovery Using System Owner or User Discovery Detected 171
Alert Rules Documentation, Release latest
• Query:
• Query:
• Query:
• Query:
(target_object="HKLM\Software\Microsoft\Windows�
,→NT\CurrentVersion\Windows\AppInit_DLLs" OR target_object=
,→"HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows\LoadAppInit_DLLs")
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
,→E:vbscript*:\Users*.txt*/F*") OR ("process"="*\Temp\winwsh.exe"))
• Query:
• Query:
,→"*\AppXypsaf9f1qserqevf0sws76dx4k9a5206\Shell\open\command\(Default)")
• Query:
• Query:
• Query:
used for authentication. This can allow the adversary to gain unauthorized access
to the system.
• Query:
,→"*SYSTEM\*ControlSet*\Control\Lsa\RestrictSendingNTLMTraffic"]) OR (norm_
,→"\REGISTRY\MACHINE\SYSTEM\*ControlSet*\Control\Lsa" object_value IN [
,→EXCLUDED_USERS
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
,→EXCLUDED_USERS
• Query:
,→USERS
• Query:
• Query:
• Query:
,→<:all>Dir=<direction:word><:all>Protocol=<proto:int><:all>Port=<port:int><:all>
,→{return 'UDP'}")
• Query:
• ATT&CK Tag: T1543 - Create or Modify System Process (2), T1543.003 - Windows
Service (2)
• Query:
• Query:
• Query:
• ATT&CK Tag: Signed Binary Proxy Execution, Rundll32, Indicator Removal on Host
• Query:
• Query:
,→BD4625B9C5A1}\Model",
"*\SOFTWARE\App\AppXbf13d4ea2945444d8b13e2121cb6b663\Application",
"*\SOFTWARE\App\AppXbf13d4ea2945444d8b13e2121cb6b663\DefaultIcon",
,→"*\SOFTWARE\App\AppX70162486c7554f7f80f481985d67586d\Application",
"*\SOFTWARE\App\AppX70162486c7554f7f80f481985d67586d\DefaultIcon",
"*\SOFTWARE\App\AppX37cc7fdccd644b4f85f4b22d5a3f105a\Application",
,→"*\SOFTWARE\App\AppX37cc7fdccd644b4f85f4b22d5a3f105a\DefaultIcon",
"HKU\*_Classes\AppXc52346ec40fb4061ad96be0e6cb7d16a\*", "HKU\*_
,→Classes\AppX3bbba44c6cae4d9695755183472171e2\*",
"HKU\*_Classes\CLSID\{E3517E26-8E93-458D-A6DF-8030BC80528B}\*"]
-user IN EXCLUDED_USERS
• Query:
• Query:
• Query:
,→search DC >1
• Query:
• Query:
2.425. LP_Office365 Multiple Successful Login From Different Host by Single User 193
Alert Rules Documentation, Release latest
• Query:
• Query:
,→0.1 -all*", "*netsh advfirewall firewall add rule name=powershell dir=in*", "*cmd /c�
,→powershell.exe -ep bypass -file c:\s.ps1*", "*/tn win32times /f*", "*create win32times�
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• ATT&CK ID: -
• Query:
• Query:
• Query:
,→or source_address=*)
• ATT&CK ID: -
• Query:
• Query:
,→EXCLUDED_USERS
• Query:
• ATT&CK Tag: Network Denial of Service, Proxy, Exploitation for Defense Evasion
• Query:
,→IN EXCLUDED_USERS
• ATT&CK Category: -
• ATT&CK Tag: -
• ATT&CK ID: -
• Query:
• ATT&CK Tag: Network Denial of Service, Proxy, Exploitation for Defense Evasion
• Query:
• ATT&CK Tag: Proxy, Exploitation for Defense Evasion, Network Denial of Service
• Query:
,→address IN MAIL_SERVER_IP
• Query:
• Query:
• Query:
,→address=* destination_address=*)
• ATT&CK Category: -
• ATT&CK Tag: -
• ATT&CK ID: -
• Query:
• Query:
,→ddos_source>2000
• Query:
• ATT&CK Tag: -
• ATT&CK ID: -
• Query:
• Query:
• Query:
,→EXCLUDED_USERS
,→EXCLUDED_USERS
• Query:
• ATT&CK Tag: Remote Service Session Hijacking, RDP Hijacking, Boot or Logon
Autostart Execution, Registry Run Keys/Startup Folder
• Query:
• Query:
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• ATT&CK ID: -
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• ATT&CK ID: -
• Query:
• Query:
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• ATT&CK ID: -
• Query:
• Query:
• Query:
,→USERS
• ATT&CK Tag: Hijack Execution Flow, DLL Side-Loading, Process Injection, Process
Hollowing
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
,→EXCLUDED_USERS
• Query:
• ATT&CK Tag: Signed Binary Proxy Execution, Rundll32, Command and Scripting
Interpreter, PowerShell
• Query:
• Query:
• Query:
• Query:
,→EXCLUDED_USERS
• Query:
• Query:
• Query:
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• ATT&CK ID: -
• Query:
• Query:
• Query:
• Query:
,→user IN EXCLUDED_USERS
• Query:
• Query:
• Query:
,→USERS
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
,→EXCLUDED_USERS
• Query:
• Query:
• Query:
,→", "*\net1 user /domain", "*\net1 group /domain", "*\net1 group *domain admins* /
• Query:
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• ATT&CK ID: -
• Query:
• Query:
,→country
• ATT&CK Tag: Disk Wipe, Disk Content Wipe, Data Encrypted for Impact, Data
Destruction, Proxy
• Query:
• ATT&CK Tag: -
• ATT&CK ID: -
• Query:
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• ATT&CK ID: -
• Query:
• Query:
• ATT&CK Tag: Event Triggered Execution, Image File Execution Options Injection
• Query:
,→"*\SOFTWARE\Microsoft\Windows�
,→NT\CurrentVersion\SilentProcessExit\*\ReportingMode",
,→"*\SOFTWARE\Microsoft\Windows�
,→IN EXCLUDED_USERS
• Query:
event_id=13 target_object="*\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run"�
,→detail IN ["C:\Windows\Temp\*", "C:\ProgramData\*", "*\AppData\*", "C:\$Recycle.
,→USERS
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• ATT&CK ID: -
• Minimum Log Source Requirement: Vulnerability Management
• Query:
norm_id=VulnerabilityManagement cve_id="*CVE-2018-19320*"
• Query:
• ATT&CK Tag: Exploitation for Defense Evasion, Exploitation for Defense Evasion,
Software Discovery, Security Software Discovery
• Query:
• Query:
• Query:
• Query:
,→impersonateuser:*", "* renew /ticket:*", "* asktgt /user:*", "* harvest /interval:*"] -user�
,→IN EXCLUDED_USERS
• Query:
,→EXCLUDED_USERS
• Query:
• Query:
• Query:
• Query:
• Query:
,→USERS
,→EXCLUDED_USERS
• Query:
• Query:
• Query:
,→USERS
• Query:
• Query:
,→USERS
• Query:
• Query:
• Query:
• Query:
• Query:
• ATT&CK Tag: Valid Accounts, Abuse Elevation Control Mechanism, Bypass User
Access Control
• Query:
• Query:
• Query:
• ATT&CK Tag: Abuse Elevation Control Mechanism, Bypass User Access Control,
Group Policy Modification, Exploitation for Credential Access, Exploitation for
Privilege Escalation
• Query:
• Query:
• ATT&CK Tag: Remote Services, Commonly Used Port, Network Denial of Service,
Endpoint Denial of Service
• Query:
• Query:
2.557. LP_Stealthy Scheduled Task Creation via VBA Macro Detected 251
Alert Rules Documentation, Release latest
• Query:
,→"*cmd.exe osk.exe *", "*cmd.exe Magnify.exe *", "*cmd.exe Narrator.exe *", "*cmd.
• Query:
• Query:
• Query:
,→USERS] as s1
• ATT&CK Tag: T1550 - Use Alternate Authentication Material (2), T1550.002 - Pass
the Hash (2)
• Query:
2.561. LP_Successful Lateral Movement to Administrator via Pass the Hash using Mimikatz Detected
253
Alert Rules Documentation, Release latest
• Query:
• Query:
• Query:
,→EXCLUDED_USERS
• Query:
label="process" label=create command IN ["* -decode *", "* /decode *", "* -decodehex *
,→", "* /decodehex *", "* -urlcache *", "* /urlcache *", "* -verifyctl *", "* /verifyctl *", "* -
,→encode *", "* /encode *", "*certutil* -URL*", "*certutil* /URL*", "*certutil* -ping*",
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
,→user IN EXCLUDED_USERS
• Query:
• Query:
,→"C:\Users\*\AppData\Roaming\Notepad++\updater\gup.exe",
• Query:
• Query:
• Query:
• Query:
-user IN EXCLUDED_USERS
• Query:
-user IN EXCLUDED_USERS
• Query:
"\9f81f59bc58452127884ce513865ed20", "\e710f28d59aa529d6792ca6ff0ca1b34",
,→"\rpchlp_3", "\NamePipe_MoreWindows", "\pcheap_reuse", "\msagent_*", "\gruntsvc
,→", "*\PSEXESVC*",
• Query:
,→USERS
• Query:
,→TunnelService.exe", "*\RSSensor.exe",
"*\RemoteDesktopManagerFree.exe", "*\RemoteDesktopManager.exe",
,→"*\RemoteDesktopManager64.exe", "*\mRemoteNG.exe", "*\mRemote.exe",
,→EXCLUDED_USERS
• Query:
• Query:
• Query:
• Query:
,→"*\Windows\IME\*",
• Query:
• Query:
,→"*\explorer.exe", "*\find.exe",
,→"*\monitoringhost.exe",
• Query:
,→USERS
• Query:
,→RunDLL *", "*\rundll32.exe javascript:*", "* url.dll, *OpenURL *", "* url.dll, *OpenURLA *
,→", "* url.dll, *FileProtocolHandler *", "* zipfldr.dll, *RouteTheCall *", "* Shell32.dll,�
• Query:
,→"*WScript.shell*", "* -nop *", "* -noprofile *", "* -decode *", "* -enc *"] -user IN�
,→EXCLUDED_USERS
• Query:
• Query:
• Query:
• Query:
• Query:
"2443", "777", "13394", "13145", "12103", "5552", "3939", "3675", "666", "473", "5649",
,→"4455", "4433", "1817", "100", "65520", "1960", "1515", "743", "700", "14154", "14103
,→USERS
• Query:
• Query:
,→"*NAMESPACE:\\root\Microsoft\Windows\Defender*"]
• ATT&CK Tag: Hijack Execution Flow, DLL Side-Loading, DLL Search Order
Hijacking
• Query:
,→user IN EXCLUDED_USERS
• Query:
-user IN EXCLUDED_USERS
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
,→EXCLUDED_USERS
• Query:
• Query:
• Query:
norm_id=WinServer event_id=4688 command IN ["*echo *", "*copy *", "*type *", "*file�
,→createnew*"] command IN ["* C:\Windows\System32\Tasks\*", "*�
,→C:\Windows\SysWow64\Tasks\*"]
• Query:
• Query:
,→Category,SourceAddress,Score,Port
• ATT&CK Category: -
• ATT&CK Tag: -
• ATT&CK ID: -
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• ATT&CK ID: -
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• ATT&CK ID: -
• Query:
2.624. LP_Threat Intel Excessive Denied Connections Attempt from IOC 282
Alert Rules Documentation, Release latest
• Query:
• Query:
"*\RuntimeBroker.exe", "*\msedge.exe"]-path=
,→"*\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations" -user IN�
,→EXCLUDED_USERS
• Query:
• Query:
2.628. LP_Transfering Files with Credential Data via Network Shares 284
Alert Rules Documentation, Release latest
• ATT&CK Tag: Abuse Elevation Control Mechanism, Bypass User Access Control
• Query:
• Query:
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• ATT&CK ID: -
• Query:
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• ATT&CK ID: -
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• ATT&CK ID: -
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• ATT&CK ID: -
• Query:
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• ATT&CK ID: -
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• ATT&CK ID: -
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
,→EXCLUDED_USERS
• Query:
,→type=setvalue)
• Query:
• Query:
• Query:
,→domain
• ATT&CK Tag: Valid Accounts, Exploitation for Credential Access, Exploitation for
Privilege Escalation, Exploitation for Defense Evasion, Brute Force
• Query:
• Query:
• Query:
-user IN EXCLUDED_USERS
• Query:
• Query:
,→USERS
• Query:
• Query:
• Query:
,→USERS
• Query:
2.670. LP_Windows SMB Remote Code Execution Vulnerability CVE-2017-0143 Detected 302
Alert Rules Documentation, Release latest
• Query:
• ATT&CK Tag: File and Directory Discovery, Data from Network Shared Drive,
Network Share Discovery
• Query:
• Query:
• Query:
2.674. LP_Windows User Account Change to End with Dollar Sign 304
Alert Rules Documentation, Release latest
• Query:
,→target_object="*\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell\*
,→" or target_object="*\SOFTWARE\Microsoft\Windows�
,→NT\CurrentVersion\Winlogon\Notify\*")
-user IN EXCLUDED_USERS
• Query:
• Query:
• Query:
,→"*\MsMpEng.exe"]
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
,→IN EXCLUDED_USERS
• Query:
• ATT&CK Tag: Abuse Elevation Control Mechanism, Bypass User Access Control
• Query:
• Query:
,→user IN EXCLUDED_USERS
• Query:
• Query:
• Query:
,→EXCLUDED_USERS
• Query:
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• ATT&CK ID: -
• Query:
• Query:
2.694. LP_APT 34 Command and Control Using Commonly used Ports Detected 313
Alert Rules Documentation, Release latest
• Query:
• Query:
2.696. LP_APT 34 Command and Control Using Uncommonly used Port Detected 314
Alert Rules Documentation, Release latest
• ATT&CK Tag: Credentials from Password Stores, Credentials from Web Browsers
• Query:
• Query:
,→commandline as command
• Query:
• Query:
,→txt*T1140_calc_decoded.exe" OR command="*certutil.exe*-encode*calc.exe*T1140_
,→calc.txt" OR command="*certutil.exe*-decode*T1140_calc.txt*T1140_calc_decoded.exe
,→")
• Query:
• Query:
,→command="*get*group*" OR command="*get*ADPrinicipalGroupMembership*") -
,→user IN EXCLUDED_USERS
• Query:
• Query:
,→command
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
,→token_elevation_type="TokenElevationTypeLimited*")
• ATT&CK Category: -
• ATT&CK Tag: -
• ATT&CK ID: -
• Query:
,→exe",
"C:\Windows\SysWOW64\OneDriveSetup.exe", "*\AppData\Local\Microsoft\OneDrive\*",
,→ "*\Microsoft\Windows Defender\platform\*\MpCmdRun.exe",
,→"DismHost.exe"]
• ATT&CK Category: -
• ATT&CK Tag: -
• ATT&CK ID: -
• Query:
,→"*Microsoft\OneDrive\*\FileCoAuth.exe", "C:\ProgramData\Microsoft\*\MpCmdRun.exe
,→Defender\*\NisSrv.exe", "C:\ProgramData\Microsoft\*\MsMpEng.exe"]
• Query:
,→exchaddresses*"]
• Query:
• Query:
• Query:
• ATT&CK Tag: File and Directory Permissions Modification, Windows File and
Directory Permissions Modification
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• ATT&CK ID: -
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• ATT&CK ID: -
• Minimum Log Source Requirement: Windows Sysmon
• Query:
norm_id=WinServer event_source="Microsoft-Windows-TerminalServices-
,→RemoteConnectionManager" event_id=1149 |
• Query:
• Query:
• ATT&CK Tag: Impair Defenses, Disable or Modify Tools, Command and Scripting
Interpreter, PowerShell
• Query:
• Query:
• Query:
,→"C:\ProgramData\Microsoft\Windows Defender\Platform\*"
• Query:
norm_id=WinServer event_source="Microsoft-Windows-TerminalServices-
,→RemoteConnectionManager" event_id=1149 -eventxml.param3 IN HOMENET | rename�
,→eventxml.param3 as source_address
• Query:
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• ATT&CK ID: -
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• ATT&CK ID: -
• Query:
• Query:
• Query:
norm_id=WinServer event_id=5829
• Query:
• Query:
• Query:
,→module=CustomLogin*')
• Query:
• Query:
• Query:
• Query:
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• ATT&CK ID: -
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• ATT&CK ID: -
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• ATT&CK ID: -
• Query:
• Query:
• Query:
,→ '*outlook.exe', '*powerpnt.exe']
• Query:
• Query:
• Query:
• Query:
• Query:
,→=�user=�havingsameuser]asFailfollowedby[normid=WinServer�label=Userlabel=Loginlabel=Successfulu
,→=� user=*]
• Query:
,→(0x00000000)"
• Query:
• Query:
,→"DWORD (0x00000000)"
• Query:
,→DBENGINE\MSSQL\Binn\sqlservr.exe"] "process"="C:\Windows\System32\cmd.exe"�
,→command='"C:\Windows\system32\cmd.exe" *')
• Query:
• Query:
• Query:
• Query:
,→hash_sha256 as ioc
• Query:
,→as ioc
• Query:
• Query:
,→sha256 as ioc
• Query:
• Query:
domain IN ACTINIUM_DOMAINS
• Query:
• Query:
,→ctypes.pyd+*" call_trace="*python3*.dll+*"
• Query:
,→", "*ipconfig*"]
• Query:
• Query:
• Query:
• Query:
• ATT&CK Tag: T1102 - Web Service, T1204.002 - Malicious File, T1505.003 - Web
Shell
• Query:
• ATT&CK Tag: T1102 - Web Service, T1204.002 - Malicious File, T1505.003 - Web
Shell
• Query:
,→"*\Software\Microsoft\Office\Word\Addins\*",
,→"*\Software\Microsoft\Office\Excel\Addins\*",
,→"*\Software\Microsoft\Office\Powerpoint\Addins\*",
,→"*\OfficeClickToRun.exe"]
• Query:
• Query:
• Query:
,→"C:\Windows\syswow64\wbem\WMIC.exe", "C:\Windows\system32\WerFault.exe",
,→"C:\Windows\SysWOW64\WerFault.exe"]
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
,→EXCLUDED_USERS
• Query:
• Query:
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• Query:
• Query:
• Query:
• Query:
• Query:
,→"*?*"])
• Query:
,→command <certificate:'\S+.cer'>
• Query:
,→process="C:\Windows\System32\ftp.exe"
• Query:
• Query:
,→as ioc
,→"process" = "*chrome"
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• ATT&CK Tag: T1105 - Ingress Tool Transfer, T1218 - Signed Binary Proxy Execution
• Query:
,→"*\AppData\Roaming\Temp\*"]
• Query:
,→"*\rundll32.exe"]
• Query:
• ATT&CK Tag: T1216 - Signed Script Proxy Execution, T1218 - Signed Binary Proxy
Execution
• Query:
• Query:
• ATT&CK Tag: T1218 - Signed Binary Proxy Execution, T1547 - Boot or Logon
Autostart Execution
• Query:
,→"*\Software\Microsoft\Windows NT\CurrentVersion\Accessibility\Configuration*"]
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
binaries in Windows. Adversaries can use the wsl binary to execute Windows and
Linux binaries, execute arbitrary Linux commands as root without a password or
download files.
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
,→c *" ]
• Query:
,→"*MachineGuid*"
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• Query:
• Query:
• Query:
• Query:
• Query:
label="Process" label=Create (("process"="*\ngrok.exe" command IN ["* tcp *", "* http *", "*�
,→authtoken *"]) OR (command="* start *" command="*--all*" command="*.yml*" command=
,→"*--config*") OR (command IN ["* tcp 139*", "* tcp 445*", "* tcp 3389*", "* tcp 5985*", "*�
,→tcp 5986*"]))
• Query:
• Query:
• Query:
• Query:
,→command="*RoamDiag.cmd*" parent_command="*-outputpath*"
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
,→command=*
• Query:
• Query:
applications that run using the same models and technologies as Internet Explorer
but outside the browser. Adversaries may abuse mshta.exe to evade defense by
proxy, executing malicious files and Javascript/VBScript through a trusted Windows
utility.
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
label="process" label=create "process"="*\adplus.exe" command IN ["* -hang *" ,"* -pn *",
,→"* -pmn *" ,"* -p *","* -po *","* -c *","* -sc *"]
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
"*MpSigStub.exe","*LMS.exe","*mpam-*.exe"]
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
extension via their batch, PowerShell or VBS scripts. Analysts need to make sure
they place the correct event types in the query.
• Query:
• Query:
• Query:
,→type=SetValue
• Query:
,→%ProgramData%*","*%appdata%*","*%comspec%*","*%localappdata%"]
• Query:
,→"*\Appdata\Local\Microsoft\Windows\WebCache\WebCacheV01.dat","*\cookies.sqlite"])
,→parent_process=idle) "access"="ReadData*"
• Query:
• Query:
• Query:
• Query:
,→"*aXRzYWRtaW4gL3RyYW5zZmVy*",
,→"*IAaQB0AHMAYQBkAG0AaQBuACAALwB0AHIAYQBuAHMAZgBlAHIA*",
,→"*JpdHNhZG1pbiAvdHJhbnNmZX*",
,→"*YgBpAHQAcwBhAGQAbQBpAG4AIAAvAHQAcgBhAG4AcwBmAGUAcg*",
,→"*Yml0c2FkbWluIC90cmFuc2Zlc*", "*AGMAaAB1AG4AawBfAHMAaQB6AGUA*",
,→"*JABjAGgAdQBuAGsAXwBzAGkAegBlA*", "*JGNodW5rX3Npem*",
,→"*AE8ALgBDAG8AbQBwAHIAZQBzAHMAaQBvAG4A*",
,→"*kATwAuAEMAbwBtAHAAcgBlAHMAcwBpAG8Abg*", "*lPLkNvbXByZXNzaW9u*",
,→"*SQBPAC4AQwBvAG0AcAByAGUAcwBzAGkAbwBuA*", "*SU8uQ29tcHJlc3Npb2*",
,→"*Ty5Db21wcmVzc2lvb*", "*AE8ALgBNAGUAbQBvAHIAeQBTAHQAcgBlAGEAbQ*",
,→"*kATwAuAE0AZQBtAG8AcgB5AFMAdAByAGUAYQBtA*", "*lPLk1lbW9yeVN0cmVhb*",
,→"*SQBPAC4ATQBlAG0AbwByAHkAUwB0AHIAZQBhAG0A*", "*SU8uTWVtb3J5U3RyZWFt*",
,→"*AEcAZQB0AEMAaAB1AG4Aaw*", "*LgBHAGUAdABDAGgAdQBuAGsA*",
,→"*QASABSAEUAQQBEAF8ASQBOAEYATwA2ADQA*", "*RIUkVBRF9JTkZPNj*",
,→"*SFJFQURfSU5GTzY0*", "*VABIAFIARQBBAEQAXwBJAE4ARgBPADYANA*",
,→"*VEhSRUFEX0lORk82N*",
,→"*AHIAZQBhAHQAZQBSAGUAbQBvAHQAZQBUAGgAcgBlAGEAZA*",
,→"*cmVhdGVSZW1vdGVUaHJlYW*",
,→"*MAcgBlAGEAdABlAFIAZQBtAG8AdABlAFQAaAByAGUAYQBkA*",
,→"*NyZWF0ZVJlbW90ZVRocmVhZ*", "*Q3JlYXRlUmVtb3RlVGhyZWFk*",
,→"*QwByAGUAYQB0AGUAUgBlAG0AbwB0AGUAVABoAHIAZQBhAGQA*",
• Query:
• Query:
,→ "*\Public\*", "*\PerfLogs\*"]))
• Query:
,→Compiler.exe","RegAsm.exe","RegSvcs.exe","MSHTA.EXE","Msxsl.exe","IEExec.exe","Cmd.
,→Exe","PowerShell.EXE","HH.exe","javaw.exe","pcalua.exe","curl.exe","ScriptRunner.exe",
,→"CertOC.exe","WorkFolders.exe","odbcconf.exe","msiexec.exe","msdt.exe"] OR
,→"*\Windows\Tasks\*","*\Windows\Temp\*","*\Windows\System32\Tasks\*"])
• Query:
,→"C:\Packages\Plugins\Microsoft.GuestConfiguration.ConfigurationforWindows\*"
• Query:
,→domains*","*/user*","*/parentdomain*"])
• Query:
• Query:
• Query:
label="Process" label=Create
(parent_image="KrbRelayUp.exe" OR image="KrbRelayUp.exe" OR
(command=" relay " AND command=" -Domain " AND command=" -ComputerName ") OR
(command=" krbscm " AND command=" -sc ") OR
(command=" spawn " AND command=" -d " AND command=" -cn " AND command=" -cp *"))
application. Adversaries can utilize LNK files to embed their malicious scripts and
commands and lure victims into executing the payload to gain initial access and
evade defense. For this alert to work, an entropy plugin is required. Analysts can
set the entropy value depending on the environment to filter out false positives.
In our environment, legitimate use entropy was below five, so we used an entropy
value greater than five to filter out false positives. The baseline time for using the
process entropy command to detect such events is 90 days.
• Query:
• Query:
,→"*\AppData\Roaming\Code\*"]
• Query:
,→com*", "*cdn.discordapp.com/attachments*","*mediafire.com*","*mega.nz*","*ddns.net*",
,→"*pastetext.net*","*pastebin.pl*","*paste.ee*","*api.telegram.org*"]) OR
,→"*mediafire.com*","*mega.nz*","*ddns.net*",
,→"*pastetext.net*","*pastebin.pl*","*paste.ee*","*api.telegram.org*"])
THREE
• Query:
• Query:
414
Alert Rules Documentation, Release latest
norm_id=VmwareESX label = Link label=Up | chart count() by log_ts, host, switch, port_
,→group, network_adapter
• Query:
norm_id=VmwareESX label = Link label=Down | chart count() by log_ts, host, switch, port_
,→group, network_adapter
• Query:
• Query:
• Query:
3.6. LP_Mitre Command and Control Using Standard Application Layer Protocol Detected 416
Alert Rules Documentation, Release latest
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• Query:
device_category=ProxyServer user_agent=bumblebee
• ATT&CK Category: -
• ATT&CK Tag: -
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• Query:
,→user IN EXCLUDED_USERS
• ATT&CK Category: -
• ATT&CK Tag: -
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• Query:
positives are uncommon, but legitimate use for administrative purposes such as
remote PowerShell execution can trigger this alert.
• ATT&CK Category: -
• ATT&CK Tag: -
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• Query:
,→"C:\Windows\SysWOW64\*"])
3.23. LP_Remote Code Execution using WMI Win32_Service Class over WinRM 423
Alert Rules Documentation, Release latest
protection mechanisms based on the analysis of these logs. As this attack requires
sqlps.exe bundled with MSSQL installation, any device without it is not vulnerable.
Also, child process sqlps.exe spawned by sqlagent.exe is a legitimate action. Direct
PS command execution through SQLPS.exe is rare, but if it occurs, it results in a
false positive.
• ATT&CK Category: -
• ATT&CK Tag: -
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• Query:
,→command="*unbounded*")
• ATT&CK Category: -
• ATT&CK Tag: -
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• Query:
,→"*RunHandlerComServer*")
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• Query:
,→"C:\windows\syswow64\*"]
• ATT&CK Category: -
• ATT&CK Tag: -
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• Minimum Log Source Requirement: Windows
• Query:
,→"*.msh*","*.reg*","*.scr*","*.ps*","*.vb*","*.jar*","*.pl*","*.inf*"]
• ATT&CK Category: -
• ATT&CK Tag: -
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• Query:
• ATT&CK Category: -
• ATT&CK Tag: -
• Query:
,→"*\msaccess.exe","*\mspub.exe","*\eqnedt32.exe","*\visio.exe","*\wordpad.exe",
,→"*\wordview.exe","*\certutil.exe","*\certoc.exe","*\CertReq.exe","*\Desktopimgdownldr.exe
,→","*\esentutl.exe","*\finger.exe","*\AcroRd32.exe","*\RdrCEF.exe","*\mshta.exe","*\hh.exe
,→"]
FOUR
436
Alert Rules Documentation, Release latest
6. Click Ok.
FIVE
KB-LISTS
• EXCLUDED_USERS
• BLACKLIST_IPS
• LOCKERGOGA_EMAILS
• DRAGONFLY_MALICIOUS_FOLDER
• KNOWN_COUNTRY
• EXISTING_USERS
• VALAK_DOMAINS
• SQL_INJECTION_CHARACTERS
• MAZE_RANSOMWARE_IPS
• REVIL_RANSOMWARE_DOMAINS
• CLOUD_APPLICATION_IP
• VULNERABLE_CONTENT
• CLOUD_APPLICATIONS
• HIDDEN_COBRA_IP
• HIDDEN_COBRA_EMAIL
• DRAGONFLY_MALICIOUS_FILES
• MALICIOUS_POWERSHELL_COMMANDS
• MAZE_RANSOMWARE_DOMAINS
• APPLICATION_SHIM_OBJECTS
• SQL_INJECTION_CHARACTER
440
Alert Rules Documentation, Release latest
• BLACKLISTED_IP
• POWERSPLOIT_RECON_MODULES
• LOCKERGOGA_FILES
• DOPPELPAYMENR_RANSOMWARE_DOMAINS
• MAZE_RANSOMWARE_HASHES
• KASPERSKY_UPDATE_FAILURES
• MOST_EXPLOITABLE_EMAILS
• DOMAIN
• PROWLI_CVE
• YOUTUBE
• EXTREMIST_CONTENT
• BLOCKED_APPLICATION
• LOCKERGOGA_HASHES
• KASPERSKY_DETECTED_MALWARE_HASHES
• EXECUTABLES
• MALWARE_HASH
• DRAGONFLY_CNC_REQUEST
• MAGECART_DOMAINS
• HOME_DOMAIN
• ALERT_IRC_PORT
• MAGECART_IPS
• ATTACK_COMMANDS
• PROWLI_DOMAIN
• MOST_EXPLOITABLE_CVE
• WASTEDLOCKER_IPS
• SERVER_ADDRESS
• HOME_DIR
441
Alert Rules Documentation, Release latest
• NON_PCI_COMPLIANT_PORT
• MAIL_SERVER_IP
• DRAGONFLY_MALICIOUS_REGISTRY
• VALAK_HASHES
• MOST_EXPLOITABLE_IPS
• INACTIVE_USERS
• ALERT_UNUSUAL_SOURCE
• WINADMINS
• CLOUD_APP
• KNOWN_FILE
• MALWARE_IP
• INVISIMOLE_MALWARE_HASHES
• WASTEDLOCKER_HASHES
• VULNERABLE_WORKSTATIONS
• HIDDEN_COBRA_HASH
• PETYA_COMMAND
• MAIL_SERVERS
• BLACKLISTED_DOMAIN
• NON_EXISTING_USERS
• DOPPELPAYMER_RANSOMWARE_CVE
• WANNACRY_DOMAIN
• MALICIOUS_POWERSHELL_COMMANDLET_NAMES
• NEFILIM_RANSOMWARE_EMAILS
• PETYA_DIGEST
• MATRIX_FILE
• HOME_FOLDER
• ALLOWED_PORTS
442
Alert Rules Documentation, Release latest
• WEBSERVER_SYSTEMS
• INVISIMOLE_MALWARE_IPS
• BAD_RABBIT_HASH
• WINDOWS_DC
• ADMIN_SOURCES
• DEFAULT_USERS
• UNAPPROVED_PORT
• MALWARE_FILES
• XSS_TAG
• HIDDEN_COBRA_CVE
• MAZE_RANSOMWARE_EMAILS
• WANNACRY_EXTENSION
• ROBBINHOOD_RANSOMWARE_HASHES
• ADMINS
• KNOWN_SERVER_HOST
• PROWLI_HASH
• HOMENET
• KNOWN_DOMAINS
• ABNORMAL_FILES
• MALWARE_EMAILS
• ALERT_PRESENT_EMPLOYEES
• DYNAMIC_CATEGORIES
• CONCERNED_CONTENT
• PROWLI_EMAIL
• CRITICAL_FOLDER
• CRITICAL_FILE
• PROWLI_FILE
443
Alert Rules Documentation, Release latest
• CRITICAL_FILES
• COMMON_PORTS
• MOST_EXPLOITABLE_DOMAINS
• PRIVILEGED_USER
• PERSISTENCE_ACCESSIBILITY_OBJECT
• REVIL_RANSOMWARE_CVE
• ALERT_OPEN_PORTS
• MAZE_RANSOMWARE_CVE
• DOPPELPAYMER_RANSOMWARE_HASHES
• PROWLI_IP
• HTTP_ERROR
• HIDDEN_COBRA_FILE
• MOST_EXPLOITABLE_HASHES
• REVIL_RANSOMWARE_IPS
• REVIL_RANSOMWARE_HASHES
• RYUK_RANSOMWARE_HASH
• BLACKLISTED_PORTS
• INVISIMOLE_MALWARE_DOMAINS
• NEFILIM_RANSOMWARE_HASHES
• PERSISTENCE_ACCESSIBILITY_PROCESS
• CRIMINAL_CONTENT
• BAD_RABBIT_FILE
• KNOWN_APPLICATIONS
• ADMIN_GROUPS
• WASTEDLOCKER_DOMAINS
• SUSPICIOUS_COUNTRY
• HERMETIC_WIPER_HASHES
444
Alert Rules Documentation, Release latest
• HERMETIC_WIPER_DRIVER_HASHES
• ISAAC_WIPER_HASHES
• ACTINIUM_HASHES
• ACTINIUM_DOMAINS
• WHISPERGATE_HASHES
• GHOSTWRITER_DOMAINS
• GHOSTWRITER_IPS
For more details on Lists, go to the Lists section in the LogPoint Data Integration guide.
445
446
Alert Rules Documentation, Release latest
CHAPTER
SIX
APPENDIX