Azure alerts_for_windows_machines

Alerts for Windows Machines monitors Windows VMs and identifies suspicious activities, such as malicious scripts, unusual logon attempts, or potentially malicious software execution.

Mappings

Capability ID Capability Description Category Value ATT&CK ID ATT&CK Name Notes
alerts_for_windows_machines Alerts for Windows Machines detect minimal T1003 OS Credential Dumping
Comments
This control provides detection for a minority of this technique's sub-techniques and procedure examples resulting in a Minimal Coverage score and consequently an overall score of Minimal. Furthermore, its detection capability relies on detecting the usage of specific tools (e.g. sqldumper.exe) further adversely impacting its score.
References
alerts_for_windows_machines Alerts for Windows Machines detect minimal T1003.004 LSA Secrets
Comments
This control may detect when the registry is modified to allow logon credentials to be stored in clear text in LSA memory. This change allows a threat actor to gain plain text credentials from the host machine. The following alerts may be generated: "Detected enabling of the WDigest UseLogonCredential registry key".
References
alerts_for_windows_machines Alerts for Windows Machines detect minimal T1027 Obfuscated Files or Information
Comments
This control may detect usage of VBScript.Encode and base-64 encoding to obfuscate malicious commands and scripts. The following alerts may be generated: "Detected suspicious execution of VBScript.Encode command", "Detected encoded executable in command line data".
References
alerts_for_windows_machines Alerts for Windows Machines detect minimal T1048 Exfiltration Over Alternative Protocol
Comments
This control's detection is specific to a minority of this technique's sub-techniques and procedure examples resulting in a Minimal Coverage score and consequently an overall score of Minimal.
References
alerts_for_windows_machines Alerts for Windows Machines detect minimal T1048.001 Exfiltration Over Symmetric Encrypted Non-C2 Protocol
Comments
This control may detect suspicious use of the Telegram tool for transferring malicious binaries across hosts. The following alerts may be generated: "Detected potentially suspicious use of Telegram tool".
References
alerts_for_windows_machines Alerts for Windows Machines detect minimal T1059 Command and Scripting Interpreter
Comments
This control's detection is specific to a minority of this technique's sub-techniques resulting in a Minimal Coverage score and consequently an overall score of Minimal.
References
alerts_for_windows_machines Alerts for Windows Machines detect minimal T1070 Indicator Removal
Comments
This control's detection is specific to a minority of this technique's sub-techniques and procedure examples resulting in a Minimal Coverage score and consequently an overall score of Minimal.
References
alerts_for_windows_machines Alerts for Windows Machines detect minimal T1082 System Information Discovery
Comments
This control may detect local reconnaissance activity specific to using the systeminfo commands. The following alerts may be generated: "Detected possible local reconnaissance activity".
References
alerts_for_windows_machines Alerts for Windows Machines detect minimal T1136 Create Account
Comments
This control's detection is specific to a minority of this technique's sub-techniques resulting in a Minimal Coverage score and consequently an overall score of Minimal.
References
alerts_for_windows_machines Alerts for Windows Machines detect minimal T1202 Indirect Command Execution
Comments
This control may detect suspicious use of Pcalua.exe to launch executable code. There are other methods of indirect command execution that this control may not detect. The following alerts may be generated: "Detected suspicious use of Pcalua.exe to launch executable code".
References
alerts_for_windows_machines Alerts for Windows Machines detect minimal T1218 System Binary Proxy Execution
Comments
This control's detection is specific to a minority of this technique's sub-techniques resulting in a Minimal Coverage score and consequently an overall score of Minimal.
References
alerts_for_windows_machines Alerts for Windows Machines detect minimal T1222 File and Directory Permissions Modification
Comments
This control provides minimal detection for some of this technique's sub-techniques resulting in an overall score of Minimal.
References
alerts_for_windows_machines Alerts for Windows Machines detect minimal T1222.001 Windows File and Directory Permissions Modification
Comments
This control may detect the usage of cacls.exe to modify file and directory permissions. The following alerts may be generated: "Detected suspicious use of Cacls to lower the security state of the system".
References
alerts_for_windows_machines Alerts for Windows Machines detect minimal T1489 Service Stop
Comments
This control may detect when critical services have been disabled through the usage of specifically net.exe. The following alerts may be generated: "Detected the disabling of critical services".
References
alerts_for_windows_machines Alerts for Windows Machines detect minimal T1543 Create or Modify System Process
Comments
This control's detection is specific to a minority of this technique's sub-techniques resulting in a Minimal Coverage score and consequently an overall score of Minimal.
References
alerts_for_windows_machines Alerts for Windows Machines detect minimal T1546 Event Triggered Execution
Comments
This control's detection is specific to a minority of this technique's sub-techniques resulting in a Minimal Coverage score and consequently an overall score of Minimal.
References
alerts_for_windows_machines Alerts for Windows Machines detect minimal T1547 Boot or Logon Autostart Execution
Comments
This control's detection is specific to a minority of this technique's sub-techniques resulting in a Minimal Coverage score and consequently an overall score of Minimal.
References
alerts_for_windows_machines Alerts for Windows Machines detect minimal T1548 Abuse Elevation Control Mechanism
Comments
The only sub-technique scored (Bypass User Account Control) is the only one relevant to Windows.
References
alerts_for_windows_machines Alerts for Windows Machines detect minimal T1548.002 Bypass User Account Control
Comments
This control may detect when User Account Control is bypassed by manipulating the Windows registry. There may be other methods to Bypass User Account Control which limits the score to Minimal. The following alerts may be generated: "Detected change to a registry key that can be abused to bypass UAC"
References
alerts_for_windows_machines Alerts for Windows Machines detect minimal T1558 Steal or Forge Kerberos Tickets
Comments
This control's detection is specific to a minority of this technique's sub-techniques resulting in a Minimal Coverage score and consequently an overall score of Minimal.
References
alerts_for_windows_machines Alerts for Windows Machines detect minimal T1562 Impair Defenses
Comments
This control's detection is specific to a minority of this technique's sub-techniques resulting in a Minimal Coverage score and consequently an overall score of Minimal.
References
alerts_for_windows_machines Alerts for Windows Machines detect minimal T1564 Hide Artifacts
Comments
This control's detection is specific to a minority of this technique's sub-techniques resulting in a Minimal Coverage score and consequently an overall score of Minimal.
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1027.008 Stripped Payloads
alerts_for_windows_machines Alerts for Windows Machines detect partial T1027.009 Embedded Payloads
alerts_for_windows_machines Alerts for Windows Machines detect partial T1027.010 Command Obfuscation
alerts_for_windows_machines Alerts for Windows Machines detect partial T1027.013 Encrypted/Encoded File
alerts_for_windows_machines Alerts for Windows Machines detect partial T1027.014 Polymorphic Code
alerts_for_windows_machines Alerts for Windows Machines detect partial T1036.008 Masquerade File Type
Comments
This control can detect if commands are executed that are otherwise non-executable file types.
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1053.007 Container Orchestration Job
alerts_for_windows_machines Alerts for Windows Machines detect partial T1055 Process Injection
Comments
This control's Fileless Attack Detection covers all relevant sub-techniques. Detection is periodic at an unknown rate.
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1055.001 Dynamic-link Library Injection
Comments
Injection attacks are specifically cited as a detection focus for Fileless Attack Detection, which is part of this control, with even more specific references to Process Hollowing, executable image injection, and threads started in a dynamically allocated code segment. Detection is periodic at an unknown rate. The following alerts may be generated: "Fileless attack technique detected", "Fileless attack behavior detected", "Fileless attack toolkit detected", "Suspicious SVCHOST process executed".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1055.002 Portable Executable Injection
Comments
Injection attacks are specifically cited as a detection focus for Fileless Attack Detection, which is part of this control, with even more specific references to Process Hollowing, executable image injection, and threads started in a dynamically allocated code segment. Detection is periodic at an unknown rate. The following alerts may be generated: "Fileless attack technique detected", "Fileless attack behavior detected", "Fileless attack toolkit detected", "Suspicious SVCHOST process executed".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1055.003 Thread Execution Hijacking
Comments
Injection attacks are specifically cited as a detection focus for Fileless Attack Detection, which is part of this control, with even more specific references to Process Hollowing, executable image injection, and threads started in a dynamically allocated code segment. Detection is periodic at an unknown rate. The following alerts may be generated: "Fileless attack technique detected", "Fileless attack behavior detected", "Fileless attack toolkit detected", "Suspicious SVCHOST process executed".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1055.004 Asynchronous Procedure Call
Comments
Injection attacks are specifically cited as a detection focus for Fileless Attack Detection, which is part of this control, with even more specific references to Process Hollowing, executable image injection, and threads started in a dynamically allocated code segment. Detection is periodic at an unknown rate. The following alerts may be generated: "Fileless attack technique detected", "Fileless attack behavior detected", "Fileless attack toolkit detected", "Suspicious SVCHOST process executed".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1055.005 Thread Local Storage
Comments
Injection attacks are specifically cited as a detection focus for Fileless Attack Detection, which is part of this control, with even more specific references to Process Hollowing, executable image injection, and threads started in a dynamically allocated code segment. Detection is periodic at an unknown rate. The following alerts may be generated: "Fileless attack technique detected", "Fileless attack behavior detected", "Fileless attack toolkit detected", "Suspicious SVCHOST process executed".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1055.011 Extra Window Memory Injection
Comments
Injection attacks are specifically cited as a detection focus for Fileless Attack Detection, which is part of this control, with even more specific references to Process Hollowing, executable image injection, and threads started in a dynamically allocated code segment. Detection is periodic at an unknown rate. The following alerts may be generated: "Fileless attack technique detected", "Fileless attack behavior detected", "Fileless attack toolkit detected", "Suspicious SVCHOST process executed".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1055.012 Process Hollowing
Comments
Injection attacks are specifically cited as a detection focus for Fileless Attack Detection, which is part of this control, with even more specific references to Process Hollowing, executable image injection, and threads started in a dynamically allocated code segment. Detection is periodic at an unknown rate. The following alerts may be generated: "Fileless attack technique detected", "Fileless attack behavior detected", "Fileless attack toolkit detected", "Suspicious SVCHOST process executed".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1055.013 Process Doppelgänging
Comments
Injection attacks are specifically cited as a detection focus for Fileless Attack Detection, which is part of this control, with even more specific references to Process Hollowing, executable image injection, and threads started in a dynamically allocated code segment. Detection is periodic at an unknown rate. The following alerts may be generated: "Fileless attack technique detected", "Fileless attack behavior detected", "Fileless attack toolkit detected", "Suspicious SVCHOST process executed".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1059.009 Cloud API
alerts_for_windows_machines Alerts for Windows Machines detect partial T1059.010 AutoHotKey & AutoIT
alerts_for_windows_machines Alerts for Windows Machines detect partial T1059.011 Lua
alerts_for_windows_machines Alerts for Windows Machines detect partial T1068 Exploitation for Privilege Escalation
Comments
This control's Fileless Attack Detection identifies shellcode executing within process memory, including shellcode executed as a payload in the exploitation of a software vulnerability. Detection is periodic at an unknown rate. The following alerts may be generated: "Fileless attack technique detected", "Fileless attack behavior detected", "Fileless attack toolkit detected", "Suspicious SVCHOST process executed".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1070.001 Clear Windows Event Logs
Comments
This control may detect when an event log has been cleared or IIS logs have been deleted. The following alerts may be generated: "Detected actions indicative of disabling and deleting IIS log files", "An event log was cleared".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1070.004 File Deletion
Comments
This control may detect suspicious file cleanup commands and shadow copy deletion activity. The following alerts may be generated: "Detected suspicious file cleanup commands", "Suspicious Volume Shadow Copy Activity".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1070.007 Clear Network Connection History and Configurations
alerts_for_windows_machines Alerts for Windows Machines detect partial T1070.008 Clear Mailbox Data
alerts_for_windows_machines Alerts for Windows Machines detect partial T1070.009 Clear Persistence
alerts_for_windows_machines Alerts for Windows Machines detect partial T1078 Valid Accounts
Comments
This control is able to detect some of this technique's sub-techniques resulting in a Partial Coverage score and consequently an overall score of Partial.
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1078.001 Default Accounts
Comments
This control may detect suspicious activity from existing Windows accounts and logons from suspicious IP addresses. The following alerts may be generated: "A logon from a malicious IP has been detected", "A logon from a malicious IP has been detected. [seen multiple times]".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1078.003 Local Accounts
Comments
This control may detect suspicious activity from existing Windows accounts and logons from suspicious IP addresses. The following alerts may be generated: "A logon from a malicious IP has been detected", "A logon from a malicious IP has been detected. [seen multiple times]".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1087 Account Discovery
Comments
This control provides partial detection for some of this technique's sub-techniques and procedure examples resulting in a Partial Coverage score and consequently an overall score of Partial.
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1087.001 Local Account
Comments
This control may detect when the local administrators group is enumerated or when mulitiple domain accounts are queried. The following alerts may be generated: "Multiple Domain Accounts Queried", "Local Administrators group members were enumerated".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1087.002 Domain Account
Comments
This control may detect when the local administrators group is enumerated or when mulitiple domain accounts are queried. The following alerts may be generated: "Multiple Domain Accounts Queried", "Local Administrators group members were enumerated".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1105 Ingress Tool Transfer
Comments
This control may detect usage of malware droppers and creation of suspicious files on the host machine. The following alerts may be generated: "Detected possible execution of malware dropper", "Detected suspicious file creation".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1110 Brute Force
Comments
This control provides detection for some of this technique's sub-techniques and procedure examples resulting in a Partial Coverage score and consequently an overall score of Partial.
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1112 Modify Registry
Comments
This control may detect several methods used to modify the registry for purposes of persistence, privilege elevation, and execution. The following alerts may be generated: "Detected change to a registry key that can be abused to bypass UAC", "Detected enabling of the WDigest UseLogonCredential registry key", "Detected suppression of legal notice displayed to users at logon", "Suspicious WindowPosition registry value detected", "Windows registry persistence method detected".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1134 Access Token Manipulation
Comments
This control can detect when commands associated with this technique are executed, such as runas.
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1136.001 Local Account
Comments
This control may detect when an account is created with an account name that closely resembles a standard Windows account or group name. This may be an account created by an attacker to blend into the environment. The following alerts may be generated: "Suspicious Account Creation Detected".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1140 Deobfuscate/Decode Files or Information
Comments
This control may detect decoding of suspicious files by certutil.exe and may detect the presence of various encoding schemes to obfuscate malicious scripts and commandline arguments. The following alerts may be generated: "Suspicious download using Certutil detected", "Suspicious download using Certutil detected [seen multiple times]", "Detected decoding of an executable using built-in certutil.exe tool".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1189 Drive-by Compromise
Comments
This control's Fileless Attack Detection identifies shellcode executing within process memory, including shellcode executed as a payload in the exploitation of a software vulnerability. Detection is periodic at an unknown rate. The following alerts may be generated: "Fileless attack technique detected", "Fileless attack behavior detected", "Fileless attack toolkit detected", "Suspicious SVCHOST process executed".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1190 Exploit Public-Facing Application
Comments
This control's Fileless Attack Detection identifies shellcode executing within process memory, including shellcode executed as a payload in the exploitation of a software vulnerability. Detection is periodic at an unknown rate. The following alerts may be generated: "Fileless attack technique detected", "Fileless attack behavior detected", "Fileless attack toolkit detected", "Suspicious SVCHOST process executed".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1203 Exploitation for Client Execution
Comments
This control's Fileless Attack Detection identifies shellcode executing within process memory, including shellcode executed as a payload in the exploitation of a software vulnerability. Detection is periodic at an unknown rate. The following alerts may be generated: "Fileless attack technique detected", "Fileless attack behavior detected", "Fileless attack toolkit detected", "Suspicious SVCHOST process executed".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1204 User Execution
Comments
This control provides detection for one of the two sub-techniques of this technique, Malicious File, resulting in a Partial Coverage score and consequently an overall score of Partial.
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1204.002 Malicious File
Comments
This control may detect the usage of a malware dropper and other indicators of a malicious file being executed by the user. The following alerts may be generated: "Detected possible execution of keygen executable", "Detected possible execution of malware dropper", "Detected suspicious file creation".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1204.003 Malicious Image
Comments
This capability can detect when commands are executed that are associated with this technique.
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1210 Exploitation of Remote Services
Comments
This control's Fileless Attack Detection identifies shellcode executing within process memory, including shellcode executed as a payload in the exploitation of a software vulnerability. Detection is periodic at an unknown rate. The following alerts may be generated: "Fileless attack technique detected", "Fileless attack behavior detected", "Fileless attack toolkit detected", "Suspicious SVCHOST process executed".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1211 Exploitation for Defense Evasion
Comments
This control's Fileless Attack Detection identifies shellcode executing within process memory, including shellcode executed as a payload in the exploitation of a software vulnerability. Detection is periodic at an unknown rate. The following alerts may be generated: "Fileless attack technique detected", "Fileless attack behavior detected", "Fileless attack toolkit detected", "Suspicious SVCHOST process executed".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1212 Exploitation for Credential Access
Comments
This control's Fileless Attack Detection identifies shellcode executing within process memory, including shellcode executed as a payload in the exploitation of a software vulnerability. Detection is periodic at an unknown rate. The following alerts may be generated: "Fileless attack technique detected", "Fileless attack behavior detected", "Fileless attack toolkit detected", "Suspicious SVCHOST process executed".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1218.005 Mshta
Comments
This control may detect suspicious usage of Mshta to execute PowerShell and suspicious Rundll32 execution. The following alerts may be generated: "Detected suspicious execution via rundll32.exe", "Detected suspicious combination of HTA and PowerShell".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1218.011 Rundll32
Comments
This control may detect suspicious usage of Mshta to execute PowerShell and suspicious Rundll32 execution. The following alerts may be generated: "Detected suspicious execution via rundll32.exe", "Detected suspicious combination of HTA and PowerShell".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1218.013 Mavinject
Comments
This control may detect usage of the argument INJECTRUNNING which is required for mavinject.exe.
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1218.014 MMC
alerts_for_windows_machines Alerts for Windows Machines detect partial T1218.015 Electron Applications
Comments
This control may detect commands invoking teams.exe or chrome.exe and analyze whether they are being used to execute malicious or abnormal content.
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1505.004 IIS Components
Comments
This control can detect when commands associated with installing IIS web servers are executed, such as AppCmd.exe.
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1505.005 Terminal Services DLL
Comments
This control can detect when commands associated with this technique are executed, such as reg.exe.
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1543.003 Windows Service
Comments
This control may detect when the tscon.exe binary is installed as a service to exploit RDP sessions or when a rare service group is executed under SVCHOST. The following alerts may be generated: "Suspect service installation".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1543.005 Container Service
Comments
This control can detect when commands associated with container services are executed, such as docker or podman.
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1546.002 Screensaver
Comments
This control may detect when a suspicious screensaver process is executed, based on the location of the .scr file. Because this detection is based solely on the location of the file, it has been scored as Partial. The following alerts may be generated: "Suspicious Screensaver process executed".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1546.008 Accessibility Features
Comments
This control may detect when the binary for the sticky keys utility has been replaced, possibly to gain persistence or execution. The following alerts may be generated: "Sticky keys attack detected".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1547.001 Registry Run Keys / Startup Folder
Comments
This control may detect when the Registry is leveraged to gain persistence. The following alerts may be generated: "Windows registry persistence method detected".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1552.001 Credentials In Files
Comments
This control can detect when commands associated with searching for passwords are executed.
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1553.006 Code Signing Policy Modification
Comments
This control can be used to monitor for the execution of commands that could modify the code signing policy of a system, such as bcdedit.exe -set TESTSIGNING ON.
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1555.003 Credentials from Web Browsers
alerts_for_windows_machines Alerts for Windows Machines detect partial T1555.004 Windows Credential Manager
alerts_for_windows_machines Alerts for Windows Machines detect partial T1555.005 Password Managers
alerts_for_windows_machines Alerts for Windows Machines detect partial T1556.005 Reversible Encryption
Comments
This control can monitor for command execution related to reversible encryption such as -AllowReversiblePasswordEncryption $true.
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1558.001 Golden Ticket
Comments
This control may detect commandline parameters consistent with a Kerberos Golden Ticket attack. The following alerts may be generated: "Suspected Kerberos Golden Ticket attack parameters observed".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1562.001 Disable or Modify Tools
Comments
This control may detect when critical services have been disabled, such as Windows Security Center. This control may also detect when IIS logging has been disabled. The following alerts may be generated: "Detected the disabling of critical services", "Detected actions indicative of disabling and deleting IIS log files".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1562.004 Disable or Modify System Firewall
Comments
This control may detect modification of the Windows firewall through use of netsh.exe or using a method that matches a known threat actor. The following alerts may be generated: "Malicious firewall rule created by ZINC server implant [seen multiple times]", "Detected suspicious new firewall rule".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1562.009 Safe Mode Boot
Comments
This control may detect executed commands indicative of changes to boot settings such as bcdedit.exe and bootcfg.exe
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1562.010 Downgrade Attack
Comments
This control may detect executed commands indicative of indicative of attempts to abuse older or deprecated technologies (ex: powershell –v 2).
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1563 Remote Service Session Hijacking
Comments
This control provides partial detection for some of this technique's sub-techniques resulting in a Partial Coverage score and consequently an overall score of Partial.
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1563.002 RDP Hijacking
Comments
This control may detect RDP hijacking through use of the tscon.exe binary. The following alerts may be generated: "Suspect integrity level indicative of RDP hijacking", "Suspect service installation".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1564.003 Hidden Window
Comments
This control may detect usage of the WindowPosition Registry value to hide application windows in non-visible sections of the desktop. The following alerts may be generated: "Suspicious WindowPosition registry value detected".
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1564.008 Email Hiding Rules
Comments
This control can detect when commands are run on VMs that can indicate creation or modification of email rules such as New-InboxRule, Set-InboxRule, New-TransportRule, and Set-TransportRule.
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1564.009 Resource Forking
alerts_for_windows_machines Alerts for Windows Machines detect partial T1564.011 Ignore Process Interrupts
Comments
This control can detect when commands are run related to process interrupts such as nohup.
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1567.004 Exfiltration Over Webhook
alerts_for_windows_machines Alerts for Windows Machines detect partial T1574.013 KernelCallbackTable
Comments
This control can detect windows API calls on VMs indicative of Hijacking Execution Flow via KernelCallBack table such as WriteProcessMemory() and NtQueryInformationProcess().
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1612 Build Image on Host
alerts_for_windows_machines Alerts for Windows Machines detect partial T1614 System Location Discovery
Comments
This capability can detect if commands associated with this technique such as GetLocaleInfoW are executed.
References
alerts_for_windows_machines Alerts for Windows Machines detect partial T1614.001 System Language Discovery
alerts_for_windows_machines Alerts for Windows Machines detect partial T1622 Debugger Evasion
alerts_for_windows_machines Alerts for Windows Machines detect partial T1652 Device Driver Discovery
alerts_for_windows_machines Alerts for Windows Machines detect partial T1654 Log Enumeration
Comments
This capability can detect if commands associated with log enumeration (such as wevutil.exe on Windows and CollectGuestLogs.exe on Azure hosted VMs) are executed.
References
alerts_for_windows_machines Alerts for Windows Machines detect significant T1059.001 PowerShell
Comments
This control may detect suspicious usage of PowerShell and the Windows command line. These detections include usage of suspicious arguments, dynamic script construction, and shellcode on the commandline. The following alerts may be generated: "Detected anomalous mix of upper and lower case characters in command-line", "Detected encoded executable in command line data", "Detected obfuscated command line", "Detected suspicious combination of HTA and PowerShell", "Detected suspicious commandline arguments", "Detected suspicious commandline used to start all executables in a directory", "Detected suspicious credentials in commandline", "Dynamic PS script construction", "Suspicious PowerShell Activity Detected", "Suspicious PowerShell cmdlets executed", "Suspicious command execution".
References
alerts_for_windows_machines Alerts for Windows Machines detect significant T1059.003 Windows Command Shell
Comments
This control may detect suspicious usage of PowerShell and the Windows command line. These detections include usage of suspicious arguments, dynamic script construction, and shellcode on the commandline. The following alerts may be generated: "Detected anomalous mix of upper and lower case characters in command-line", "Detected encoded executable in command line data", "Detected obfuscated command line", "Detected suspicious combination of HTA and PowerShell", "Detected suspicious commandline arguments", "Detected suspicious commandline used to start all executables in a directory", "Detected suspicious credentials in commandline", "Dynamic PS script construction", "Suspicious PowerShell Activity Detected", "Suspicious PowerShell cmdlets executed", "Suspicious command execution".
References
alerts_for_windows_machines Alerts for Windows Machines detect significant T1110.001 Password Guessing
Comments
This control may detect successful and failed brute force attempts with logic that factors the IP, time between attempts, and other suspicious activity. The following alerts may be generated: "A logon from a malicious IP has been detected", "A logon from a malicious IP has been detected. [seen multiple times]", "Successful brute force attack", "Suspicious authentication activity".
References
alerts_for_windows_machines Alerts for Windows Machines detect significant T1110.003 Password Spraying
Comments
This control may detect successful and failed brute force attempts with logic that factors the IP, time between attempts, and other suspicious activity. The following alerts may be generated: "A logon from a malicious IP has been detected", "A logon from a malicious IP has been detected. [seen multiple times]", "Successful brute force attack", "Suspicious authentication activity".
References
alerts_for_windows_machines Alerts for Windows Machines detect significant T1110.004 Credential Stuffing
Comments
This control may detect successful and failed brute force attempts with logic that factors the IP, time between attempts, and other suspicious activity. The following alerts may be generated: "A logon from a malicious IP has been detected", "A logon from a malicious IP has been detected. [seen multiple times]", "Successful brute force attack", "Suspicious authentication activity".
References