Files
2026-04-01 12:32:09 +02:00

16 KiB

1idtitledatemodifiedlevel
2867613fb-fa60-4497-a017-a82df74a172cPowerShell Execution2019-09-122021-11-05medium
30d894093-71bc-43c3-8c4d-ecfc28dcf5d9Mimikatz Detection LSASS Access2017-10-182022-04-11high
43d304fda-78aa-43ed-975c-d740798a49c1Suspicious PowerShell Invocations - Generic2017-03-122022-04-11high
556a8189f-11b2-48c8-8ca7-c54b03c2fbf7Suspicious Esentutl Use2020-05-232022-04-11high
665531a81-a694-4e31-ae04-f8ba5bc33759Suspicious PowerShell Download2017-03-052022-04-11medium
79f7aa113-9da6-4a8d-907c-5f1a4b908299SyncAppvPublishingServer Execution to Bypass Powershell Restriction2020-10-052022-04-11medium
8a0d63692-a531-4912-ad39-4393325b2a9cRClone Execution2021-05-102022-04-11high
9b932b60f-fdda-4d53-8eda-a170c1d97bbdActivity Related to NTDS.dit Domain Hash Retrieval2019-01-162022-04-11high
10cb7286ba-f207-44ab-b9e6-760d82b84253Rclone Execution via Command Line or PowerShell2021-05-262022-04-11high
11fde7929d-8beb-4a4c-b922-be9974671667SyncAppvPublishingServer Execution to Bypass Powershell Restriction2020-10-052022-04-11medium
1217f878b8-9968-4578-b814-c4217fc5768cAutorun Keys Modification2019-10-252022-05-14medium
1329d31aee-30f4-4006-85a9-a4a02d65306cLateral Movement Indicator ConDrv2021-04-272022-05-14low
1498f4c75c-3089-44f3-b733-b327b9cd9c9dAccessing Encrypted Credentials from Google Chrome Login Database2021-12-202022-05-14medium
15a457f232-7df9-491d-898f-b5aabd2cbe2fWindows Management Instrumentation DLL Loaded Via Microsoft Word2019-12-262022-05-14informational
16db2110f3-479d-42a6-94fb-d35bc1e46492CreateMiniDump Hacktool2019-12-222022-05-14high
172621b3a6-3840-4810-ac14-a02426086171Winword.exe Loads Suspicious DLL2020-10-092022-07-25medium
18bf6c39fc-e203-45b9-9538-05397c1b4f3fAbusing Findstr for Defense Evasion2020-10-052022-10-12medium
1982a19e3a-2bfe-4a91-8c0d-5d4c98fbb719Possible Applocker Bypass2019-01-162022-11-03low
20dca91cfd-d7ab-4c66-8da7-ee57d487b35bProcess Start From Suspicious Folder2022-02-112022-11-03low
2153c7cca0-2901-493a-95db-d00d6fcf0a37Brute Force2019-10-252022-11-04medium
225f113a8f-8b61-41ca-b90f-d374fa7e4a39Suspicious In-Memory Module Execution2019-10-272022-11-17low
23f67dbfce-93bc-440d-86ad-a95ae8858c90Suspicious Bitsadmin Job via PowerShell2018-10-302022-11-21high
249d1c72f5-43f0-4da5-9320-648cf2099dd0Excel Proxy Executing Regsvr32 With Payload2021-08-232022-12-02high
25c0e1c3d5-4381-4f18-8145-2583f06a1fe5Excel Proxy Executing Regsvr32 With Payload Alternate2021-08-232022-12-02high
2672671447-4352-4413-bb91-b85569687135Nslookup PwSh Download Cradle2022-09-062022-12-14medium
273f07b9d1-2082-4c56-9277-613a621983ccAccessing WinAPI in PowerShell for Credentials Dumping2020-10-062022-12-18high
28e554f142-5cf3-4e55-ace9-a1b59e0def65DCOM InternetExplorer.Application Iertutil DLL Hijack - Sysmon2020-10-122022-12-18critical
2917eb8e57-9983-420d-ad8a-2c4976c22eb8MavInject Process Injection2018-12-122022-12-19high
3036c5146c-d127-4f85-8e21-01bf62355d5aInvoke-Obfuscation Via Use Rundll322019-10-082022-12-30high
316d3f1399-a81c-4409-aff3-1ecfe9330bafPrintNightmare Powershell Exploitation2021-08-092023-01-02high
3283083ac6-1816-4e76-97d7-59af9a9ae46eAzureHound PowerShell Commands2021-10-232023-01-02high
33a85cf4e3-56ee-4e79-adeb-789f8fb209a8Indirect Command Exectuion via Forfiles2022-10-172023-01-04medium
34fa47597e-90e9-41cd-ab72-c3b74cfb0d02Indirect Command Execution2019-10-242023-01-04low
35e4b63079-6198-405c-abd7-3fe8b0ce3263Suspicious CLR Logs Creation2020-10-122023-01-05high
36cd5c8085-4070-4e22-908d-a5b3342deb74Suspicious Bitstransfer via PowerShell2021-08-192023-01-10medium
37d178a2d7-129a-4ba4-8ee6-d6e1fecd5d20Renamed PowerShell2019-08-222023-01-18high
38d4d2574f-ac17-4d9e-b986-aeeae0dc8fe2Renamed Rundll32.exe Execution2022-06-082023-01-18high
39e31f89f7-36fb-4697-8ab6-48823708353bSuspicious Cmd Execution via WMI2022-09-272023-01-19medium
40bf7286e7-c0be-460b-a7e8-5b2e07ecc2f2Netcat The Powershell Version - PowerShell Module2021-07-212023-01-20medium
4147688f1b-9f51-4656-b013-3cc49a166a36Base64 Encoded Listing of Shadowcopy2022-03-012023-01-30high
425b572dcf-254b-425c-a8c5-d9af6bea35a6Potential Xor Encoded PowerShell Command2022-07-062023-01-30medium
43fd6e2919-3936-40c9-99db-0aa922c356f7Malicious Base64 Encoded Powershell Invoke Cmdlets2022-05-312023-01-30high
44eeb66bbb-3dde-4582-815a-584aee9fe6d1Correct Execution of Nltest.exe2021-10-042023-02-02high
450acaad27-9f02-4136-a243-c357202edd74Ryuk Ransomware Command Line Activity2019-08-062023-02-03critical
464f927692-68b5-4267-871b-073c45f4f6fePowerShell AMSI Bypass Pattern2022-11-042023-02-03high
47038cd51c-3ad8-41c5-ba8f-5d1c92f3cc1eRegistry Dump of SAM Creds and Secrets2022-01-052023-02-04high
4804f5363a-6bca-42ff-be70-0d28bf629eadOffice Applications Spawning Wmi Cli Alternate2021-08-232023-02-04high
4923daeb52-e6eb-493c-8607-c4f0246cb7d8New Lolbin Process by Office Applications2021-08-232023-02-04high
50518643ba-7d9c-4fa5-9f37-baed36059f6aWMI Execution Via Office Process2021-08-232023-02-04medium
5177815820-246c-47b8-9741-e0def3f57308Domain Trust Discovery2019-10-232023-02-04medium
524d6c9da1-318b-4edf-bcea-b6c93fa98fd0Credential Acquisition via Registry Hive Dumping2022-10-042023-02-06high
536545ce61-a1bd-4119-b9be-fcbee42c0cf3Execute MSDT.EXE Using Diagcab File2022-06-092023-02-06high
549841b233-8df8-4ad7-9133-b0b4402a9014Sysinternals SDelete Registry Keys2020-05-022023-02-07medium
5509af397b-c5eb-4811-b2bb-08b3de464ebfWMI Reconnaissance List Remote Services2022-01-012023-02-14medium
567b0666ad-3e38-4e3d-9bab-78b06de85f7bRenamed PaExec Execution2019-04-172023-02-14medium
57bc3cc333-48b9-467a-9d1f-d44ee594ef48SCM DLL Sideload2022-12-012023-02-14medium
58e42af9df-d90b-4306-b7fb-05c863847ebdWMI Remote Command Execution2022-03-132023-02-14medium
59fa4b21c9-0057-4493-b289-2556416ae4d7Squirrel Lolbin2019-11-122023-02-14medium
60e011a729-98a6-4139-b5c4-bf6f6dd8239aSuspicious Certutil Command Usage2019-01-162023-02-15high
61034affe8-6170-11ec-844f-0f78aa0c4d66Mimikatz MemSSP Default Log File Creation2021-12-202023-02-16critical
627fe71fc9-de3b-432a-8d57-8c809efc10abNew Service Creation2019-10-212023-02-20low
63056a7ee1-4853-4e67-86a0-3fd9ceed7555Invoke-Obfuscation RUNDLL LAUNCHER2020-10-182023-02-21medium
643ede524d-21cc-472d-a3ce-d21b568d8db7PsExec Service Start2018-03-132023-02-28low
6580167ada-7a12-41ed-b8e9-aa47195c66a1Run Whoami as SYSTEM2019-10-232023-02-28high
66fa91cc36-24c9-41ce-b3c8-3bbc3f2f67baPsExec Tool Execution2017-06-122023-02-28low
672c0d2d7b-30d6-4d14-9751-7b9113042ab9Suspicious Characters in CommandLine2022-04-272023-03-03high
686783aa9e-0dc3-49d4-a94a-8b39c5fd700bStop Or Remove Antivirus Service2021-07-072023-03-04high
697fd4bb39-12d0-45ab-bb36-cebabc73dc7bSuspicious Execution of Sc to Delete AV Services2022-08-012023-03-04high
70a7a7e0e5-1d57-49df-9c58-9fe5bc0346a2Renamed PsExec2019-05-212023-03-04high
711a70042a-6622-4a2b-8958-267625349abfRun from a Zip File2021-12-262023-03-05medium
7246591fae-7a4c-46ea-aec3-dff5e6d785dcRoot Certificate Installed2020-10-102023-03-05medium
73eb87818d-db5d-49cc-a987-d5da331fbd90Stop Windows Service2019-10-232023-03-05low
7423250293-eed5-4c39-b57a-841c8933a57dVisual Basic Script Execution2022-01-022023-03-06medium
75344482e4-a477-436c-aa70-7536d18a48c7Execution via MSSQL Xp_cmdshell Stored Procedure2022-09-282023-03-06high
7600a4bacd-6db4-46d5-9258-a7d5ebff4003Read and Execute a File Via Cmd.exe2022-08-202023-03-07medium
7770e68156-6571-427b-a6e9-4476a173a9b6Cmd Stream Redirection2022-02-042023-03-07medium
78033fe7d6-66d1-4240-ac6b-28908009c71fAPT292018-12-042023-03-08high
7904d9079e-3905-4b70-ad37-6bdf11304965CrackMapExecWin2018-04-082023-03-08critical
8018739897-21b1-41da-8ee4-5b786915a676GALLIUM Artefacts2020-02-072023-03-09high
810eb2107b-a596-422e-b123-b389d5594ed7Hurricane Panda Activity2019-03-042023-03-10high
824a12fa47-c735-4032-a214-6fab5b120670Lazarus Activity Apr212021-04-202023-03-10high
837454df60-1478-484b-810d-bff5d0ba6d4bDNS Tunnel Technique from MuddyWater2020-06-042023-03-10critical
847b49c990-4a9a-4e65-ba95-47c9cc448f6eLazarus Loaders2020-12-232023-03-10critical
8543f487f0-755f-4c2a-bce7-d6d2eec2fcf8Suspicious Add Scheduled Task From User AppData Temp2021-11-032023-03-14high
86d813d662-785b-42ca-8b4a-f7457d78d5a9Suspicious Load of Advapi31.dll2022-02-032023-03-15informational
87e74e15cc-c4b6-4c80-b7eb-dfe49feb7fe9Edit of .bash_profile and .bashrc2019-05-122023-03-23medium
88ba2a7c80-027b-460f-92e2-57d113897dbcApp Permissions Granted For Other APIs2022-07-282023-03-29medium
8918cf6cf0-39b0-4c22-9593-e244bdc9a2d4TA505 Dropper Load Pattern2020-12-082023-04-05critical
902d117e49-e626-4c7c-bd1f-c3c0147774c8Potential PowerShell Base64 Encoded Shellcode2018-11-172023-04-06medium
91635dbb88-67b3-4b41-9ea5-a3af2dd88153Microsoft Binary Github Communication2017-08-242023-04-18high
926c939dfa-c710-4e12-a4dd-47e1f10e68e1Domestic Kitten FurBall Malware Pattern2021-02-082023-04-20high
936355a919-2e97-4285-a673-74645566340dProcess Memory Dumped Via RdrLeakDiag.EXE2022-01-042023-04-24high
949cf01b6c-e723-4841-a868-6d7f8245ca6eGroup Modification Logging2019-03-262023-04-26low
95410ad193-a728-4107-bc79-4419789fcbf8Trickbot Malware Reconnaissance Activity2019-12-282023-04-28high
96fce5f582-cc00-41e1-941a-c6fabf0fdb8cSuspicious PowerShell Invocations - Specific2017-03-052023-05-04high
97f016c716-754a-467f-a39e-63c06f773987Suspicious Remote Thread Target2022-08-252023-05-05medium
9865d2be45-8600-4042-b4c0-577a1ff8a60eApplication Whitelisting Bypass via DLL Loaded by odbcconf.exe2019-10-252023-05-22medium
998e2b24c9-4add-46a0-b4bb-0057b4e6187dRegsvr32 Anomaly2019-01-162023-05-26high
100fe6e002f-f244-4278-9263-20e4b593827fAlternate PowerShell Hosts - Image2019-09-122023-06-01low
1019e77ed63-2ecf-4c7b-b09d-640834882028PsExec Pipes Artifacts2020-05-102023-08-07medium
10239776c99-1c7b-4ba0-b5aa-641525eee1a4Execution via CL_Mutexverifiers.ps12020-10-142023-08-17high
1034cd29327-685a-460e-9dac-c3ab96e549dcExecution via CL_Invocation.ps1 - Powershell2020-10-142023-08-17high
1044e8d5fd3-c959-441f-a941-f73d0cdcdca5Abusing Windows Telemetry For Persistence - Registry2020-09-292023-08-17high
1057c637634-c95d-4bbf-b26c-a82510874b34Disable Microsoft Office Security Features2021-06-082023-08-17high
1068a58209c-7ae6-4027-afb0-307a78e4589aUser Account Hidden By Registry2022-08-202023-08-17high
1079b894e57-033f-46cf-b7fa-a52804181973Office Security Settings Changed2020-05-222023-08-17high
108c81fe886-cac0-4913-a511-2822d72ff505SilentProcessExit Monitor Registration2021-02-262023-08-17high
1090c1ffcf9-efa9-436e-ab68-23a9496ebf5bUser Added To Admin Group - MacOS2023-03-192023-08-22medium
1105b80cf53-3a46-4adc-960b-05ec19348d74Wscript Execution from Non C Drive2022-10-012023-08-29medium
1115e3d3601-0662-4af0-b1d2-36a05e90c40aLSASS Memory Dump File Creation2019-10-222023-08-29high
112839f1ee1-292d-495a-bf37-818267b8ee82Vulnerable Driver Load By Name2022-10-032023-09-03low
11321b23707-60d6-41bb-96e3-0f0481b0fed9Vulnerable Dell BIOS Update Driver Load2021-05-052023-09-12high
1147bcfeece-e5ed-4ff3-a5fb-2640d8cc8647Vulnerable GIGABYTE Driver Load2022-07-252023-09-12high
1157c676970-af4f-43c8-80af-ec9b49952852Vulnerable AVAST Anti Rootkit Driver Load2022-07-282023-09-12high
1169bacc538-d1b9-4d42-862e-469eafc05a41Vulnerable HW Driver Load2022-07-262023-09-12high
117ac683a42-877b-4ff8-91ac-69e94b0f70b4Vulnerable Lenovo Driver Load2022-11-102023-09-12high
11891bc09e7-674d-4cf5-8d86-ed5d8bdb95a6Usage Of Malicious POORTRY Signed Driver2022-12-162023-09-13high
119d7825193-b70a-48a4-b992-8b5b3015cc11Windows Update Client LOLBIN2020-10-172023-11-11high
120ca83e9f3-657a-45d0-88d6-c1ac280caf53New Service Uses Double Ampersand in Path2022-07-052023-11-15high
121fe34868f-6e0e-4882-81f6-c43aa8f15b62Windows Defender Threat Detection Disabled2020-07-282023-11-22high
12232d0d3e2-e58d-4d41-926b-18b520b2b32dCredential Dumping Tools Accessing LSASS Memory2017-02-162023-11-30high
123a122ac13-daf8-4175-83a2-72c387be339dSecurity Event Log Cleared2021-08-152023-12-06medium
1240332a266-b584-47b4-933d-a00b103e1b37Suspicious Get-WmiObject2022-01-122023-12-11low
12546deb5e1-28c9-4905-b2df-51cdcc9e6073PowerShell Scripts Run by a Services2020-10-062023-12-11high
126d23f2ba5-9da0-4463-8908-8ee47f614bb9Powershell File and Directory Discovery2021-12-152023-12-11low
127df5ff0a5-f83f-4a5b-bba1-3e6a3f6f6ea2Credential Dumping Tools Service Execution2017-03-052023-12-11critical
128602a1f13-c640-4d73-b053-be9a2fa58b77Svchost DLL Search Order Hijack2019-10-282024-01-10high
129839dd1e8-eda8-4834-8145-01beeee33acdSAM Dump to AppData2018-01-272024-01-18high
130e32ce4f5-46c6-4c47-ba69-5de3c9193cd7Possible Process Hollowing Image Loading2018-01-072024-01-22high
131a6d67db4-6220-436d-8afc-f3842fe05d43Dnscat Execution2019-10-242024-01-25critical
132d7b09985-95a3-44be-8450-b6eadf49833eSuspicious Non-Browser Network Communication With Reddit API2023-02-162024-02-02medium
13337325383-740a-403d-b1a2-b2b4ab7992e7CobaltStrike Malleable (OCSP) Profile2019-11-122024-02-15high
13441b42a36-f62c-4c34-bd40-8cb804a34ad8CobaltStrike Malformed UAs in Malleable Profiles2021-05-062024-02-15critical
135953b895e-5cc9-454b-b183-7f3db555452eCobaltStrike Malleable Amazon Browsing Traffic Profile2019-11-122024-02-15high
136c9b33401-cc6a-4cf6-83bb-57ddcb2407fcCobaltStrike Malleable OneDrive Browsing Traffic Profile2019-11-122024-02-15high
13773fcad2e-ff14-4c38-b11d-4172c8ac86c7Suspicious Rundll32 Script in CommandLine2021-12-042024-02-23medium
1389f06447a-a33a-4cbe-a94f-a3f43184a7a3Rundll32 JS RunHTMLApplication Pattern2022-01-142024-02-23high
139e06ac91d-b9e6-443d-8e5b-af749e7aa6b6iOS Implant URL Pattern2019-08-302024-02-26critical
140628d7a0b-7b84-4466-8552-e6138bc03b43Suspicious Epmap Connection2022-07-142024-03-01high
1419433ff9c-5d3f-4269-99f8-95fc826ea489CrackMapExec File Creation Patterns2022-03-122024-03-01high
142c625c4c2-515d-407f-8bb6-456f65955669Service Binary in Uncommon Folder2022-05-022024-03-25medium
14342f0e038-767e-4b85-9d96-2c6335bad0b5Adwind RAT / JRAT - Registry2017-11-102024-03-26high
1445039f3d2-406a-4c1a-9350-7a5a85dc84c2Search-ms and WebDAV Suspicious Indicators in URL2023-08-212024-05-10high
145b916cba1-b38a-42da-9223-17114d846fd6Potential NT API Stub Patching2023-01-072024-05-27medium
1463d968d17-ffa4-4bc0-bfdc-f139de76ce77Potential Persistence Via COM Hijacking From Suspicious Locations2022-07-282024-07-16high
1471a3d42dd-3763-46b9-8025-b5f17f340dfbSuspicious Unattend.xml File Access2021-12-192024-07-22medium
1486902955a-01b7-432c-b32a-6f5f81d8f624Suspicious File Event With Teams Objects2022-09-162024-07-22high
149a0ff33d8-79e4-4cef-b4f3-9dc4133ccd12Potential Persistence Via COM Search Order Hijacking2020-04-142024-09-02medium
150a33f8808-2812-4373-ae95-8cfb82134978Windows Defender Exclusion Deleted2019-10-262025-01-30medium
151e17121b4-ef2a-4418-8a59-12fb1631fa9eDelete Volume Shadow Copies via WMI with PowerShell - PS Script2021-12-262025-05-20high
1526e897651-f157-4d8f-aaeb-df8151488385PowerShell Web Download2022-03-242025-07-18medium
153f748c45a-f8d3-4e6f-b617-fe176f695b8f.RDP File Created by Outlook Process2024-11-012025-07-22high
154a2a3b925-7bb0-433b-b508-db9003263cc4Active Directory Parsing DLL Loaded Via Office Application2020-02-192025-10-17medium
155cdeef967-f9a1-4375-90ee-6978c5f23974Azure Application Credential Modified2021-09-022025-10-17medium
1568f70ac5f-1f6f-4f8e-b454-db19561216c5PowerShell DownloadFile2020-08-282025-10-20high
157e28a5a99-da44-436d-b7a0-2afc20a5f413Whoami Utility Execution2018-08-132025-10-20low
1587417e29e-c2e7-4cf6-a2e8-767228c64837Active Directory Kerberos DLL Loaded Via Office Application2020-02-192025-10-22medium
159879c3015-c88b-4782-93d7-07adf92dbcb7Space After Filename2020-06-172025-11-22low
160e710a880-1f18-4417-b6a0-b5afdf7e305aAtomic MacOS Stealer - FileGrabber Infostealer Execution2025-09-122025-11-22high
1614be03877-d5b6-4520-85c9-a5911c0a656cFileFix - Suspicious Child Process from Browser File Upload Abuse2025-06-262025-11-24high
1626e30c82f-a9f8-4aab-b79c-7c12bce6f248File Download Via Bitsadmin To An Uncommon Target Folder2022-06-282025-12-10medium
16315b7abbb-8b40-4d01-9ee2-b51994b1d474Suspicious PowerShell Mailbox SMTP Forward Rule2022-10-262026-03-01medium