Commit Graph

12326 Commits

Author SHA1 Message Date
brady b91fa627d3 Merge PR #4387 From @br4dy5
new: Certificate Use With No Strong Mapping

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2023-10-11 13:46:17 +02:00
Tuutaans 889aae65a5 Merge PR #4472 From @Tuutaans - New Registry Rule Related To HVCI
Create Release / Create Release (push) Has been cancelled
new: Hypervisor Enforced Code Integrity Disabled

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2023-10-09 11:17:56 +02:00
phantinuss f04419c730 Merge PR #4470 From phantinuss - Fix FPs Found In Testing
fix: Generic Password Dumper Activity on LSASS - FP with GoogleUpdate.exe
fix: Rundll32 Execution Without DLL File - FP with another zzzzInvokeManagedCustomActionOutOfProc MSI installer
fix: Suspicious Shim Database Installation via Sdbinst.EXE - FP with being started as a background service
fix: Potential CVE-2023-36874 Exploitation - Fake Wermgr.Exe Creation - FP with $WinREAgent folder
fix: Files With System Process Name In Unsuspected Locations - FP with wuaucltcore

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2023-10-09 00:07:56 +02:00
jkb 9d8e81241c Merge PR #4471 From @jkb-s - Update ATT&CK Tags
update: Ntdsutil Abuse - Update ATT&CK tags
2023-10-08 23:04:09 +02:00
Ali Alwashali 6075db0e2e Merge PR #4467 from @alwashali - New Rules Related To ScreenConnect RMM Activity
new: Remote Access Tool - ScreenConnect Command Execution
new: Remote Access Tool - ScreenConnect File Transfer
new: Remote Access Tool - ScreenConnect Temporary File
new: Remote Access Tool - ScreenConnect Remote Command Execution

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-10-05 13:09:49 +02:00
SILJAEUROPA a7fc610b70 Merge PR #4452 from @SILJAEUROPA - Add New Rules To AddInUtil Potential Abuse
new: Network Connection Initiated By AddinUtil.EXE
new: Suspicious AddinUtil.EXE CommandLine Execution
new: Uncommon Child Process Of AddinUtil.EXE
new: Uncommon AddinUtil.EXE CommandLine Execution
new: AddinUtil.EXE Execution From Uncommon Directory

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-10-05 13:07:50 +02:00
Nasreddine Bencherchali e230acd7ed Merge PR #4427 from @nasbench - Multiple Fixes & Enhancements
new: Application Terminated Via Wmic.EXE
new: Browser Execution In Headless Mode
new: Chromium Browser Headless Execution To Mockbin Like Site
new: DarkGate User Created Via Net.EXE
new: DMP/HDMP File Creation
new: Malicious Driver Load
new: Malicious Driver Load By Name
new: Potentially Suspicious DMP/HDMP File Creation
new: Remote DLL Load Via Rundll32.EXE
new: Renamed CURL.EXE Execution
new: Vulnerable Driver Load
new: Vulnerable Driver Load By Name
update: 7Zip Compressing Dump Files - Increase coverage
update: Amsi.DLL Loaded Via LOLBIN Process - Reduce level to `medium`
update: COM Hijack via Sdclt - Fix Logic
update: Copy .DMP/.DUMP Files From Remote Share Via Cmd.EXE - Increase coverage
update: Creation of an Executable by an Executable - Fix FP
update: DLL Load By System Process From Suspicious Locations - Reduce level to `medium`
update: DNS Query Request By Regsvr32.EXE - Reduce level to `medium`
update: DNS Query To MEGA Hosting Website - DNS Client - Update title and reduce level to `medium`
update: DNS Query To MEGA Hosting Website - Reduce level to `low` and update metadata
update: DNS Query To Remote Access Software Domain From Non-Browser App - Increase coverage with new domains
update: DNS Query To Ufile.io - DNS Client - Update title and reduce level to `low`
update: DNS Query To Ufile.io - Update title and reduce level to `low`
update: DNS Query Tor .Onion Address - Sysmon - Update title
update: DNS Server Discovery Via LDAP Query - Reduce level to `low` and update FP filters
update: DriverQuery.EXE Execution - Increase coverage
update: File Download From Browser Process Via Inline Link
update: Greedy File Deletion Using Del - Increase coverage
update: Leviathan Registry Key Activity - Fix logic
update: Network Connection Initiated By Regsvr32.EXE - Reduce level to `medium` and metadata update
update: Non Interactive PowerShell Process Spawned - Increase coverage
update: OceanLotus Registry Activity - Fix Logic
update: Office Application Startup - Office Test - Fix Logic
update: OneNote Attachment File Dropped In Suspicious Location - Fix FP
update: Potential Dead Drop Resolvers - Increase coverage with new domains
update: Potential Persistence Via COM Hijacking From Suspicious Locations - Increase coverage and fix logic
update: Potential Persistence Via COM Search Order Hijacking - Fix Logic
update: Potential Process Hollowing Activity - Update FP filters
update: Potential Recon Activity Using DriverQuery.EXE - Increase coverage
update: Potential Unquoted Service Path Reconnaissance Via Wmic.EXE - Reduce level to `medium`
update: Potentially Suspicious Event Viewer Child Process - Update metadata
update: PowerShell Initiated Network Connection - Update description
update: PowerShell Module File Created By Non-PowerShell Process - Fix FP
update: PsExec Tool Execution From Suspicious Locations - PipeName - Reduce level to `medium`
update: Python Image Load By Non-Python Process - Update description and title
update: Python Initiated Connection - Update FP filter
update: Remote Thread Creation By Uncommon Source Image - Update FP filter
update: Renamed AutoIt Execution - Increase coverage
update: Suspicious Chromium Browser Instance Executed With Custom Extensions - Increase coverage
update: Suspicious WebDav Client Execution Via Rundll32.EXE - New Title
update: Sysinternals Tools AppX Versions Execution - Reduce level to `low`
update: Sysmon Blocked Executable - Update logsource
update: UAC Bypass via Event Viewer - Fix Logic
update: UNC2452 Process Creation Patterns - Fix logic
update: Usage Of Malicious POORTRY Signed Driver - Deprecated
update: Vulnerable AVAST Anti Rootkit Driver Load - Deprecated
update: Vulnerable Dell BIOS Update Driver Load - Deprecated
update: Vulnerable Driver Load By Name - Deprecated
update: Vulnerable GIGABYTE Driver Load - Deprecated
update: Vulnerable HW Driver Load - Deprecated
update: Vulnerable Lenovo Driver Load - Deprecated
update: WebDav Client Execution Via Rundll32.EXE
update: Windows Update Error - Reduce level to `informational` and status to `stable`
update: Winrar Compressing Dump Files - Increase Coverage

---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-10-04 19:06:57 +02:00
Michael 43277f26fc Merge PR #4461 from @WTFender - Create AWS rule aws_sso_idp_change.yml
new: AWS Identity Center Identity Provider Change

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2023-09-29 16:37:01 +02:00
phantinuss 733de447de Merge PR #4464 from @phantinuss - Update Goodlog Test
chore: add threat hunting rules to goodlog tests

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2023-09-29 14:33:55 +02:00
RobertSchull c57c076e5e Merge PR #4457 from @RobertSchull - new rules MITRE's Center for Threat Informed Defense
* adding 4 analytics to test branch

* updating names

* Adding link to the CTID website.

* chore: fix metadata and logic

* fix: wording

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-09-29 13:56:49 +02:00
phantinuss 2a463fb7ea Merge PR #4462 From @phantinuss - Fix FP With Unknown Process
fix: Suspicious Epmap Connection - FP with unknown process
2023-09-28 11:13:34 +02:00
Mladia a3f39d8fb6 Merge PR #4458 from @Mladia - Update Coverage
update: Linux Network Service Scanning - Auditd - Update coverage to add `ncat` and `nc.openbsd`

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2023-09-27 10:27:45 +02:00
Sanjay Govind eb2f82cbc3 Merge PR #4450 from @sanjay900 - Fix Typo
fix: Disabling Multi Factor Authentication - Fix typo in title, description and detection logic
2023-09-19 01:18:50 +02:00
cyb3rjy0t 229b70f68a Merge PR #4401 from @cyb3rjy0t - Add New O365 Related Rules
new: Disabling Multi Factor Authenication
new: New Federated Domain Added
update: New Federated Domain Added - Exchange

---------

Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2023-09-18 19:30:16 +02:00
Marco Barbaccia 216a3787b4 Merge PR #4447 from @Uglybeard - Fix Typo In File Name
chore: SCR File Write Event - fix typo in file name
2023-09-18 15:00:18 +02:00
GtUGtHGtNDtEUaE bd45424485 Merge PR #4436 from @GtUGtHGtNDtEUaE - Change Filter Name
chore: Rundll32 Execution Without CommandLine Parameters - Change filter name
2023-09-16 21:21:36 +02:00
frack113 a1b75c6e14 Merge PR #4398 from @nasbench & @frack113 - Update File Access Rules
new: Access To .Reg/.Hive Files By Uncommon Application
update: Access To Browser Credential Files By Uncommon Application
update: Credential Manager Access By Uncommon Application
update: Access To Windows DPAPI Master Keys By Uncommon Application
update: Access To Windows Credential History File By Uncommon Application

---------

Signed-off-by: frack113 <62423083+frack113@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2023-09-15 18:22:02 +02:00
cyb3rjy0t 3b27c338f6 Merge PR #4405 from @nasbench & @cyb3rjy0t - Update Diskshadow Related Rules
new: Diskshadow Child Process Spawned
new: Diskshadow Script Mode - Execution From Potential Suspicious Location
new: Diskshadow Script Mode - Uncommon Script Extension Execution
new: Potentially Suspicious Child Process Of DiskShadow.EXE
update: Diskshadow Script Mode Execution

---------

Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2023-09-15 15:06:36 +02:00
Mark Morowczynski f28b89c084 Merge PR #4445 from @MarkMorow - New Azure PIM Rules
new: Stale Accounts In A Privileged Role
new: Invalid PIM License
new: Roles Assigned Outside PIM
new: Roles Activated Too Frequently
new: Roles Activation Doesn't Require MFA
new: Roles Are Not Being Used
new: Too Many Global Admins

---------

Co-authored-by: gleeiamglo <142270304+gleeiamglo@users.noreply.github.com>
Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2023-09-14 22:02:30 +02:00
redteampanda-ng e881ad0ddf Merge PR #4444 from @redteampanda-ng - Fix Typo
fix: Suspicious Elevated System Shell
2023-09-14 15:23:06 +02:00
Florian Roth d68f19a88e Merge PR #4443 from @Neo23x0 - Fix Null Edge Case & Add New String
fix: Suspicious Sysmon as Execution Parent - Add null value edge case
update: LSASS Process Memory Dump Files - Add `PPLBlade` default dump file indicator

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2023-09-13 20:50:09 +02:00
Nasreddine Bencherchali 52b0c9e8b0 Merge PR #4439 from @nas_bench - Fix FP
fix: Suspicious Elevated System Shell - False positives from CompatTelRunner
2023-09-13 11:59:49 +02:00
Nasreddine Bencherchali b4eb5316fd Merge PR #4439 from @nas_bench - Fix FP
fix: Suspicious Elevated System Shell - False positives during updates presumably
2023-09-12 10:56:39 +02:00
Mark Morowczynski e5fabcbd2f Merge PR #4429 from @MarkMorow - Add New Azure Identity Protection Rules
new: Malicious IP Address Sign-In Failure Rate
new: Malicious IP Address Sign-In Suspicious
new: Primary Refresh Token Access Attempt
new: Azure AD Threat Intelligence

---------

Co-authored-by: gleeiamglo <142270304+gleeiamglo@users.noreply.github.com>
Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-09-11 22:53:52 +02:00
Nick Moore a6c20d8b71 Merge PR #4428 from @kelnage - Add Okta Cross-Tenant Impersonation Rules
new: Okta Identity Provider Created
new: Okta New Admin Console Behaviours
new: Okta Suspicious Activity Reported by End-user
new: Okta User Session Start Via An Anonymising Proxy Service

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2023-09-11 22:52:18 +02:00
frack113 30979206a4 Merge PR #4435 from @frack113 - Update Fsutil Suspicious Invocation
update: Fsutil Suspicious Invocation - add "setZeroData" coverage

---------

Signed-off-by: frack113 <62423083+frack113@users.noreply.github.com>
Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2023-09-11 00:30:24 +02:00
Wagga 44d9d9ee0e Merge PR #4434 from @wagga40 - Update/Fix Rule Logic
update: New Firewall Rule Added In Windows Firewall Exception List - update logic
update: Suspicious Scripting in a WMI Consumer - update logic
2023-09-11 00:14:25 +02:00
phantinuss 6aaa439586 Merge PR #4431 from @phantinuss - Fix False Positives Found In Testing
fix: Potential Dead Drop Resolvers - FP with chrome/FF being installed in appdata
fix: Suspicious Elevated System Shell - update FP for improved script that causes a FP
2023-09-08 11:31:22 +02:00
phantinuss 34de84608d Merge PR #4412 from @phantinuss
fix: Suspicious Epmap Connection - Fix false positives found with null and empty values
2023-09-07 16:16:40 +02:00
kidrek e738fff0a3 Merge PR #4425 from @kidrek - ESXi Syslog Configuration Change Via ESXCLI
new: ESXi Syslog Configuration Change Via ESXCLI

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-09-07 15:49:06 +02:00
Nasreddine Bencherchali bdffe3a7fe Merge PR #4406 from @nasbench - Multiple Updates & Additions
new: CVE-2023-38331 Exploitation Attempt - Suspicious Double Extension File
new: CVE-2023-38331 Exploitation Attempt - Suspicious WinRAR Child Process
new: CVE-2023-40477 Potential Exploitation - .REV File Creation
new: CVE-2023-40477 Potential Exploitation - WinRAR Application Crash
new: IcedID Malware Suspicious Single Digit DLL Execution Via Rundll32
new: IE ZoneMap Setting Downgraded To MyComputer Zone For HTTP Protocols
new: IE ZoneMap Setting Downgraded To MyComputer Zone For HTTP Protocols Via CLI
new: LOL-Binary Copied From System Directory
new: LSASS Dump Keyword In CommandLine
new: Old TLS1.0/TLS1.1 Protocol Version Enabled
new: Potentially Suspicious Child Process Of WinRAR.EXE
new: VMMap Signed Dbghelp.DLL Potential Sideloading
update: 7Zip Compressing Dump Files - Reduce level
update: LOLBIN Execution From Abnormal Drive
update: LSASS Memory Dump File Creation - Deprecated
update: Potential Browser Data Stealing - Increase coverage with more browsers
update: Potentially Suspicious Compression Tool Parameters
update: Potentially Suspicious Windows App Activity - Fix FP, increase coverage and reduce level
update: Rundll32 Execution Without CommandLine Parameters - Add CLI variations
update: Suspicious Child Process Of Manage Engine ServiceDesk
update: Suspicious Copy From or To System Directory - Add new folder "WinSxS"
update: VMMap Unsigned Dbghelp.DLL Potential Sideloading
update: Winrar Execution in Non-Standard Folder
update: Wscript Execution from Non C Drive - Deprecated

---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-09-07 11:42:15 +02:00
frack113 ffcb5855f5 Merge PR #4309 from @frack113 - New Rules & Update Related To Electron Apps Abuse
new: Potentially Suspicious Electron Application CommandLine
update: Suspicious Electron Application Child Processes - Increase coverage

---------

Signed-off-by: frack113 <62423083+frack113@users.noreply.github.com>
Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-09-06 15:11:19 +02:00
frack113 5884d9afd1 Merge PR #4419 from @frack113 - New Rules Related To Zone.Identifier ADS Deletion
new: ADS Zone.Identifier Deleted
new: ADS Zone.Identifier Deleted By Uncommon Application

---------

Signed-off-by: frack113 <62423083+frack113@users.noreply.github.com>
Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-09-06 11:44:39 +02:00
kidrek b177b1e46b Merge PR #4424 from @kidrek - Account Creation Via ESXCLI
new: ESXi Account Creation Via ESXCLI

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-09-06 11:43:21 +02:00
kidrek 359292e572 Merge PR #4396 from @kidrek - Add New Rules Related To ESXCLI Usage
new: ESXi Network Configuration Discovery Via ESXCLI
new: ESXi Admin Permission Assigned To Account Via ESXCLI
new: ESXi Storage Information Discovery Via ESXCLI
new: ESXi System Information Discovery Via ESXCLI
new: ESXi VM List Discovery Via ESXCLI
new: ESXi VM Kill Via ESXCLI
new: ESXi VSAN Information Discovery Via ESXCLI

---------

Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-09-06 11:42:23 +02:00
Thurein Oo 1e7a5b0cb3 Merge PR #4417 from @ThureinOo - Update SQL injections
update: Added some bypass methods used by SQLI Injectors.

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2023-09-06 11:19:10 +02:00
Mark Morowczynski efe2c9bbcb Merge PR #4423 from @MarkMorow - Add Azure AD Identity Protection Rules
new: Anomalous User Activity
new: Activity From Anonymous IP Address
new: Atypical Travel
new: Impossible Travel
new: Suspicious Inbox Forwarding Identity Protection
new: Suspicious Inbox Manipulation Rules
new: Azure AD Account Credential Leaked
new: Sign-In From Malware Infected IP
new: New Country
new: Password Spray Activity
new: Suspicious Browser Activity
new: SAML Token Issuer Anomaly
new: Unfamiliar Sign-In Properties

---------

Co-authored-by: gleeiamglo <142270304+gleeiamglo@users.noreply.github.com>
Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-09-06 10:56:13 +02:00
securepeacock 9cb124f841 Merge PR #4418 from @securepeacock - Fix typo in title
- fix: New Port Forwarding Rule Added Via Netsh.EXE - Fix typo in title

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2023-09-01 23:14:04 +02:00
Thurein Oo d43c500240 Merge PR #4416 from @ThureinOo - Increase SQL Injection Coverage
update: Detects sql injection exploitation attempts - Increase coverage

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
2023-09-01 13:58:34 +02:00
Thurein Oo 421bbed383 Merge PR #4409 from @ThureinOo - Increase Coverage Of Path Traversal Exploitation Rule
update: Detects path traversal exploitation attempts - Increase coverage

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-09-01 10:54:32 +02:00
IntelScott 8efc81a08e Update proc_creation_win_cmd_mklink_osk_cmd.yml
Recommend a change in the Tactic mapping
2023-08-29 16:38:20 -04:00
Tessa Georgen 60b8e9b70f Merge PR #4392 from @tjgeorgen - Update MITRE Tags
- update: update MITRE tags for multiple rules

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2023-08-28 16:53:27 +02:00
Veramine 0d307c6f8b Merge PR #4397 from @veramine - Update Process Terminated Via Taskkill
- update: Process Terminated Via Taskkill - update metadata and move to TH folder

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-08-28 14:25:54 +02:00
phantinuss 3dd9177c2c Merge PR #4400 from @phantinuss - FP with visio.exe
- fix: Potential Persistence Via Visual Studio Tools for Office - FP with visio.exe
2023-08-28 11:23:40 +02:00
phantinuss 188236a4eb Merge PR #4393 from @phantinuss - use explicit CIDR notation for loopback
fix: Search-ms and WebDAV Suspicious Indicators in URL - use explicit CIDR notation for loopback
2023-08-25 10:29:04 +02:00
SethHanford df4fa62bca Merge PR #4380 from @SethHanford - Lnx container discovery
new: Container Residence Discovery Via Proc Virtual FS
new: Docker Container Discovery Via Dockerenv Listing
new: Potential Container Discovery Via Inodes Listing

---------

Co-authored-by: Seth Hanford <shanford@seth-mba.local>
Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-08-24 13:04:25 +02:00
Nasreddine Bencherchali 67d1036566 Merge pull request #4390 from @nasbench - CVE-2023-36874
new: Potential CVE-2023-36874 Exploitation - Uncommon Report.Wer Location
new: Potential CVE-2023-36874 Exploitation - Fake Wermgr.Exe Creation
new: Potential CVE-2023-36874 Exploitation - Fake Wermgr Execution
new: Suspicious Execution Location Of Wermgr.EXE - split from 396f6630-f3ac-44e3-bfc8-1b161bc00c4e
update: Potential Defense Evasion Via Rename Of Highly Relevant Binaries - enhanced child process list
update: Suspicious Child Process Of Wermgr.EXE - update title
fix: SCR File Write Event - update modifier

---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-08-24 12:50:57 +02:00
Daniel Bohannon 3ce631af50 Merge pull request #4294 from @danielbohannon - Permiso p0-LUCR-1 (aka GUI-vil)
new: AWS IAM S3Browser Templated S3 Bucket Policy Creation

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-08-24 12:21:34 +02:00
securepeacock 291ca18d22 Merge pull request #4389 from @securepeacock
chore: Dynamic .NET Compilation Via Csc.EXE - add new reference
2023-08-23 18:59:03 +02:00
securepeacock bad3152ac3 Merge pull request #4388 from @securepeacock
chore: Potential Reconnaissance For Cached Credentials Via Cmdkey.EXE - add new reference
2023-08-23 18:52:22 +02:00