Skip to content
Merged
Show file tree
Hide file tree
Changes from 6 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
5 changes: 3 additions & 2 deletions detections/endpoint/disable_defender_antivirus_registry.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Disable Defender AntiVirus Registry
id: aa4f695a-3024-11ec-9987-acde48001122
version: 13
date: '2025-05-02'
version: 14
date: '2026-02-09'
author: Teoderick Contreras, Splunk, Steven Dick
status: production
type: TTP
Expand Down Expand Up @@ -58,6 +58,7 @@ rba:
threat_objects: []
tags:
analytic_story:
- SolarWinds Active Exploitation
- Windows Registry Abuse
- CISA AA24-241A
- IcedID
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Disable Defender BlockAtFirstSeen Feature
id: 2dd719ac-3021-11ec-97b4-acde48001122
version: 11
date: '2025-05-02'
version: 12
date: '2026-02-09'
author: Teoderick Contreras, Splunk, Steven Dick
status: production
type: TTP
Expand Down Expand Up @@ -56,6 +56,7 @@ rba:
threat_objects: []
tags:
analytic_story:
- SolarWinds Active Exploitation
- Azorult
- CISA AA23-347A
- IcedID
Expand Down
5 changes: 3 additions & 2 deletions detections/endpoint/disable_windows_behavior_monitoring.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Disable Windows Behavior Monitoring
id: 79439cae-9200-11eb-a4d3-acde48001122
version: 18
date: '2026-01-20'
version: 19
date: '2026-02-09'
author: Teoderick Contreras, Splunk, Steven Dick
status: production
type: TTP
Expand Down Expand Up @@ -59,6 +59,7 @@ rba:
threat_objects: []
tags:
analytic_story:
- SolarWinds Active Exploitation
- Windows Defense Evasion Tactics
- CISA AA23-347A
- Revil Ransomware
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Malicious PowerShell Process - Encoded Command
id: c4db14d9-7909-48b4-a054-aa14d89dbb19
version: 18
date: '2025-10-24'
version: 19
date: '2026-02-09'
author: David Dorsey, Michael Haag, Splunk, SirDuckly, GitHub Community
status: production
type: Hunting
Expand Down Expand Up @@ -48,6 +48,7 @@ references:
- https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/
tags:
analytic_story:
- SolarWinds Active Exploitation
- CISA AA22-320A
- Hermetic Wiper
- Sandworm Tools
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Scheduled Task Deleted Or Created via CMD
id: d5af132c-7c17-439c-9d31-13d55340f36c
version: 23
date: '2025-12-10'
version: 24
date: '2026-02-09'
author: Bhavin Patel, Splunk
status: production
type: TTP
Expand Down Expand Up @@ -74,6 +74,7 @@ rba:
threat_objects: []
tags:
analytic_story:
- SolarWinds Active Exploitation
- ShrinkLocker
- AgentTesla
- CISA AA24-241A
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Set Default PowerShell Execution Policy To Unrestricted or Bypass
id: c2590137-0b08-4985-9ec5-6ae23d92f63d
version: 18
date: '2026-01-30'
version: 19
date: '2026-02-09'
author: Steven Dick, Patrick Bareiss, Splunk
status: production
type: TTP
Expand Down Expand Up @@ -62,6 +62,7 @@ rba:
type: registry_path
tags:
analytic_story:
- SolarWinds Active Exploitation
- HAFNIUM Group
- Hermetic Wiper
- Credential Dumping
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Suspicious Scheduled Task from Public Directory
id: 7feb7972-7ac3-11eb-bac8-acde48001122
version: 17
date: '2025-11-20'
version: 18
date: '2026-02-09'
author: Michael Haag, Splunk
status: production
type: Anomaly
Expand Down Expand Up @@ -70,6 +70,7 @@ rba:
threat_objects: []
tags:
analytic_story:
- SolarWinds Active Exploitation
- XWorm
- Medusa Ransomware
- CISA AA23-347A
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: System Information Discovery Detection
id: 8e99f89e-ae58-4ebc-bf52-ae0b1a277e72
version: 12
date: '2025-11-20'
version: 13
date: '2026-02-09'
author: Patrick Bareiss, Splunk
status: production
type: TTP
Expand Down Expand Up @@ -76,6 +76,7 @@ rba:
threat_objects: []
tags:
analytic_story:
- SolarWinds Active Exploitation
- Windows Discovery Techniques
- Gozi Malware
- Medusa Ransomware
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Windows Cmdline Tool Execution From Non-Shell Process
id: 2afa393f-b88d-41b7-9793-623c93a2dfde
version: 8
date: '2025-12-04'
version: 9
date: '2026-02-09'
author: Teoderick Contreras, Splunk
status: production
type: Anomaly
Expand Down Expand Up @@ -92,6 +92,7 @@ tags:
- FIN7
- Water Gamayun
- Tuoni
- SolarWinds Active Exploitation
asset_type: Endpoint
mitre_attack_id:
- T1059.007
Expand Down
5 changes: 3 additions & 2 deletions detections/endpoint/windows_disableantispyware_registry.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Windows DisableAntiSpyware Registry
id: 23150a40-9301-4195-b802-5bb4f43067fb
version: 8
date: '2025-05-02'
version: 9
date: '2026-02-09'
author: Rod Soto, Jose Hernandez, Michael Haag, Splunk
status: production
type: TTP
Expand Down Expand Up @@ -55,6 +55,7 @@ rba:
threat_objects: []
tags:
analytic_story:
- SolarWinds Active Exploitation
- Azorult
- Ryuk Ransomware
- Windows Registry Abuse
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Windows DLL Module Loaded in Temp Dir
id: c2998141-235a-4e31-83cf-46afb5208a87
version: 3
date: '2026-01-14'
version: 4
date: '2026-02-09'
author: Teoderick Contreras, Splunk
status: production
type: Hunting
Expand Down Expand Up @@ -37,6 +37,7 @@ references:
- https://blog.sekoia.io/interlock-ransomware-evolving-under-the-radar/
tags:
analytic_story:
- SolarWinds Active Exploitation
- Interlock Rat
- Lokibot
asset_type: Endpoint
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Windows File Download Via PowerShell
id: 58c4e56c-b5b8-46a3-b5fb-6537dca3c6de
version: 6
date: '2025-12-16'
version: 7
date: '2026-02-09'
author: Michael Haag, Nasreddine Bencherchali, Splunk
status: production
type: Anomaly
Expand Down Expand Up @@ -109,6 +109,7 @@ tags:
- XWorm
- Tuoni
- StealC Stealer
- SolarWinds Active Exploitation
asset_type: Endpoint
mitre_attack_id:
- T1059.001
Expand Down
5 changes: 3 additions & 2 deletions detections/endpoint/windows_group_discovery_via_net.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Windows Group Discovery Via Net
id: c5c8e0f3-147a-43da-bf04-4cfaec27dc44
version: 5
date: '2025-10-24'
version: 6
date: '2026-02-09'
author: Michael Haag, Mauricio Velazco, Splunk
status: production
type: Hunting
Expand Down Expand Up @@ -45,6 +45,7 @@ references:
- https://thedfirreport.com/2023/05/22/icedid-macro-ends-in-nokoyawa-ransomware/
tags:
analytic_story:
- SolarWinds Active Exploitation
- Windows Discovery Techniques
- Windows Post-Exploitation
- Graceful Wipe Out Attack
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Windows Hijack Execution Flow Version Dll Side Load
id: 8351340b-ac0e-41ec-8b07-dd01bf32d6ea
version: 10
date: '2026-01-14'
version: 11
date: '2026-02-09'
author: Teoderick Contreras, Splunk
status: production
type: Anomaly
Expand Down Expand Up @@ -51,6 +51,7 @@ rba:
threat_objects: []
tags:
analytic_story:
- SolarWinds Active Exploitation
- Brute Ratel C4
- XWorm
- Malicious Inno Setup Loader
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Windows HTTP Network Communication From MSIExec
id: b0fd38c7-f71a-43a2-870e-f3ca06bcdd99
version: 7
date: '2025-09-16'
version: 8
date: '2026-02-09'
author: Michael Haag, Splunk
status: production
type: Anomaly
Expand Down Expand Up @@ -86,6 +86,7 @@ tags:
- Windows System Binary Proxy Execution MSIExec
- Water Gamayun
- Cisco Network Visibility Module Analytics
- SolarWinds Active Exploitation
asset_type: Endpoint
mitre_attack_id:
- T1218.007
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Windows Known Abused DLL Loaded Suspiciously
id: dd6d1f16-adc0-4e87-9c34-06189516b803
version: 8
date: '2025-05-02'
version: 9
date: '2026-02-09'
author: Steven Dick
status: production
type: TTP
Expand Down Expand Up @@ -60,6 +60,7 @@ rba:
threat_objects: []
tags:
analytic_story:
- SolarWinds Active Exploitation
- Windows Defense Evasion Tactics
- Living Off The Land
asset_type: Endpoint
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Windows Modify Registry Disable WinDefender Notifications
id: 8e207707-ad40-4eb3-b865-3a52aec91f26
version: 8
date: '2025-05-02'
version: 9
date: '2026-02-09'
author: Teoderick Contreras, Splunk
status: production
type: TTP
Expand Down Expand Up @@ -62,6 +62,7 @@ tags:
analytic_story:
- CISA AA23-347A
- RedLine Stealer
- SolarWinds Active Exploitation
asset_type: Endpoint
atomic_guid:
- 12e03af7-79f9-4f95-af48-d3f12f28a260
Expand Down
5 changes: 3 additions & 2 deletions detections/endpoint/windows_msiexec_remote_download.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Windows MSIExec Remote Download
id: 6aa49ff2-3c92-4586-83e0-d83eb693dfda
version: 12
date: '2025-12-16'
version: 13
date: '2026-02-09'
author: Michael Haag, Splunk
status: production
type: TTP
Expand Down Expand Up @@ -84,6 +84,7 @@ tags:
- Water Gamayun
- Cisco Network Visibility Module Analytics
- StealC Stealer
- SolarWinds Active Exploitation
asset_type: Endpoint
mitre_attack_id:
- T1218.007
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Windows Process Execution From ProgramData
id: 237016fa-d8e6-47b4-80f9-70c4d42c72c0
version: 6
date: '2026-01-13'
version: 7
date: '2026-02-09'
author: Teoderick Contreras, Splunk
status: production
type: Hunting
Expand Down Expand Up @@ -50,6 +50,7 @@ references:
- https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/
tags:
analytic_story:
- SolarWinds Active Exploitation
- StealC Stealer
- SnappyBee
- XWorm
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Windows Scheduled Task with Highest Privileges
id: 2f15e1a4-0fc2-49dd-919e-cbbe60699218
version: 12
date: '2025-11-20'
version: 13
date: '2026-02-09'
author: Teoderick Contreras, Splunk
status: production
type: TTP
Expand Down Expand Up @@ -67,6 +67,7 @@ rba:
threat_objects: []
tags:
analytic_story:
- SolarWinds Active Exploitation
- XWorm
- CISA AA23-347A
- Scheduled Tasks
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Windows Scheduled Task with Suspicious Command
id: 1f44c126-c26a-4dd3-83bb-0f9a0f03ecc3
version: 5
date: '2025-09-18'
version: 6
date: '2026-02-09'
author: Steven Dick
status: production
type: TTP
Expand Down Expand Up @@ -73,6 +73,7 @@ rba:
type: signature
tags:
analytic_story:
- SolarWinds Active Exploitation
- Scheduled Tasks
- Ransomware
- Quasar RAT
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Windows Schtasks Create Run As System
id: 41a0e58e-884c-11ec-9976-acde48001122
version: 10
date: '2025-12-18'
version: 11
date: '2026-02-09'
author: Michael Haag, Splunk
status: production
type: TTP
Expand Down Expand Up @@ -75,6 +75,7 @@ rba:
type: process_name
tags:
analytic_story:
- SolarWinds Active Exploitation
- Medusa Ransomware
- Windows Persistence Techniques
- Qakbot
Expand Down
Loading