EDR
52 queries en esta categoría
Pass-the-Hash / Overpass-the-Hash
Detects Pass-the-Hash techniques via sekurlsa, pth-winexe, Rubeus, or similar tools that abuse NTLM hashes for authentication.
PowerShell Download Cradle
Detects PowerShell downloading payloads via IEX, Invoke-WebRequest, Net.WebClient, or similar download cradle patterns.
PowerShell Encoded Commands
Detects PowerShell execution with Base64-encoded commands (-enc, -encodedcommand) commonly used to evade AV/EDR detection.
Process Injection Indicators
Detects process injection techniques and tools via command-line indicators (OpenProcess, WriteProcessMemory, CreateRemoteThread).
PsExec / Remote Service Execution
Detects PsExec and similar remote service execution tools used for lateral movement across Windows environments.
RDP Lateral Movement Burst
Detects multiple RDP sessions (logon type 10) from the same user to different hosts in a short window — lateral movement indicator.
Script Execution from Temp/Downloads
Detects scripts executed from temporary or downloads directories — a common staging area for malicious payloads.
Security Tool Tampering
Detects attempts to disable Windows Defender, the firewall, or security services — often a pre-ransomware or persistence step.
Suspicious DLL Loading from Temp Dirs
Detects DLLs loaded from temporary or downloads directories — indicative of DLL side-loading or dropped payload execution.
Suspicious LOLBin Execution
Detects LOLBin executions with suspicious arguments (download, encode, decode, execute) used for defense evasion.
Timestomping Detection
Detects file timestamp manipulation (timestomping) used as an anti-forensics technique to conceal malicious activity.
WMI Remote Execution
Detects remote execution via WMI (wmic process call create, Invoke-WmiMethod) — a fileless lateral movement technique.