Skip to content

Prep main for 9.1 #4555

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 11 commits into from
Mar 26, 2025
Merged

Prep main for 9.1 #4555

merged 11 commits into from
Mar 26, 2025

Conversation

shashank-elastic
Copy link
Contributor

Pull Request

Issue link(s): As part of Release https://github.com/elastic/ia-trade-team/issues/565

Summary - What I changed

  • Followed Steps in prepare-for-next-elastic-stack-minor-release
    • Back port Version Trimming and removed 8.13
    • Added new version 9.0
    • Ran python -m detection_rules dev trim-version-lock 8.14 (new_min_supported_version) to adjust version lock
Rule Changes
Loaded config file: /Users/shashankks/elastic_workspace/detection-rules/.detection-rules-cfg.json

█▀▀▄ ▄▄▄ ▄▄▄ ▄▄▄ ▄▄▄ ▄▄▄ ▄▄▄ ▄▄▄ ▄   ▄      █▀▀▄ ▄  ▄ ▄   ▄▄▄ ▄▄▄
█  █ █▄▄  █  █▄▄ █    █   █  █ █ █▀▄ █      █▄▄▀ █  █ █   █▄▄ █▄▄
█▄▄▀ █▄▄  █  █▄▄ █▄▄  █  ▄█▄ █▄█ █ ▀▄█      █ ▀▄ █▄▄█ █▄▄ █▄▄ ▄▄█

Loading rules ...
Changes  applied:
000047bb-b27a-47ec-8b62-ef1a5d2c9e19: 8.13 updated to: 8.14
00140285-b827-4aee-aa09-8113f58a08f3: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
0022d47d-39c7-4f69-a232-4fe9dc7a3acd: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
027ff9ea-85e7-42e3-99d2-bbb7069e02eb: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
02a4576a-7480-4284-9327-548a806b5e48: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
035889c4-2686-4583-a7df-67f89c292f2c: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
043d80a3-c49e-43ef-9c72-1088f0c7b278: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
053a0387-f3b5-4ba5-8245-8002cca2bd08: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
0564fb9d-90b9-4234-a411-82a546dc1343: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
05b358de-aa6d-4f6c-89e6-78f74018b43b: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
0635c542-1b96-4335-9b47-126582d2c19a: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
06568a02-af29-4f20-929c-f3af281e41aa: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
06a7a03c-c735-47a6-a313-51c354aef6c3: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
06dceabf-adca-48af-ac79-ffdf4c3b1e9a: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
074464f9-f30d-4029-8c03-0ed237fffec7: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
07b1ef73-1fde-4a49-a34a-5dd40011b076: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
0859355c-0f08-4b43-8ff5-7d2a4789fc08: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
0abf0c5b-62dd-48d2-ac4e-6b43fe3a6e83: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
0b29cab4-dbbd-4a3f-9e8e-1287c7c11ae5: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
0b2f3da5-b5ec-47d1-908b-6ebb74814289: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
0b96dfd8-5b8c-4485-9a1c-69ff7839786a: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
0c7ca5c2-728d-4ad9-b1c5-bbba83ecb1f4: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
0e79980b-4250-4a50-a509-69294c14e84b: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
0ef5d3eb-67ef-43ab-93b7-305cfa5a21f6: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped
0f93cb9a-1931-48c2-8cd0-f173fd3e5283: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
1160dcdb-0a0a-4a79-91d8-9b84616edebd: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
1178ae09-5aff-460a-9f2f-455cd0ac4d8e: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
11dd9713-0ec6-4110-9707-32daae1ee68c: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
1224da6c-0326-4b4f-8454-68cdc5ae542b: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
128468bf-cab1-4637-99ea-fdf3780a4609: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
12de29d4-bbb0-4eef-b687-857e8a163870: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
12f07955-1674-44f7-86b5-c35da0a6f41a: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
1327384f-00f3-44d5-9a8c-2373ba071e92: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
1397e1b9-0c90-4d24-8d7b-80598eb9bc9a: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
14ed1aa9-ebfd-4cf9-a463-0ac59ec55204: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
1502a836-84b2-11ef-b026-f661ea17fbcc: 8.13 updated to: 8.14
15a8ba77-1c13-4274-88fe-6bd14133861e: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
15c0b7a7-9c34-4869-b25b-fa6518414899: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
166727ab-6768-4e26-b80c-948b228ffc06: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
16fac1a1-21ee-4ca6-b720-458e3855d046: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
1781d055-5c66-4adf-9c59-fc0fa58336a5: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
1781d055-5c66-4adf-9c71-fc0fa58338c7: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
1781d055-5c66-4adf-9d60-fc0fa58337b6: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
1781d055-5c66-4adf-9d82-fc0fa58449c8: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
1781d055-5c66-4adf-9e93-fc0fa69550c9: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
17c7f6a5-5bc9-4e1f-92bf-13632d24384d: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
181f6b23-3799-445e-9589-0018328a9e46: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
1a6075b0-7479-450e-8fe7-b8b8438ac570: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
1aa9181a-492b-4c01-8b16-fa0735786b2b: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
1cd01db9-be24-4bef-8e7c-e923f0ff78ab: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
1ceb05c4-7d25-11ee-9562-f661ea17fbcd: 8.13 updated to: 8.14
1d276579-3380-4095-ad38-e596a01bc64f: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
1d9aeb0b-9549-46f6-a32d-05e2a001b7fd: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
1dcc51f6-ba26-49e7-9ef4-2655abb2361e: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
1defdd62-cd8d-426e-a246-81a37751bb2b: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
1e0a3f7c-21e7-4bb1-98c7-2036612fb1be: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
1e1b2e7e-b8f5-45e5-addc-66cc1224ffbc: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
1e6363a6-3af5-41d4-b7ea-d475389c0ceb: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
1f0a69c0-3392-4adf-b7d5-6012fd292da8: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
1f460f12-a3cf-4105-9ebb-f788cc63f365: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
1fe3b299-fbb5-4657-a937-1d746f2c711a: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
201200f1-a99b-43fb-88ed-f65a45c4972c: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
203ab79b-239b-4aa5-8e54-fc50623ee8e4: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
205b52c4-9c28-4af4-8979-935f3278d61a: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
208dbe77-01ed-4954-8d44-1e5751cb20de: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
220be143-5c67-4fdb-b6ce-dd6826d024fd: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
23f18264-2d6d-11ef-9413-f661ea17fbce: 8.13 updated to: 8.14
25224a80-5a4a-4b8a-991e-6ab390465c4f: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
2553a9af-52a4-4a05-bb03-85b2a479a0a0: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
260486ee-7d98-11ee-9599-f661ea17fbcd: 8.13 updated to: 8.14
263481c8-1e9b-492e-912d-d1760707f810: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
265db8f5-fc73-4d0d-b434-6483b56372e2: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
27071ea3-e806-4697-8abc-e22c92aa4293: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
2772264c-6fb9-4d9d-9014-b416eed21254: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
2820c9c2-bcd7-4d6e-9eba-faf3891ba450: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
2856446a-34e6-435b-9fb5-f8f040bfa7ed: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
28eb3afe-131d-48b0-a8fc-9784f3d54f3c: 8.13 updated to: 8.14
290aca65-e94d-403b-ba0f-62f320e63f51: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
2917d495-59bd-4250-b395-c29409b76086: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
291a0de9-937a-4189-94c0-3e847c8b13e4: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
29b53942-7cd4-11ee-b70e-f661ea17fbcd: 8.13 updated to: 8.14
2bf78aa2-9c56-48de-b139-f169bf99cf86: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
2c17e5d7-08b9-43b2-b58a-0270d65ac85b: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
2c3c29a4-f170-42f8-a3d8-2ceebc18eb6a: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
2c6a6acf-0dcb-404d-89fb-6b0327294cfa: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
2d62889e-e758-4c5e-b57e-c735914ee32a: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
2dd480be-1263-4d9c-8672-172928f6789a: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
2de87d72-ee0c-43e2-b975-5f0b029ac600: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
2e0051cb-51f8-492f-9d90-174e16b5e96b: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped
2e1e835d-01e5-48ca-b9fc-7a61f7f11902: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
2e29e96a-b67c-455a-afe4-de6183431d0d: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
2e311539-cd88-4a85-a301-04f38795007c: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
2e56e1bc-867a-11ee-b13e-f661ea17fbcd: 8.13 updated to: 8.14
2edc8076-291e-41e9-81e4-e3fcbc97ae5e: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
2f2f4939-0b34-40c2-a0a3-844eb7889f43: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
2ffa1f1e-b6db-47fa-994b-1512743847eb: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
31b4c719-f2b4-41f6-a9bd-fce93c2eaf62: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
32c5cf9c-2ef8-4e87-819e-5ccb7cd18b14: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
32f4675e-6c49-4ace-80f9-97c9259dca2e: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
3535c8bb-3bd5-40f4-ae32-b7cd589d5372: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
35df0dd8-092d-4a83-88c1-5151a804f31b: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
36a8e048-d888-4f61-a8b9-0f9e2e40f317: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
3805c3dc-f82c-4f8d-891e-63c24d3102b0: 8.13 updated to: 8.14
3838e0e3-1850-4850-a411-2e8c5ba40ba8: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
397945f3-d39a-4e6f-8bcb-9656c2031438: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
3a59fc81-99d3-47ea-8cd6-d48d561fca20: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
3aaf37f3-05a1-40a5-bb6e-e380c4f92c52: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped
3b47900d-e793-49e8-968f-c90dc3526aa1: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
3bc6deaa-fbd4-433a-ae21-3e892f95624f: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
3d00feab-e203-4acc-a463-c3e15b7e9a73: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
3d3aa8f9-12af-441f-9344-9f31053e316d: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
3e0eeb75-16e8-4f2f-9826-62461ca128b7: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
3ecbdc9e-e4f2-43fa-8cca-63802125e582: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
3ed032b2-45d8-4406-bc79-7ad1eabb2c72: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
3f7bd5ac-9711-44b4-82c1-fa246d829f15: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped
40155ee4-1e6a-4e4d-a63b-e8ba16980cfb: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
403ef0d3-8259-40c9-a5b6-d48354712e49: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
416697ae-e468-4093-a93d-59661fa619ec: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
42bf698b-4738-445b-8231-c834ddefd8a0: 8.13 updated to: 8.14
42eeee3d-947f-46d3-a14d-7036b962c266: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
440e2db4-bc7f-4c96-a068-65b78da59bde: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
445a342e-03fb-42d0-8656-0367eb2dead5: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
44fc462c-1159-4fa8-b1b7-9b6296ab4f96: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
45ac4800-840f-414c-b221-53dd36a5aaf7: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
45d273fb-1dca-457d-9855-bcb302180c21: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
4630d948-40d4-4cef-ac69-4002e29bc3db: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
4682fd2c-cfae-47ed-a543-9bed37657aa6: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
47e22836-4a16-4b35-beee-98f6c4ee9bf2: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
483c4daf-b0c6-49e0-adf3-0bfa93231d6b: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
48b6edfc-079d-4907-b43c-baffa243270d: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
4982ac3e-d0ee-4818-b95d-d9522d689259: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
4b438734-3793-4fda-bd42-ceeada0be8f9: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
4bd1c1af-79d4-4d37-9efa-6e0240640242: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
4c59cff1-b78a-41b8-a9f1-4231984d1fb6: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
4de76544-f0e5-486a-8f84-eae0b6063cdc: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
4e85dc8a-3e41-40d8-bc28-91af7ac6cf60: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
4ed493fc-d637-4a36-80ff-ac84937e5461: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
4ed678a9-3a4f-41fb-9fea-f85a6e0a0dff: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
4edd3e1a-3aa0-499b-8147-4d2ea43b1613: 8.13 updated to: 8.14
4fe9d835-40e1-452d-8230-17c147cafad8: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
50887ba8-7ff7-11ee-a038-f661ea17fbcd: 8.13 updated to: 8.14
51176ed2-2d90-49f2-9f3d-17196428b169: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
513f0ffd-b317-4b9c-9494-92ce861f22c7: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
5188c68e-d3de-4e96-994d-9e242269446f: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
51ce96fb-9e52-4dad-b0ba-99b54440fc9a: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
52aaab7b-b51c-441a-89ce-4387b3aea886: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
53a26770-9cbd-40c5-8b57-61d01a325e14: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
53dedd83-1be7-430f-8026-363256395c8b: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
54902e45-3467-49a4-8abc-529f2c8cfb80: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
54a81f68-5f2a-421e-8eed-f888278bb712: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
54c3d186-0461-4dc3-9b33-2dc5c7473936: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
55c2bf58-2a39-4c58-a384-c8b1978153c2: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
55d551c6-333b-4665-ab7e-5d14a59715ce: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
56004189-4e69-4a39-b4a9-195329d226e9: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
5610b192-7f18-11ee-825b-f661ea17fbcd: 8.13 updated to: 8.14
56557cde-d923-4b88-adee-c61b3f3b5dc3: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
56f2e9b5-4803-4e44-a0a4-a52dc79d57fe: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
577ec21e-56fe-4065-91d8-45eb8224fe77: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
57bccf1d-daf5-4e1a-9049-ff79b5254704: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
57bfa0a9-37c0-44d6-b724-54bf16787492: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
581add16-df76-42bb-af8e-c979bfb39a59: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
58aa72ca-d968-4f34-b9f7-bea51d75eb50: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
5a14d01d-7ac8-4545-914c-b687c2cf66b3: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
5aee924b-6ceb-4633-980e-1bde8cdb40c5: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
5bb4a95d-5a08-48eb-80db-4c3a63ec78a8: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
5c602cba-ae00-4488-845d-24de2b6d8055: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
5c6f4c58-b381-452a-8976-f1b1c6aa0def: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
5cd55388-a19c-47c7-8ec4-f41656c2fded: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
5cd8e1f7-0050-4afc-b2df-904e40b2f5ae: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
5cf6397e-eb91-4f31-8951-9f0eaa755a31: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
5d1d6907-0747-4d5d-9b24-e4a18853dc0a: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
5d676480-9655-4507-adc6-4eec311efff8: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
5f2f463e-6997-478c-8405-fb41cc283281: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
610949a1-312f-4e04-bb55-3a79b8c95267: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
61766ef9-48a5-4247-ad74-3349de7eb2ad: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
61ac3638-40a3-44b2-855a-985636ca985e: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
61d29caf-6c15-4d1e-9ccb-7ad12ccc0bc7: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
621e92b6-7e54-11ee-bdc0-f661ea17fbcd: 8.13 updated to: 8.14
622ecb68-fa81-4601-90b5-f8cd661e4520: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
62a70f6f-3c37-43df-a556-f64fa475fba2: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
63e65ec3-43b1-45b0-8f2d-45b34291dc44: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
65432f4a-e716-4cc1-ab11-931c4966da2d: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
6649e656-6f85-11ef-8876-f661ea17fbcc: 8.13 updated to: 8.14
665e7a4f-c58e-4fc6-bc83-87a7572670ac: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
670b3b5a-35e5-42db-bd36-6c5b9b4b7313: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
6731fbf2-8f28-49ed-9ab9-9a918ceb5a45: 8.13 updated to: 8.14
676cff2b-450b-4cf1-8ed2-c0c58a4a2dd7: 8.13 updated to: 8.14
6839c821-011d-43bd-bd5b-acff00257226: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
6885d2ae-e008-4762-b98a-e8e1cd3a81e9: 8.13 updated to: 8.14
68921d85-d0dc-48b3-865f-43291ca2c4f2: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
689b9d57-e4d5-4357-ad17-9c334609d79a: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
68ad737b-f90a-4fe5-bda6-a68fa460044e: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
68d56fdc-7ffa-4419-8e95-81641bd6f845: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
69c251fb-a5d6-4035-b5ec-40438bd829ff: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
6a8ab9cc-4023-4d17-b5df-1a3e16882ce7: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
6aace640-e631-4870-ba8e-5fdda09325db: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
6bed021a-0afb-461c-acbe-ffdb9574d3f3: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
6cd1779c-560f-4b68-a8f1-11009b27fe63: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
6d448b96-c922-4adb-b51c-b767f1ea5b76: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
6e1a2cc4-d260-11ed-8829-f661ea17fbcc: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
6e40d56f-5c0e-4ac6-aece-bee96645b172: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
6e9130a5-9be6-48e5-943a-9628bfc74b18: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
6ea41894-66c3-4df7-ad6b-2c5074eb3df8: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
6ea55c81-e2ba-42f2-a134-bccf857ba922: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
6f024bde-7085-489b-8250-5957efdf1caf: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
6f1bb4b2-7dc8-11ee-92b2-f661ea17fbcd: 8.13 updated to: 8.14
708c9d92-22a3-4fe0-b6b9-1f861c55502d: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
71bccb61-e19b-452f-b104-79a60e546a95: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
71c5cb27-eca5-4151-bb47-64bc3f883270: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
729aa18d-06a6-41c7-b175-b65b739b1181: 8.13 updated to: 8.14
730ed57d-ae0f-444f-af50-78708b57edd5: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
7405ddf1-6c8e-41ce-818f-48bea6bcaed8: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
764c9fcd-4c4c-41e6-a0c7-d6c46c2eff66: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
76ddb638-abf7-42d5-be22-4a70b0bf7241: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
76fd43b7-3480-4dd9-8ad7-8bd36bfad92f: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
770e0c4d-b998-41e5-a62e-c7901fd7f470: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
78de1aeb-5225-4067-b8cc-f4a1de8a8546: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
79f0a1f7-ed6b-471c-8eb1-23abd6470b1c: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
79f97b31-480e-4e63-a7f4-ede42bf2c6de: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
7b8bfc26-81d2-435e-965c-d722ee397ef1: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
7b981906-86b7-4544-8033-c30ec6eb45fc: 8.13 updated to: 8.14
7ba58110-ae13-439b-8192-357b0fcfa9d7: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
7e23dfef-da2c-4d64-b11d-5f285b638853: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
7e763fd1-228a-4d43-be88-3ffc14cd7de1: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped
7f370d54-c0eb-4270-ac5a-9a6020585dc6: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
8025db49-c57c-4fc0-bd86-7ccd6d10a35a: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
808291d3-e918-4a3a-86cd-73052a0c9bdc: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
818e23e6-2094-4f0e-8c01-22d30f3506c6: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
81fe9dc6-a2d7-4192-a2d8-eed98afc766a: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
81ff45f8-f8c2-4e28-992e-5a0e8d98e0fe: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
83bf249e-4348-47ba-9741-1202a09556ad: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
846fe13f-6772-4c83-bd39-9d16d4ad1a81: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
84da2554-e12a-11ec-b896-f661ea17fbcd: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
871ea072-1b71-4def-b016-6278b505138d: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
891cb88e-441a-4c3e-be2d-120d99fe7b0d: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
894326d2-56c0-4342-b553-4abfaf421b5b: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
89f9a4b0-9f8f-4ee0-8823-c4751a6d6696: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
8a0fbd26-867f-11ee-947c-f661ea17fbcd: 8.13 updated to: 8.14
8a1d4831-3ce6-4859-9891-28931fa6101d: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
8a5c1e5f-ad63-481e-b53a-ef959230f7f1: 8.13 updated to: 8.14
8b2b3a62-a598-4293-bc14-3d5fa22bb98f: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
8b4f0816-6a65-4630-86a6-c21c179c0d09: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
8c37dc0e-e3ac-4c97-8aa0-cf6a9122de45: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
8e2485b6-a74f-411b-bf7f-38b819f3a846: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
8eec4df1-4b4b-4502-b6c3-c788714604c9: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
8f242ffb-b191-4803-90ec-0f19942e17fd: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
8f919d4b-a5af-47ca-a594-6be59cd924a4: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
90babaa8-5216-4568-992d-d4a01a105d98: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
92984446-aefb-4d5e-ad12-598042ca80ba: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
92a6faf5-78ec-4e25-bea1-73bacc9b59d9: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
92d3a04e-6487-4b62-892d-70e640a590dc: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
93c1ce76-494c-4f01-8167-35edfb52f7b1: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
94a401ba-4fa2-455c-b7ae-b6e037afc0b7: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
94e734c0-2cda-11ef-84e1-f661ea17fbce: 8.13 updated to: 8.14
951779c2-82ad-4a6c-82b8-296c1f691449: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
954ee7c8-5437-49ae-b2d6-2960883898e9: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
959a7353-1129-4aa7-9084-30746b256a70: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
95b99adc-2cda-11ef-84e1-f661ea17fbce: 8.13 updated to: 8.14
96b9f4ea-0e8c-435b-8d53-2096e75fcac5: 8.13 updated to: 8.14
97020e61-e591-4191-8a3b-2861a2b887cd: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
97a8e584-fd3b-421f-9b9d-9c9d9e57e9d7: 8.13 updated to: 8.14
97aba1ef-6034-4bd3-8c1a-1e0996b27afa: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
98843d35-645e-4e66-9d6a-5049acd96ce1: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
994e40aa-8c85-43de-825e-15f665375ee8: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
9960432d-9b26-409f-972b-839a959e79e2: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
9a5b4e31-6cde-4295-9ff7-6be1b8567e1b: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
9aa0e1f6-52ce-42e1-abb3-09657cee2698: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
9b6813a1-daf1-457e-b0e6-0bb4e55b8a4c: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
9c260313-c811-4ec8-ab89-8f6530e0246c: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
9c865691-5599-447a-bac9-b3f2df5f9a9d: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
9ccf3ce0-0057-440a-91f5-870c6ad39093: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
9d110cb3-5f4b-4c9a-b9f5-53f0a1707ae2: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
9d110cb3-5f4b-4c9a-b9f5-53f0a1707ae3: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
9d110cb3-5f4b-4c9a-b9f5-53f0a1707ae4: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
9d110cb3-5f4b-4c9a-b9f5-53f0a1707ae5: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
9d110cb3-5f4b-4c9a-b9f5-53f0a1707ae6: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
9d110cb3-5f4b-4c9a-b9f5-53f0a1707ae9: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
9f962927-1a4f-45f3-a57b-287f2c7029c1: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
a02cb68e-7c93-48d1-93b2-2c39023308eb: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
a13167f1-eec2-4015-9631-1fee60406dcf: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
a16612dd-b30e-4d41-86a0-ebe70974ec00: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
a1699af0-8e1e-4ed0-8ec1-89783538a061: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
a22a09c2-2162-4df0-a356-9aacbeb56a04: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
a2d04374-187c-4fd9-b513-3ad4e7fdd67a: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
a3ea12f3-0d4e-4667-8b44-4230c63f3c75: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
a624863f-a70d-417f-a7d2-7a404638d47f: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
a7e7bfa3-088e-4f13-b29e-3986e0e756b8: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
a9b05c3b-b304-4bf9-970d-acdfaef2944c: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
aa9a274d-6b53-424d-ac5e-cb8ca4251650: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
abae61a8-c560-4dbd-acca-1e1438bff36b: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
ac5012b8-8da8-440b-aaaf-aedafdea2dff: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
ac5a2759-5c34-440a-b0c4-51fe674611d6: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
ac6bc744-e82b-41ad-b58d-90654fa4ebfb: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
ac96ceb8-4399-4191-af1d-4feeac1f1f46: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
acf738b5-b5b2-4acc-bad9-1e18ee234f40: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
ad0d2742-9a49-11ec-8d6b-acde48001122: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
ad84d445-b1ce-4377-82d9-7c633f28bf9a: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
ae8a142c-6a1d-4918-bea7-0b617e99ecfa: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
afcce5ad-65de-4ed2-8516-5e093d3ac99a: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
b0638186-4f12-48ac-83d2-47e686d08e82: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
b2318c71-5959-469a-a3ce-3a0768e63b9c: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
b29ee2be-bf99-446c-ab1a-2dc0183394b8: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
b41a13c6-ba45-4bab-a534-df53d0cfed6a: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
b43570de-a908-4f7f-8bdb-b2df6ffd8c80: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
b483365c-98a8-40c0-92d8-0458ca25058a: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
b4bb1440-0fcb-4ed1-87e5-b06d58efc5e9: 8.13 updated to: 8.14
b5877334-677f-4fb9-86d5-a9721274223b: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
b5ea4bfe-a1b2-421f-9d47-22a75a6f2921: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
b64b183e-1a76-422d-9179-7b389513e74d: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
b661f86d-1c23-4ce7-a59e-2edbdba28247: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
b66b7e2b-d50a-49b9-a6fc-3a383baedc6b: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
b719a170-3bdb-4141-b0e3-13e3cf627bfe: 8.13 updated to: 8.14
b8075894-0b62-46e5-977c-31275da34419: 8.13 updated to: 8.14
b8386923-b02c-4b94-986a-d223d9b01f88: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
b83a7e96-2eb3-4edf-8346-427b6858d3bd: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
b86afe07-0d98-4738-b15d-8d7465f95ff5: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
b8f8da2d-a9dc-48c0-90e4-955c0aa1259a: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
b90cdde7-7e0d-4359-8bf0-2c112ce2008a: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
b9554892-5e0e-424b-83a0-5aef95aa43bf: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
b9960fef-82c6-4816-befa-44745030e917: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
ba342eb2-583c-439f-b04d-1fdd7c1417cc: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
baa5d22c-5e1c-4f33-bfc9-efa73bb53022: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
bd2c86a0-8b61-4457-ab38-96943984e889: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
bd3d058d-5405-4cee-b890-337f09366ba2: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
bd7eefee-f671-494e-98df-f01daf9e5f17: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
bdcf646b-08d4-492c-870a-6c04e3700034: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
bdfaddc4-4438-48b4-bc43-9f5cf8151c46: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
bdfebe11-e169-42e3-b344-c5d2015533d3: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
be8afaed-4bcd-4e0a-b5f9-5562003dde81: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
bfeaf89b-a2a7-48a3-817f-e41829dc61ee: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
c0429aa8-9974-42da-bfb6-53a0a515a145: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
c124dc1b-cef2-4d01-8d74-ff6b0d5096b6: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
c25e9c87-95e1-4368-bfab-9fd34cf867ec: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
c2d90150-0133-451c-a783-533e736c12d7: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
c3b915e0-22f3-4bf7-991d-b643513c722f: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
c4210e1c-64f2-4f48-b67e-b5a8ffe3aa14: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
c4818812-d44f-47be-aaef-4cfb2f9cc799: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
c55badd3-3e61-4292-836f-56209dc8a601: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
c5677997-f75b-4cda-b830-a75920514096: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
c57f8579-e2a5-4804-847f-f2732edc5156: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
c5c9f591-d111-4cf8-baec-c26a39bc31ef: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
c5ce48a6-7f57-4ee8-9313-3d0024caee10: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
c5dc3223-13a2-44a2-946c-e9dc0aa0449c: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
c6453e73-90eb-4fe7-a98c-cde7bbfc504a: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
c749e367-a069-4a73-b1f2-43a3798153ad: 8.13 updated to: 8.14
c74fd275-ab2c-4d49-8890-e2943fa65c09: 8.13 updated to: 8.14
c7894234-7814-44c2-92a9-f7d851ea246a: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
c7ce36c0-32ff-4f9a-bfc2-dcb242bf99f9: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
c8b150f0-0164-475b-a75e-74b47800a9ff: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
c8cccb06-faf2-4cd5-886e-2c9636cfcb87: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
cc382a2e-7e52-11ee-9aac-f661ea17fbcd: 8.13 updated to: 8.14
cc92c835-da92-45c9-9f29-b4992ad621a0: 8.13 updated to: 8.14
cd16fb10-0261-46e8-9932-a0336278cdbe: 8.13 updated to: 8.14
cd89602e-9db0-48e3-9391-ae3bf241acd8: 8.13 updated to: 8.14
cdbebdc1-dc97-43c6-a538-f26a20c0a911: 8.13 updated to: 8.14
cde1bafa-9f01-4f43-a872-605b678968b0: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
ce64d965-6cb0-466d-b74f-8d2c76f47f05: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
cff92c41-2225-4763-b4ce-6f71e5bda5e6: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
d0e159cf-73e9-40d1-a9ed-077e3158a855: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
d117cbb4-7d56-41b4-b999-bdf8c25648a0: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
d31f183a-e5b1-451b-8534-ba62bca0b404: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
d331bbe2-6db4-4941-80a5-8270db72eb61: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
d33ea3bf-9a11-463e-bd46-f648f2a0f4b1: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
d3551433-782f-4e22-bbea-c816af2d41c6: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
d48e1c13-4aca-4d1f-a7b1-a9161c0ad86f: 8.13 updated to: 8.14
d563aaba-2e72-462b-8658-3e5ea22db3a6: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
d5d86bf5-cf0c-4c06-b688-53fdc072fdfd: 8.13 updated to: 8.14
d61cbcf8-1bc1-4cff-85ba-e7b21c5beedc: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
d68e95ad-1c82-4074-a12a-125fe10ac8ba: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
d703a5af-d5b0-43bd-8ddb-7a5d500b7da5: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
d72e33fc-6e91-42ff-ac8b-e573268c5a87: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
d93e61db-82d6-4095-99aa-714988118064: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
d99a037b-c8e2-47a5-97b9-170d076827c4: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
d9ffc3d6-9de9-4b29-9395-5757d0695ecf: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
da7733b1-fe08-487e-b536-0a04c6d8b0cd: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
da87eee1-129c-4661-a7aa-57d0b9645fad: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
daafdf96-e7b1-4f14-b494-27e0d24b11f6: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
db65f5ba-d1ef-4944-b9e8-7e51060c2b42: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
db7dbad5-08d2-4d25-b9b1-d3a1e4a15efd: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
dc9c1f74-dac3-48e3-b47f-eb79db358f57: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
dca6b4b0-ae70-44eb-bb7a-ce6db502ee78: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
dd34b062-b9e3-4a6b-8c0c-6c8ca6dd450e: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
ddab1f5f-7089-44f5-9fda-de5b11322e77: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
de9bd7e0-49e9-4e92-a64d-53ade2e66af1: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
df197323-72a8-46a9-a08e-3f5b04a4a97a: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
dffbd37c-d4c5-46f8-9181-5afdd9172b4c: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
e052c845-48d0-4f46-8a13-7d0aba05df82: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
e0881d20-54ac-457f-8733-fe0bc5d44c55: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
e08ccd49-0380-4b2b-8d71-8000377d6e49: 8.13 updated to: 8.14
e26f042e-c590-4e82-8e05-41e81bd822ad: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
e2e0537d-7d8f-4910-a11d-559bcf61295a: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
e2f9fdf5-8076-45ad-9427-41e0e03dc9c2: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
e3343ab9-4245-4715-b344-e11c56b0a47f: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
e3cf38fa-d5b8-46cc-87f9-4a7513e4281d: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
e468f3f6-7c4c-45bb-846a-053738b3fe5d: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
e48236ca-b67a-4b4e-840c-fdc7782bc0c3: 8.13 updated to: 8.14
e4e31051-ee01-4307-a6ee-b21b186958f4: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
e514d8cd-ed15-4011-84e2-d15147e059f1: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
e6e3ecff-03dd-48ec-acbd-54a04de10c68: 8.13 updated to: 8.14
e7125cea-9fe1-42a5-9a05-b0792cf86f5a: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
e72f87d0-a70e-4f8d-8443-a6407bc34643: 8.13 updated to: 8.14
e760c72b-bb1f-44f0-9f0d-37d51744ee75: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
e8571d5f-bea1-46c2-9f56-998de2d3ed95: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
e86da94d-e54b-4fb5-b96c-cecff87e8787: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
e88d1fe9-b2f4-48d4-bace-a026dc745d4b: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
e90ee3af-45fc-432e-a850-4a58cf14a457: 8.13 updated to: 8.14
e94262f2-c1e9-4d3f-a907-aeab16712e1a: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
ea09ff26-3902-4c53-bb8e-24b7a5d029dd: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
eb44611f-62a8-4036-a5ef-587098be6c43: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
eb610e70-f9e6-4949-82b9-f1c5bcd37c39: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
ebb200e8-adf0-43f8-a0bb-4ee5b5d852c6: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
ebf1adea-ccf2-4943-8b96-7ab11ca173a5: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
ebfe1448-7fac-4d59-acea-181bd89b1f7f: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
eda499b8-a073-4e35-9733-22ec71f57f3a: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
edb91186-1c7e-4db8-b53e-bfa33a1a0a8a: 8.13 updated to: 8.14
edf8ee23-5ea7-4123-ba19-56b41e424ae3: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
ee39a9f7-5a79-4b0a-9815-d36b3cf28d3e: 8.13 updated to: 8.14
ee5300a7-7e31-4a72-a258-250abb8b3aa1: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
ef862985-3f13-4262-a686-5f357bbb9bc2: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
f036953a-4615-4707-a1ca-dc53bf69dcd5: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
f06414a6-f2a4-466d-8eba-10f85e8abf71: 8.13 updated to: 8.14
f243fe39-83a4-46f3-a3b6-707557a102df: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
f2c7b914-eda3-40c2-96ac-d23ef91776ca: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
f2f46686-6f3c-4724-bd7d-24e31c70f98f: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
f3475224-b179-4f78-8877-c2bd64c26b88: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
f401a0e3-5eeb-4591-969a-f435488e7d12: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped
f44fa4b6-524c-4e87-8d9e-a32599e4fb7c: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
f494c678-3c33-43aa-b169-bb3d5198c41d: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
f545ff26-3c94-4fd0-bd33-3c7f95a3a0fc: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
f580bf0a-2d23-43bb-b8e1-17548bb947ec: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
f5861570-e39a-4b8a-9259-abd39f84cb97: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
f59668de-caa0-4b84-94c1-3a1549e1e798: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
f5d9d36d-7c30-4cdb-a856-9f653c13d4e0: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
f63c8e3c-d396-404f-b2ea-0379d3942d73: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
f675872f-6d85-40a3-b502-c0d2ef101e92: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
f7c4dc5a-a58d-491d-9f14-9b66507121c0: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
f81ee52c-297e-46d9-9205-07e66931df26: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
f874315d-5188-4b4a-8521-d1c73093a7e4: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
f8822053-a5d2-46db-8c96-d460b12c36ac: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
f909075d-afc7-42d7-b399-600b94352fd9: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
f97504ac-1053-498f-aeaa-c6d01e76b379: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
f9790abf-bd0c-45f9-8b5f-d0b74015e029: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
f994964f-6fce-4d75-8e79-e16ccc412588: 8.13 updated to: 8.14
fa01341d-6662-426b-9d0c-6d81e33c8a9d: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
fa488440-04cc-41d7-9279-539387bf2a17: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
fb02b8d3-71ee-4af1-bacd-215d23f17efa: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
fc7c0fa4-8f03-4b3e-8336-c5feab0be022: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
fd4a992d-6130-4802-9ff8-829b89ae801f: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
fd70c98a-c410-42dc-a2e3-761c71848acf: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
fd7a6052-58fa-4397-93c3-4795249ccfa2: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
fddff193-48a3-484d-8d35-90bb3d323a56: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
fe25d5bc-01fa-494a-95ff-535c29cc4c96: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
fe794edd-487f-4a90-b285-3ee54f2af2d3: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
feeed87c-5e95-4339-aef1-47fd79bcfbe3: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
ff6cf8b9-b76c-4cc1-ac1b-4935164d1029: locked min_stack_version <= 8.14.0 - removing!, rule min_stack_version dropped, 8.13.0 dropped
ff9bc8b9-f03b-4283-be58-ee0a16f5a11b: 8.13 updated to: 8.14
  • Updated Next Version in packages.yml which is 9.1.0
  • Add next minor migrate function in /schemas/init.py
  • Add next entry in stack-schema-map.yaml
  • Updated latest ECS and Beats schema - As part of Prep for Release 9.0 #4550
  • Update and freeze API schemas
  • Update integration manifests and schemas - As part of Prep for Release 9.0 #4550
  • Refresh and update MITRE ATT&CK mappings ( No New changes )

How To Test

  • Unit test to pass

Checklist

  • Added a label for the type of pr: bug, enhancement, schema, maintenance, Rule: New, Rule: Deprecation, Rule: Tuning, Hunt: New, or Hunt: Tuning so guidelines can be generated
  • Added the meta:rapid-merge label if planning to merge within 24 hours
  • Secret and sensitive material has been managed correctly
  • Automated testing was updated or added to match the most common scenarios
  • Documentation and comments were added for features that require explanation

Contributor checklist

@shashank-elastic shashank-elastic self-assigned this Mar 20, 2025
@botelastic botelastic bot added Domain: Endpoint ML machine learning related rule OS: Windows windows related rules python Internal python for the repository schema labels Mar 20, 2025
@shashank-elastic shashank-elastic added enhancement New feature or request and removed ML machine learning related rule OS: Windows windows related rules Domain: Endpoint python Internal python for the repository schema labels Mar 20, 2025
Copy link
Contributor

github-actions bot commented Mar 20, 2025

Enhancement - Guidelines

These guidelines serve as a reminder set of considerations when addressing adding a feature to the code.

Documentation and Context

  • Describe the feature enhancement in detail (alternative solutions, description of the solution, etc.) if not already documented in an issue.
  • Include additional context or screenshots.
  • Ensure the enhancement includes necessary updates to the documentation and versioning.

Code Standards and Practices

  • Code follows established design patterns within the repo and avoids duplication.
  • Code changes do not introduce new warnings or errors.
  • Variables and functions are well-named and descriptive.
  • Any unnecessary / commented-out code is removed.
  • Ensure that the code is modular and reusable where applicable.
  • Check for proper exception handling and messaging.

Testing

  • New unit tests have been added to cover the enhancement.
  • Existing unit tests have been updated to reflect the changes.
  • Provide evidence of testing and validating the enhancement (e.g., test logs, screenshots).
  • Validate that any rules affected by the enhancement are correctly updated.
  • Ensure that performance is not negatively impacted by the changes.
  • Verify that any release artifacts are properly generated and tested.

Additional Checks

  • Ensure that the enhancement does not break existing functionality.
  • Review the enhancement with a peer or team member for additional insights.
  • Verify that the enhancement works across all relevant environments (e.g., different OS versions).
  • Confirm that all dependencies are up-to-date and compatible with the changes.
  • Confirm that the proper version label is applied to the PR patch, minor, major.

@tradebot-elastic
Copy link

tradebot-elastic commented Mar 20, 2025

⛔️ Tests failed:

Results
  • ✅ Potential Credential Access via Windows Utilities (eql)
  • ✅ System Shells via Services (eql)
  • ✅ Potential Cookies Theft via Browser Debugging (eql)
  • ❌ Potential Credential Access via DuplicateHandle in LSASS (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ High Number of Process and/or Service Terminations (kuery)
  • ❌ Potential Escalation via Vulnerable MSI Repair (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential DLL Side-Loading via Microsoft Antimalware Service Executable (eql)
  • ✅ Conhost Spawned By Suspicious Parent Process (eql)
  • ❌ Enumerating Domain Trusts via DSQUERY.EXE (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential Evasion via Filter Manager (eql)
  • ✅ Remote Desktop Enabled in Windows Firewall by Netsh (eql)
  • ❌ Local Account TokenFilter Policy Disabled (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ First Time Seen Removable Device (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Anomalous Windows Process Creation (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ User account exposed to Kerberoasting (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Attempt to Establish VScode Remote Tunnel (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Peripheral Device Discovery (eql)
  • ❌ MsBuild Making Network Connections (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Sensitive Audit Policy Sub-Category Disabled (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential LSASS Memory Dump via PssCaptureSnapShot (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential DLL Side-Loading via Trusted Microsoft Programs (eql)
  • ❌ UAC Bypass via Windows Firewall Snap-In Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Script with Token Impersonation Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ User Detected with Suspicious Windows Process(es) (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Lsass Process Access (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Exploitation of an Unquoted Service Path Vulnerability (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Cmd Execution via WMI (eql)
  • ✅ Persistence via Scheduled Job Creation (eql)
  • ❌ Potential Ransomware Behavior - High count of Readme files by System (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Persistence via Time Provider Modification (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Scheduled Task Execution at Scale via GPO (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Remote File Download via Desktopimgdownldr Utility (eql)
  • ❌ File Creation Time Changed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Startup/Logon Script added to Group Policy Object (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Username (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Service (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Powershell Script (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows User Privilege Elevation Activity (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Remote User (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Renamed Utility Executed with Short Program Name (eql)
  • ❌ Script Execution via Microsoft HTML Application (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution of COM object via Xwizard (eql)
  • ❌ User Account Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming Execution via WinRM Remote Shell (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remote File Download via Script Interpreter (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ PowerShell Script with Encryption/Decryption Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass via DiskCleanup Scheduled Task Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution of File Written or Modified by PDF Reader (eql)
  • ❌ Creation of a DNS-Named Record (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Antimalware Scan Interface Bypass via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Network Activity from a Windows System Binary (eql)
  • ✅ Suspicious .NET Code Compilation (eql)
  • ✅ Creation or Modification of Root Certificate (eql)
  • ❌ Werfault ReflectDebugger Persistence (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ LSASS Memory Dump Handle Access (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Full User-Mode Dumps Enabled System-Wide (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Lateral Movement via Startup Folder (eql)
  • ❌ Potential PowerShell HackTool Script by Author (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Relay Attack against a Domain Controller (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Persistence via Update Orchestrator Service Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming Execution via PowerShell Remoting (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Account Password Reset Remotely (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Account Discovery Command via SYSTEM Account (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass Attempt via Windows Directory Masquerading (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Enumeration of Privileged Local Groups Membership (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Adobe Hijack Persistence (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Windows Defender Exclusions Added via PowerShell (eql)
  • ✅ Suspicious Microsoft Diagnostics Wizard Execution (eql)
  • ❌ Potential Foxmail Exploitation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Command and Scripting Interpreter via Windows Scripts (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Process Access via Direct System Call (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Wireless Credential Dumping using Netsh Command (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential File Transfer via Curl for Windows (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Renamed AutoIt Scripts Interpreter (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Process Injection via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Creation of a Hidden Local User Account (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Script with Audio Capture Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Windows Defender Disabled via Registry Modification (eql)
  • ❌ Bypass UAC via Event Viewer (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Program Files Directory Masquerading (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious MS Outlook Child Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Port Forwarding Rule Addition (eql)
  • ✅ Unusual Parent-Child Relationship (eql)
  • ✅ Suspicious ImagePath Service Creation (eql)
  • ✅ Persistence via Microsoft Outlook VBA (eql)
  • ✅ Potential DNS Tunneling via NsLookup (eql)
  • ❌ WDAC Policy File by an Unusual Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Parent Process for cmd.exe (eql)
  • ✅ NTDS or SAM Database File Copied (eql)
  • ❌ ScreenConnect Server Spawning Suspicious Processes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Execution via Windows Subsystem for Linux (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privilege Escalation via Named Pipe Impersonation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Process Creation CallTrace (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Command Execution via ForFiles (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Process Spawned by a User (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Persistence via Services Registry (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Control Panel Process with Unusual Arguments (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Process Creation via Secondary Logon (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Startup Persistence by a Suspicious Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Windows Path Activity (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Multiple Vault Web Credentials Read (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Event Logs Cleared (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Encrypting Files with WinRar or 7z (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Adding Hidden File Attribute via Attrib (eql)
  • ✅ Potential Local NTLM Relay via HTTP (eql)
  • ❌ Suspicious Remote Registry Access via SeBackupPrivilege (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Microsoft Exchange Server UM Spawning Suspicious Processes (eql)
  • ❌ Multiple Logon Failure from the same Source Address (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Disable Windows Firewall Rules via Netsh (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Process Execution Path - Alternate Data Stream (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Share Enumeration Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Disable Windows Event and Security Logs Using Built-in Tools (eql)
  • ❌ Multiple Logon Failure Followed by Logon Success (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution via MSSQL xp_cmdshell Stored Procedure (eql)
  • ❌ Suspicious Script Object Execution (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via TSClient Mountpoint (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Registry Persistence via AppCert DLL (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Service DACL Modification via sc.exe (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming DCOM Lateral Movement with MMC (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Network Connection via RunDLL32 (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious PDF Reader Child Process (eql)
  • ❌ Uncommon Registry Persistence Change (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Exchange Mailbox Export via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Network Logon Provider Registry Modification (eql)
  • ❌ Windows Service Installed via an Unusual Client (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PsExec Network Connection (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Process Spawned by a Host (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows CryptoAPI Spoofing Vulnerability (CVE-2020-0601 - CurveBall) (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell PSReflect Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell MiniDump Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ DNS Global Query Block List Modified or Disabled (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Deleting Backup Catalogs with Wbadmin (eql)
  • ✅ RDP Enabled via Registry (eql)
  • ❌ UAC Bypass Attempt via Privileged IFileOperation COM Interface (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Secure File Deletion via SDelete Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious PrintSpooler Service Executable File Creation (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Script with Veeam Credential Access Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ FirstTime Seen Account Performing DCSync (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Outbound Scheduled Task Activity via PowerShell (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ User Added to Privileged Group (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Persistence via PowerShell profile (eql)
  • ✅ Suspicious Execution via Scheduled Task (eql)
  • ❌ Unsigned DLL loaded by DNS Service (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential File Download via a Headless Browser (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Process Network Connection (eql)
  • ❌ Interactive Logon by an Unusual Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Discovery Related Windows API Functions (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ AdminSDHolder SDProp Exclusion Added (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming DCOM Lateral Movement via MSHTA (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Account Configured with Never-Expiring Password (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network Connection via Signed Binary (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ MsiExec Service Child Process With Network Connection (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ WebServer Access Logs Deleted (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Modification of the msPKIAccountCredentials (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Image File Execution Options Injection (eql)
  • ✅ Persistence via TelemetryController Scheduled Task Hijack (eql)
  • ❌ Scheduled Task Created by a Windows Script (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Access to LDAP Attributes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass via ICMLuaUtil Elevated COM Interface (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Modification of Boot Configuration (eql)
  • ✅ Unusual Service Host Child Process - Childless Service (eql)
  • ✅ Exporting Exchange Mailbox via PowerShell (eql)
  • ❌ Remote Computer Account DnsHostName Update (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Microsoft Exchange Server UM Writing Suspicious Files (eql)
  • ❌ Unusual Process For a Windows Host (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ First Time Seen Commonly Abused Remote Access Tool Execution (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Anomalous Process For a Windows Population (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ AdminSDHolder Backdoor (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Windows Error Manager Masquerading (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Active Directory Group Modification by SYSTEM (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual File Creation - Alternate Data Stream (eql)
  • ✅ Suspicious RDP ActiveX Client Loaded (eql)
  • ❌ Suspicious JetBrains TeamCity Child Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Modification of Accessibility Binaries (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Access to a Sensitive LDAP Attribute (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privilege Escalation via Rogue Named Pipe Impersonation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential Remote Desktop Tunneling Detected (eql)
  • ✅ Enumeration Command Spawned via WMIPrvSE (eql)
  • ❌ Suspicious ScreenConnect Client Child Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential File Transfer via Certreq (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Shadow Credentials added to AD Object (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious LSASS Access via MalSecLogon (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Microsoft Management Console File from Unusual Path (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ File with Right-to-Left Override Character (RTLO) Created/Executed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious WMIC XSL Script Execution (eql)
  • ❌ Potential PowerShell Obfuscated Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ PowerShell Script Block Logging Disabled (eql)
  • ❌ PowerShell Suspicious Payload Encoded and Compressed (kuery)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Temporarily Scheduled Task Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Windows Powershell Arguments (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Enumerating Domain Trusts via NLTEST.EXE (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Enumeration of Administrator Accounts (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Suspicious WMI Image Load from MS Office (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential WPAD Spoofing via DNS Record Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Command Prompt Network Connection (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Execution from a Mounted Device (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Executable File Creation with Multiple Extensions (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Enable Host Network Discovery via Netsh (eql)
  • ✅ Unusual Child Process of dns.exe (eql)
  • ❌ Potential WSUS Abuse for Lateral Movement (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential ADIDNS Poisoning via Wildcard Record Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming DCOM Lateral Movement with ShellBrowserWindow or ShellWindows (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Script with Clipboard Retrieval Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ A scheduled task was created (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Evasion via Windows Filtering Platform (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Encoded Executable Stored in the Registry (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Group Policy Discovery via Microsoft GPResult Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential PowerShell Pass-the-Hash/Relay Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remote Scheduled Task Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Script with Screenshot Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ SeDebugPrivilege Enabled by a Suspicious Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Zoom Child Process (eql)
  • ❌ Machine Learning Detected a Suspicious Windows Event with a High Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Credential Access via LSASS Memory Dump (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Explorer Child Process (eql)
  • ✅ Scheduled Tasks AT Command Enabled (eql)
  • ✅ Persistence via WMI Event Subscription (eql)
  • ✅ Hosts File Modified (eql)
  • ❌ Remote Scheduled Task Creation via RPC (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Command Shell Activity Started via RunDLL32 (eql)
  • ✅ Microsoft Build Engine Started by a Script Process (kuery)
  • ✅ Microsoft Build Engine Started by a System Process (eql)
  • ✅ Microsoft Build Engine Using an Alternate Name (eql)
  • ✅ Potential Credential Access via Trusted Developer Utility (eql)
  • ✅ Microsoft Build Engine Started an Unusual Process (kuery)
  • ❌ Process Injection by the Microsoft Build Engine (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Credential Access via DCSync (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ A scheduled task was updated (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ InstallUtil Process Making Network Connections (eql)
  • ❌ Potential LSASS Clone Creation via PssCaptureSnapShot (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Subsystem for Linux Distribution Installed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ DNS-over-HTTPS Enabled via Registry (eql)
  • ❌ PowerShell Mailbox Collection Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via local SxS Shared Module (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious MS Office Child Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Credential Acquisition via Registry Hive Dumping (eql)
  • ❌ Persistence via Hidden Run Key Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remotely Started Services via RPC (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Process Calling the Metadata Service (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious WerFault Child Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Outlook Home Page Registry Modification (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ WPS Office Exploitation via DLL Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Invoke-Mimikatz PowerShell Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Managed Code Hosting Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Signed Proxy Execution via MS Work Folders (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Suspicious Portable Executable Encoded in Powershell Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Execution via Microsoft Office Add-Ins (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Local Scheduled Task Creation (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Netsh Helper DLL (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network Connection via Compiled HTML File (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Endpoint Security Parent Process (eql)
  • ❌ Code Signing Policy Modification Through Built-in tools (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Clearing Windows Console History (eql)
  • ❌ Volume Shadow Copy Deleted or Resized via VssAdmin (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Script Interpreter Executing Process via WMI (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Potential Veeam Credential Access Command (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Privilege Escalation via Service ImagePath Modification (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Invoke-NinjaCopy script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Creation or Modification of Domain Backup DPAPI private key (eql)
  • ❌ Network Connection via MsXsl (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Kirbi File Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ UAC Bypass Attempt with IEditionUpgradeManager Elevated COM Interface (eql)
  • ❌ Group Policy Abuse for Privilege Addition (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ SolarWinds Process Disabling Services via Registry (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Network Activity (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Image Load (taskschd.dll) from MS Office (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Keylogging Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Print Spooler Point and Print DLL (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Potential Privileged Escalation via SamAccountName Spoofing (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via Windows Command Debugging Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Host Detected with Suspicious Windows Process(es) (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Searching for Saved Credentials via VaultCmd (eql)
  • ✅ Suspicious DLL Loaded for Persistence or Privilege Escalation (eql)
  • ❌ Creation or Modification of a new GPO Scheduled Task or Service (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Microsoft IIS Connection Strings Decryption (eql)
  • ❌ Mshta Making Network Connections (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Persistence via BITS Job Notify Cmdline (eql)
  • ✅ Mounting Hidden or WebDav Remote Shares (eql)
  • ✅ Suspicious Print Spooler File Deletion (eql)
  • ✅ Potential Remote Desktop Shadowing Activity (eql)
  • ❌ Potential Credential Access via Renamed COM+ Services DLL (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Installation of Custom Shim Databases (eql)
  • ✅ Microsoft Build Engine Started by an Office Application (eql)
  • ✅ Remote File Download via MpCmdRun (eql)
  • ❌ Unusual Network Connection via DllHost (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual File Modification by dns.exe (eql)
  • ✅ Suspicious Startup Shell Folder Modification (eql)
  • ✅ Disabling Windows Defender Security Settings via PowerShell (eql)
  • ❌ Potential PowerShell HackTool Script by Function Names (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ New ActiveSyncAllowedDeviceID Added via PowerShell (eql)
  • ✅ Execution from Unusual Directory - Command Line (eql)
  • ✅ Registry Persistence via AppInit DLL (eql)
  • ✅ Symbolic Link to Shadow Copy Created (eql)
  • ✅ Disabling User Account Control via Registry Modification (eql)
  • ✅ Clearing Windows Event Logs (eql)
  • ❌ Remote Windows Service Installed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privilege Escalation via Windir Environment Variable (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Service Command Lateral Movement (eql)
  • ❌ Modification of WDigest Security Provider (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Command Execution via SolarWinds Process (eql)
  • ❌ NTDS Dump via Wbadmin (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Volume Shadow Copy Deletion via PowerShell (eql)
  • ❌ Suspicious Windows Command Shell Arguments (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Code Signing Policy Modification Through Registry (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Service was Installed in the System (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Pass-the-Hash (PtH) Attempt (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network-Level Authentication (NLA) Disabled (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via Windows Subsystem for Linux (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Volume Shadow Copy Deletion via WMIC (eql)
  • ❌ Suspicious Execution from INET Cache (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Attempt to Install Kali Linux via WSL (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ NullSessionPipe Registry Modification (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Child Process from a System Virtual Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows User Calling the Metadata Service (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential privilege escalation via CVE-2022-38028 (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ KRBTGT Delegation Backdoor (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious .NET Reflection via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Subsystem for Linux Enabled via Dism Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Process Execution via Renamed PsExec Executable (eql)
  • ✅ Process Activity via Compiled HTML File (eql)
  • ✅ Connection to Commonly Abused Free SSL Certificate Providers (eql)
  • ❌ First Time Seen NewCredentials Logon Process (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Service Creation via Local Kerberos Authentication (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Kerberos Pre-authentication Disabled for User (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution of Persistent Suspicious Program (eql)
  • ❌ Unusual Execution via Microsoft Common Console File (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Service Control Spawned via Script Interpreter (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Installation of Security Support Provider (eql)
  • ❌ Host Files System Changes via Windows Subsystem for Linux (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Executable File Creation by a System Critical Process (eql)
  • ❌ Unusual Process Spawned by a Parent Process (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Script with Webcam Video Capture Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Kerberos Ticket Request (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Mimikatz Memssp Log File Detected (eql)
  • ✅ IIS HTTP Logging Disabled (eql)
  • ❌ Process Execution from an Unusual Directory (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ AdFind Command Activity (eql)
  • ❌ ImageLoad via Windows Update Auto Update Client (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Print Spooler Child Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Whoami Process Activity (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Child Processes of RunDLL32 (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ SIP Provider Modification (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ LSASS Memory Dump Creation (eql)
  • ❌ WMI Incoming Lateral Movement (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Remote Desktop File Opened from Suspicious Path (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Persistence via Microsoft Office AddIns (eql)
  • ❌ Sensitive Privilege SeEnableDelegationPrivilege assigned to a User (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Windows Script Executing PowerShell (eql)
  • ❌ Rare SMB Connection to the Internet (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Parent Process Detected with Suspicious Windows Process(es) (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Windows Firewall Disabled via PowerShell (eql)
  • ✅ Delete Volume USN Journal with Fsutil (eql)
  • ❌ Persistent Scripts in the Startup Directory (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Microsoft Exchange Worker Spawning Suspicious Processes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Modification of AmsiEnable Registry Key (eql)
  • ❌ Potential Active Directory Replication Account Backdoor (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Untrusted DLL Loaded by Azure AD Sync Service (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Browser Extension Install (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privileged Account Brute Force (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remote File Copy to a Hidden Share (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Suspicious Antimalware Scan Interface DLL (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network Connection via Registration Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass Attempt via Elevated COM Internet Explorer Add-On Installer (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential Application Shimming via Sdbinst (eql)
  • ✅ Suspicious CertUtil Commands (eql)
  • ❌ Svchost spawning Cmd (kuery)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ PowerShell Kerberos Ticket Dump (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Microsoft Windows Defender Tampering (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ MS Office Macro Security Registry Modifications (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Alternate Data Stream Creation/Execution at Volume Root Directory (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@botelastic botelastic bot added Domain: Endpoint ML machine learning related rule OS: Windows windows related rules python Internal python for the repository schema labels Mar 20, 2025
@shashank-elastic shashank-elastic removed ML machine learning related rule OS: Windows windows related rules Domain: Endpoint python Internal python for the repository schema labels Mar 20, 2025
@tradebot-elastic
Copy link

tradebot-elastic commented Mar 20, 2025

⛔️ Tests failed:

Results
  • ✅ Potential Credential Access via Windows Utilities (eql)
  • ✅ System Shells via Services (eql)
  • ✅ Potential Cookies Theft via Browser Debugging (eql)
  • ❌ Potential Credential Access via DuplicateHandle in LSASS (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ High Number of Process and/or Service Terminations (kuery)
  • ❌ Potential Escalation via Vulnerable MSI Repair (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential DLL Side-Loading via Microsoft Antimalware Service Executable (eql)
  • ✅ Conhost Spawned By Suspicious Parent Process (eql)
  • ❌ Enumerating Domain Trusts via DSQUERY.EXE (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential Evasion via Filter Manager (eql)
  • ✅ Remote Desktop Enabled in Windows Firewall by Netsh (eql)
  • ❌ Local Account TokenFilter Policy Disabled (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ First Time Seen Removable Device (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Anomalous Windows Process Creation (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ User account exposed to Kerberoasting (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Attempt to Establish VScode Remote Tunnel (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Peripheral Device Discovery (eql)
  • ❌ MsBuild Making Network Connections (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Sensitive Audit Policy Sub-Category Disabled (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential LSASS Memory Dump via PssCaptureSnapShot (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential DLL Side-Loading via Trusted Microsoft Programs (eql)
  • ❌ UAC Bypass via Windows Firewall Snap-In Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Script with Token Impersonation Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ User Detected with Suspicious Windows Process(es) (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Lsass Process Access (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Exploitation of an Unquoted Service Path Vulnerability (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Cmd Execution via WMI (eql)
  • ✅ Persistence via Scheduled Job Creation (eql)
  • ❌ Potential Ransomware Behavior - High count of Readme files by System (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Persistence via Time Provider Modification (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Scheduled Task Execution at Scale via GPO (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Remote File Download via Desktopimgdownldr Utility (eql)
  • ❌ File Creation Time Changed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Startup/Logon Script added to Group Policy Object (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Username (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Service (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Powershell Script (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows User Privilege Elevation Activity (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Remote User (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Renamed Utility Executed with Short Program Name (eql)
  • ❌ Script Execution via Microsoft HTML Application (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution of COM object via Xwizard (eql)
  • ❌ User Account Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming Execution via WinRM Remote Shell (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remote File Download via Script Interpreter (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ PowerShell Script with Encryption/Decryption Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass via DiskCleanup Scheduled Task Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution of File Written or Modified by PDF Reader (eql)
  • ❌ Creation of a DNS-Named Record (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Antimalware Scan Interface Bypass via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Network Activity from a Windows System Binary (eql)
  • ✅ Suspicious .NET Code Compilation (eql)
  • ✅ Creation or Modification of Root Certificate (eql)
  • ❌ Werfault ReflectDebugger Persistence (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ LSASS Memory Dump Handle Access (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Full User-Mode Dumps Enabled System-Wide (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Lateral Movement via Startup Folder (eql)
  • ❌ Potential PowerShell HackTool Script by Author (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Relay Attack against a Domain Controller (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Persistence via Update Orchestrator Service Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming Execution via PowerShell Remoting (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Account Password Reset Remotely (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Account Discovery Command via SYSTEM Account (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass Attempt via Windows Directory Masquerading (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Enumeration of Privileged Local Groups Membership (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Adobe Hijack Persistence (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Windows Defender Exclusions Added via PowerShell (eql)
  • ✅ Suspicious Microsoft Diagnostics Wizard Execution (eql)
  • ❌ Potential Foxmail Exploitation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Command and Scripting Interpreter via Windows Scripts (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Process Access via Direct System Call (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Wireless Credential Dumping using Netsh Command (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential File Transfer via Curl for Windows (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Renamed AutoIt Scripts Interpreter (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Process Injection via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Creation of a Hidden Local User Account (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Script with Audio Capture Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Windows Defender Disabled via Registry Modification (eql)
  • ❌ Bypass UAC via Event Viewer (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Program Files Directory Masquerading (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious MS Outlook Child Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Port Forwarding Rule Addition (eql)
  • ✅ Unusual Parent-Child Relationship (eql)
  • ✅ Suspicious ImagePath Service Creation (eql)
  • ✅ Persistence via Microsoft Outlook VBA (eql)
  • ✅ Potential DNS Tunneling via NsLookup (eql)
  • ❌ WDAC Policy File by an Unusual Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Parent Process for cmd.exe (eql)
  • ✅ NTDS or SAM Database File Copied (eql)
  • ❌ ScreenConnect Server Spawning Suspicious Processes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Execution via Windows Subsystem for Linux (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privilege Escalation via Named Pipe Impersonation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Process Creation CallTrace (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Command Execution via ForFiles (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Process Spawned by a User (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Persistence via Services Registry (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Control Panel Process with Unusual Arguments (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Process Creation via Secondary Logon (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Startup Persistence by a Suspicious Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Windows Path Activity (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Multiple Vault Web Credentials Read (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Event Logs Cleared (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Encrypting Files with WinRar or 7z (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Adding Hidden File Attribute via Attrib (eql)
  • ✅ Potential Local NTLM Relay via HTTP (eql)
  • ❌ Suspicious Remote Registry Access via SeBackupPrivilege (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Microsoft Exchange Server UM Spawning Suspicious Processes (eql)
  • ❌ Multiple Logon Failure from the same Source Address (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Disable Windows Firewall Rules via Netsh (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Process Execution Path - Alternate Data Stream (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Share Enumeration Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Disable Windows Event and Security Logs Using Built-in Tools (eql)
  • ❌ Multiple Logon Failure Followed by Logon Success (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution via MSSQL xp_cmdshell Stored Procedure (eql)
  • ❌ Suspicious Script Object Execution (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via TSClient Mountpoint (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Registry Persistence via AppCert DLL (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Service DACL Modification via sc.exe (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming DCOM Lateral Movement with MMC (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Network Connection via RunDLL32 (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious PDF Reader Child Process (eql)
  • ❌ Uncommon Registry Persistence Change (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Exchange Mailbox Export via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Network Logon Provider Registry Modification (eql)
  • ❌ Windows Service Installed via an Unusual Client (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PsExec Network Connection (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Process Spawned by a Host (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows CryptoAPI Spoofing Vulnerability (CVE-2020-0601 - CurveBall) (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell PSReflect Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell MiniDump Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ DNS Global Query Block List Modified or Disabled (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Deleting Backup Catalogs with Wbadmin (eql)
  • ✅ RDP Enabled via Registry (eql)
  • ❌ UAC Bypass Attempt via Privileged IFileOperation COM Interface (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Secure File Deletion via SDelete Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious PrintSpooler Service Executable File Creation (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Script with Veeam Credential Access Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ FirstTime Seen Account Performing DCSync (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Outbound Scheduled Task Activity via PowerShell (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ User Added to Privileged Group (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Persistence via PowerShell profile (eql)
  • ✅ Suspicious Execution via Scheduled Task (eql)
  • ❌ Unsigned DLL loaded by DNS Service (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential File Download via a Headless Browser (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Process Network Connection (eql)
  • ❌ Interactive Logon by an Unusual Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Discovery Related Windows API Functions (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ AdminSDHolder SDProp Exclusion Added (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming DCOM Lateral Movement via MSHTA (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Account Configured with Never-Expiring Password (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network Connection via Signed Binary (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ MsiExec Service Child Process With Network Connection (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ WebServer Access Logs Deleted (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Modification of the msPKIAccountCredentials (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Image File Execution Options Injection (eql)
  • ✅ Persistence via TelemetryController Scheduled Task Hijack (eql)
  • ❌ Scheduled Task Created by a Windows Script (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Access to LDAP Attributes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass via ICMLuaUtil Elevated COM Interface (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Modification of Boot Configuration (eql)
  • ✅ Unusual Service Host Child Process - Childless Service (eql)
  • ✅ Exporting Exchange Mailbox via PowerShell (eql)
  • ❌ Remote Computer Account DnsHostName Update (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Microsoft Exchange Server UM Writing Suspicious Files (eql)
  • ❌ Unusual Process For a Windows Host (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ First Time Seen Commonly Abused Remote Access Tool Execution (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Anomalous Process For a Windows Population (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ AdminSDHolder Backdoor (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Windows Error Manager Masquerading (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Active Directory Group Modification by SYSTEM (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual File Creation - Alternate Data Stream (eql)
  • ✅ Suspicious RDP ActiveX Client Loaded (eql)
  • ❌ Suspicious JetBrains TeamCity Child Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Modification of Accessibility Binaries (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Access to a Sensitive LDAP Attribute (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privilege Escalation via Rogue Named Pipe Impersonation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential Remote Desktop Tunneling Detected (eql)
  • ✅ Enumeration Command Spawned via WMIPrvSE (eql)
  • ❌ Suspicious ScreenConnect Client Child Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential File Transfer via Certreq (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Shadow Credentials added to AD Object (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious LSASS Access via MalSecLogon (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Microsoft Management Console File from Unusual Path (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ File with Right-to-Left Override Character (RTLO) Created/Executed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious WMIC XSL Script Execution (eql)
  • ❌ Potential PowerShell Obfuscated Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ PowerShell Script Block Logging Disabled (eql)
  • ❌ PowerShell Suspicious Payload Encoded and Compressed (kuery)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Temporarily Scheduled Task Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Windows Powershell Arguments (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Enumerating Domain Trusts via NLTEST.EXE (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Enumeration of Administrator Accounts (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Suspicious WMI Image Load from MS Office (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential WPAD Spoofing via DNS Record Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Command Prompt Network Connection (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Execution from a Mounted Device (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Executable File Creation with Multiple Extensions (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Enable Host Network Discovery via Netsh (eql)
  • ✅ Unusual Child Process of dns.exe (eql)
  • ❌ Potential WSUS Abuse for Lateral Movement (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential ADIDNS Poisoning via Wildcard Record Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming DCOM Lateral Movement with ShellBrowserWindow or ShellWindows (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Script with Clipboard Retrieval Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ A scheduled task was created (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Evasion via Windows Filtering Platform (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Encoded Executable Stored in the Registry (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Group Policy Discovery via Microsoft GPResult Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential PowerShell Pass-the-Hash/Relay Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remote Scheduled Task Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Script with Screenshot Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ SeDebugPrivilege Enabled by a Suspicious Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Zoom Child Process (eql)
  • ❌ Machine Learning Detected a Suspicious Windows Event with a High Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Credential Access via LSASS Memory Dump (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Explorer Child Process (eql)
  • ✅ Scheduled Tasks AT Command Enabled (eql)
  • ✅ Persistence via WMI Event Subscription (eql)
  • ✅ Hosts File Modified (eql)
  • ❌ Remote Scheduled Task Creation via RPC (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Command Shell Activity Started via RunDLL32 (eql)
  • ✅ Microsoft Build Engine Started by a Script Process (kuery)
  • ✅ Microsoft Build Engine Started by a System Process (eql)
  • ✅ Microsoft Build Engine Using an Alternate Name (eql)
  • ✅ Potential Credential Access via Trusted Developer Utility (eql)
  • ✅ Microsoft Build Engine Started an Unusual Process (kuery)
  • ❌ Process Injection by the Microsoft Build Engine (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Credential Access via DCSync (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ A scheduled task was updated (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ InstallUtil Process Making Network Connections (eql)
  • ❌ Potential LSASS Clone Creation via PssCaptureSnapShot (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Subsystem for Linux Distribution Installed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ DNS-over-HTTPS Enabled via Registry (eql)
  • ❌ PowerShell Mailbox Collection Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via local SxS Shared Module (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious MS Office Child Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Credential Acquisition via Registry Hive Dumping (eql)
  • ❌ Persistence via Hidden Run Key Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remotely Started Services via RPC (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Process Calling the Metadata Service (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious WerFault Child Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Outlook Home Page Registry Modification (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ WPS Office Exploitation via DLL Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Invoke-Mimikatz PowerShell Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Managed Code Hosting Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Signed Proxy Execution via MS Work Folders (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Suspicious Portable Executable Encoded in Powershell Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Execution via Microsoft Office Add-Ins (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Local Scheduled Task Creation (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Netsh Helper DLL (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network Connection via Compiled HTML File (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Endpoint Security Parent Process (eql)
  • ❌ Code Signing Policy Modification Through Built-in tools (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Clearing Windows Console History (eql)
  • ❌ Volume Shadow Copy Deleted or Resized via VssAdmin (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Script Interpreter Executing Process via WMI (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Potential Veeam Credential Access Command (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Privilege Escalation via Service ImagePath Modification (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Invoke-NinjaCopy script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Creation or Modification of Domain Backup DPAPI private key (eql)
  • ❌ Network Connection via MsXsl (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Kirbi File Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ UAC Bypass Attempt with IEditionUpgradeManager Elevated COM Interface (eql)
  • ❌ Group Policy Abuse for Privilege Addition (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ SolarWinds Process Disabling Services via Registry (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Network Activity (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Image Load (taskschd.dll) from MS Office (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Keylogging Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Print Spooler Point and Print DLL (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Potential Privileged Escalation via SamAccountName Spoofing (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via Windows Command Debugging Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Host Detected with Suspicious Windows Process(es) (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Searching for Saved Credentials via VaultCmd (eql)
  • ✅ Suspicious DLL Loaded for Persistence or Privilege Escalation (eql)
  • ❌ Creation or Modification of a new GPO Scheduled Task or Service (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Microsoft IIS Connection Strings Decryption (eql)
  • ❌ Mshta Making Network Connections (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Persistence via BITS Job Notify Cmdline (eql)
  • ✅ Mounting Hidden or WebDav Remote Shares (eql)
  • ✅ Suspicious Print Spooler File Deletion (eql)
  • ✅ Potential Remote Desktop Shadowing Activity (eql)
  • ❌ Potential Credential Access via Renamed COM+ Services DLL (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Installation of Custom Shim Databases (eql)
  • ✅ Microsoft Build Engine Started by an Office Application (eql)
  • ✅ Remote File Download via MpCmdRun (eql)
  • ❌ Unusual Network Connection via DllHost (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual File Modification by dns.exe (eql)
  • ✅ Suspicious Startup Shell Folder Modification (eql)
  • ✅ Disabling Windows Defender Security Settings via PowerShell (eql)
  • ❌ Potential PowerShell HackTool Script by Function Names (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ New ActiveSyncAllowedDeviceID Added via PowerShell (eql)
  • ✅ Execution from Unusual Directory - Command Line (eql)
  • ✅ Registry Persistence via AppInit DLL (eql)
  • ✅ Symbolic Link to Shadow Copy Created (eql)
  • ✅ Disabling User Account Control via Registry Modification (eql)
  • ✅ Clearing Windows Event Logs (eql)
  • ❌ Remote Windows Service Installed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privilege Escalation via Windir Environment Variable (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Service Command Lateral Movement (eql)
  • ❌ Modification of WDigest Security Provider (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Command Execution via SolarWinds Process (eql)
  • ❌ NTDS Dump via Wbadmin (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Volume Shadow Copy Deletion via PowerShell (eql)
  • ❌ Suspicious Windows Command Shell Arguments (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Code Signing Policy Modification Through Registry (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Service was Installed in the System (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Pass-the-Hash (PtH) Attempt (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network-Level Authentication (NLA) Disabled (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via Windows Subsystem for Linux (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Volume Shadow Copy Deletion via WMIC (eql)
  • ❌ Suspicious Execution from INET Cache (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Attempt to Install Kali Linux via WSL (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ NullSessionPipe Registry Modification (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Child Process from a System Virtual Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows User Calling the Metadata Service (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential privilege escalation via CVE-2022-38028 (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ KRBTGT Delegation Backdoor (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious .NET Reflection via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Subsystem for Linux Enabled via Dism Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Process Execution via Renamed PsExec Executable (eql)
  • ✅ Process Activity via Compiled HTML File (eql)
  • ✅ Connection to Commonly Abused Free SSL Certificate Providers (eql)
  • ❌ First Time Seen NewCredentials Logon Process (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Service Creation via Local Kerberos Authentication (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Kerberos Pre-authentication Disabled for User (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution of Persistent Suspicious Program (eql)
  • ❌ Unusual Execution via Microsoft Common Console File (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Service Control Spawned via Script Interpreter (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Installation of Security Support Provider (eql)
  • ❌ Host Files System Changes via Windows Subsystem for Linux (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Executable File Creation by a System Critical Process (eql)
  • ❌ Unusual Process Spawned by a Parent Process (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Script with Webcam Video Capture Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Kerberos Ticket Request (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Mimikatz Memssp Log File Detected (eql)
  • ✅ IIS HTTP Logging Disabled (eql)
  • ❌ Process Execution from an Unusual Directory (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ AdFind Command Activity (eql)
  • ❌ ImageLoad via Windows Update Auto Update Client (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Print Spooler Child Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Whoami Process Activity (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Child Processes of RunDLL32 (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ SIP Provider Modification (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ LSASS Memory Dump Creation (eql)
  • ❌ WMI Incoming Lateral Movement (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Remote Desktop File Opened from Suspicious Path (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Persistence via Microsoft Office AddIns (eql)
  • ❌ Sensitive Privilege SeEnableDelegationPrivilege assigned to a User (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Windows Script Executing PowerShell (eql)
  • ❌ Rare SMB Connection to the Internet (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Parent Process Detected with Suspicious Windows Process(es) (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Windows Firewall Disabled via PowerShell (eql)
  • ✅ Delete Volume USN Journal with Fsutil (eql)
  • ❌ Persistent Scripts in the Startup Directory (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Microsoft Exchange Worker Spawning Suspicious Processes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Modification of AmsiEnable Registry Key (eql)
  • ❌ Potential Active Directory Replication Account Backdoor (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Untrusted DLL Loaded by Azure AD Sync Service (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Browser Extension Install (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privileged Account Brute Force (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remote File Copy to a Hidden Share (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Suspicious Antimalware Scan Interface DLL (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network Connection via Registration Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass Attempt via Elevated COM Internet Explorer Add-On Installer (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential Application Shimming via Sdbinst (eql)
  • ✅ Suspicious CertUtil Commands (eql)
  • ❌ Svchost spawning Cmd (kuery)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ PowerShell Kerberos Ticket Dump (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Microsoft Windows Defender Tampering (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ MS Office Macro Security Registry Modifications (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Alternate Data Stream Creation/Execution at Volume Root Directory (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@shashank-elastic shashank-elastic changed the title Prep for Release 9.1 Prep main for 9.1 Mar 20, 2025
@tradebot-elastic
Copy link

tradebot-elastic commented Mar 21, 2025

⛔️ Tests failed:

Results
  • ✅ Potential Credential Access via Windows Utilities (eql)
  • ✅ System Shells via Services (eql)
  • ✅ Potential Cookies Theft via Browser Debugging (eql)
  • ❌ Potential Credential Access via DuplicateHandle in LSASS (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ High Number of Process and/or Service Terminations (kuery)
  • ❌ Potential Escalation via Vulnerable MSI Repair (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential DLL Side-Loading via Microsoft Antimalware Service Executable (eql)
  • ✅ Conhost Spawned By Suspicious Parent Process (eql)
  • ❌ Enumerating Domain Trusts via DSQUERY.EXE (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential Evasion via Filter Manager (eql)
  • ✅ Remote Desktop Enabled in Windows Firewall by Netsh (eql)
  • ❌ Local Account TokenFilter Policy Disabled (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ First Time Seen Removable Device (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Anomalous Windows Process Creation (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ User account exposed to Kerberoasting (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Attempt to Establish VScode Remote Tunnel (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Peripheral Device Discovery (eql)
  • ❌ MsBuild Making Network Connections (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Sensitive Audit Policy Sub-Category Disabled (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential LSASS Memory Dump via PssCaptureSnapShot (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential DLL Side-Loading via Trusted Microsoft Programs (eql)
  • ❌ UAC Bypass via Windows Firewall Snap-In Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Script with Token Impersonation Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ User Detected with Suspicious Windows Process(es) (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Lsass Process Access (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Exploitation of an Unquoted Service Path Vulnerability (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Cmd Execution via WMI (eql)
  • ✅ Persistence via Scheduled Job Creation (eql)
  • ❌ Potential Ransomware Behavior - High count of Readme files by System (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Persistence via Time Provider Modification (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Scheduled Task Execution at Scale via GPO (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Remote File Download via Desktopimgdownldr Utility (eql)
  • ❌ File Creation Time Changed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Startup/Logon Script added to Group Policy Object (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Username (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Service (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Powershell Script (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows User Privilege Elevation Activity (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Remote User (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Renamed Utility Executed with Short Program Name (eql)
  • ❌ Script Execution via Microsoft HTML Application (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution of COM object via Xwizard (eql)
  • ❌ User Account Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming Execution via WinRM Remote Shell (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remote File Download via Script Interpreter (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ PowerShell Script with Encryption/Decryption Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass via DiskCleanup Scheduled Task Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution of File Written or Modified by PDF Reader (eql)
  • ❌ Creation of a DNS-Named Record (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Antimalware Scan Interface Bypass via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Network Activity from a Windows System Binary (eql)
  • ✅ Suspicious .NET Code Compilation (eql)
  • ✅ Creation or Modification of Root Certificate (eql)
  • ❌ Werfault ReflectDebugger Persistence (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ LSASS Memory Dump Handle Access (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Full User-Mode Dumps Enabled System-Wide (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Lateral Movement via Startup Folder (eql)
  • ❌ Potential PowerShell HackTool Script by Author (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Relay Attack against a Domain Controller (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Persistence via Update Orchestrator Service Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming Execution via PowerShell Remoting (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Account Password Reset Remotely (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Account Discovery Command via SYSTEM Account (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass Attempt via Windows Directory Masquerading (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Enumeration of Privileged Local Groups Membership (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Adobe Hijack Persistence (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Windows Defender Exclusions Added via PowerShell (eql)
  • ✅ Suspicious Microsoft Diagnostics Wizard Execution (eql)
  • ❌ Potential Foxmail Exploitation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Command and Scripting Interpreter via Windows Scripts (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Process Access via Direct System Call (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Wireless Credential Dumping using Netsh Command (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential File Transfer via Curl for Windows (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Renamed AutoIt Scripts Interpreter (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Process Injection via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Creation of a Hidden Local User Account (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Script with Audio Capture Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Windows Defender Disabled via Registry Modification (eql)
  • ❌ Bypass UAC via Event Viewer (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Program Files Directory Masquerading (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious MS Outlook Child Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Port Forwarding Rule Addition (eql)
  • ✅ Unusual Parent-Child Relationship (eql)
  • ✅ Suspicious ImagePath Service Creation (eql)
  • ✅ Persistence via Microsoft Outlook VBA (eql)
  • ✅ Potential DNS Tunneling via NsLookup (eql)
  • ❌ WDAC Policy File by an Unusual Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Parent Process for cmd.exe (eql)
  • ✅ NTDS or SAM Database File Copied (eql)
  • ❌ ScreenConnect Server Spawning Suspicious Processes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Execution via Windows Subsystem for Linux (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privilege Escalation via Named Pipe Impersonation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Process Creation CallTrace (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Command Execution via ForFiles (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Process Spawned by a User (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Persistence via Services Registry (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Control Panel Process with Unusual Arguments (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Process Creation via Secondary Logon (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Startup Persistence by a Suspicious Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Windows Path Activity (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Multiple Vault Web Credentials Read (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Event Logs Cleared (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Encrypting Files with WinRar or 7z (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Adding Hidden File Attribute via Attrib (eql)
  • ✅ Potential Local NTLM Relay via HTTP (eql)
  • ❌ Suspicious Remote Registry Access via SeBackupPrivilege (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Microsoft Exchange Server UM Spawning Suspicious Processes (eql)
  • ❌ Multiple Logon Failure from the same Source Address (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Disable Windows Firewall Rules via Netsh (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Process Execution Path - Alternate Data Stream (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Share Enumeration Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Disable Windows Event and Security Logs Using Built-in Tools (eql)
  • ❌ Multiple Logon Failure Followed by Logon Success (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution via MSSQL xp_cmdshell Stored Procedure (eql)
  • ❌ Suspicious Script Object Execution (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via TSClient Mountpoint (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Registry Persistence via AppCert DLL (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Service DACL Modification via sc.exe (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming DCOM Lateral Movement with MMC (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Network Connection via RunDLL32 (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious PDF Reader Child Process (eql)
  • ❌ Uncommon Registry Persistence Change (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Exchange Mailbox Export via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Network Logon Provider Registry Modification (eql)
  • ❌ Windows Service Installed via an Unusual Client (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PsExec Network Connection (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Process Spawned by a Host (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows CryptoAPI Spoofing Vulnerability (CVE-2020-0601 - CurveBall) (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell PSReflect Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell MiniDump Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ DNS Global Query Block List Modified or Disabled (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Deleting Backup Catalogs with Wbadmin (eql)
  • ✅ RDP Enabled via Registry (eql)
  • ❌ UAC Bypass Attempt via Privileged IFileOperation COM Interface (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Secure File Deletion via SDelete Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious PrintSpooler Service Executable File Creation (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Script with Veeam Credential Access Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ FirstTime Seen Account Performing DCSync (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Outbound Scheduled Task Activity via PowerShell (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ User Added to Privileged Group (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Persistence via PowerShell profile (eql)
  • ✅ Suspicious Execution via Scheduled Task (eql)
  • ❌ Unsigned DLL loaded by DNS Service (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential File Download via a Headless Browser (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Process Network Connection (eql)
  • ❌ Interactive Logon by an Unusual Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Discovery Related Windows API Functions (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ AdminSDHolder SDProp Exclusion Added (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming DCOM Lateral Movement via MSHTA (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Account Configured with Never-Expiring Password (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network Connection via Signed Binary (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ MsiExec Service Child Process With Network Connection (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ WebServer Access Logs Deleted (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Modification of the msPKIAccountCredentials (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Image File Execution Options Injection (eql)
  • ✅ Persistence via TelemetryController Scheduled Task Hijack (eql)
  • ❌ Scheduled Task Created by a Windows Script (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Access to LDAP Attributes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass via ICMLuaUtil Elevated COM Interface (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Modification of Boot Configuration (eql)
  • ✅ Unusual Service Host Child Process - Childless Service (eql)
  • ✅ Exporting Exchange Mailbox via PowerShell (eql)
  • ❌ Remote Computer Account DnsHostName Update (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Microsoft Exchange Server UM Writing Suspicious Files (eql)
  • ❌ Unusual Process For a Windows Host (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ First Time Seen Commonly Abused Remote Access Tool Execution (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Anomalous Process For a Windows Population (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ AdminSDHolder Backdoor (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Windows Error Manager Masquerading (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Active Directory Group Modification by SYSTEM (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual File Creation - Alternate Data Stream (eql)
  • ✅ Suspicious RDP ActiveX Client Loaded (eql)
  • ❌ Suspicious JetBrains TeamCity Child Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Modification of Accessibility Binaries (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Access to a Sensitive LDAP Attribute (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privilege Escalation via Rogue Named Pipe Impersonation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential Remote Desktop Tunneling Detected (eql)
  • ✅ Enumeration Command Spawned via WMIPrvSE (eql)
  • ❌ Suspicious ScreenConnect Client Child Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential File Transfer via Certreq (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Shadow Credentials added to AD Object (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious LSASS Access via MalSecLogon (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Microsoft Management Console File from Unusual Path (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ File with Right-to-Left Override Character (RTLO) Created/Executed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious WMIC XSL Script Execution (eql)
  • ❌ Potential PowerShell Obfuscated Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ PowerShell Script Block Logging Disabled (eql)
  • ❌ PowerShell Suspicious Payload Encoded and Compressed (kuery)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Temporarily Scheduled Task Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Windows Powershell Arguments (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Enumerating Domain Trusts via NLTEST.EXE (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Enumeration of Administrator Accounts (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Suspicious WMI Image Load from MS Office (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential WPAD Spoofing via DNS Record Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Command Prompt Network Connection (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Execution from a Mounted Device (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Executable File Creation with Multiple Extensions (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Enable Host Network Discovery via Netsh (eql)
  • ✅ Unusual Child Process of dns.exe (eql)
  • ❌ Potential WSUS Abuse for Lateral Movement (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential ADIDNS Poisoning via Wildcard Record Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming DCOM Lateral Movement with ShellBrowserWindow or ShellWindows (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Script with Clipboard Retrieval Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ A scheduled task was created (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Evasion via Windows Filtering Platform (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Encoded Executable Stored in the Registry (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Group Policy Discovery via Microsoft GPResult Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential PowerShell Pass-the-Hash/Relay Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remote Scheduled Task Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Script with Screenshot Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ SeDebugPrivilege Enabled by a Suspicious Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Zoom Child Process (eql)
  • ❌ Machine Learning Detected a Suspicious Windows Event with a High Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Credential Access via LSASS Memory Dump (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Explorer Child Process (eql)
  • ✅ Scheduled Tasks AT Command Enabled (eql)
  • ✅ Persistence via WMI Event Subscription (eql)
  • ✅ Hosts File Modified (eql)
  • ❌ Remote Scheduled Task Creation via RPC (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Command Shell Activity Started via RunDLL32 (eql)
  • ✅ Microsoft Build Engine Started by a Script Process (kuery)
  • ✅ Microsoft Build Engine Started by a System Process (eql)
  • ✅ Microsoft Build Engine Using an Alternate Name (eql)
  • ✅ Potential Credential Access via Trusted Developer Utility (eql)
  • ✅ Microsoft Build Engine Started an Unusual Process (kuery)
  • ❌ Process Injection by the Microsoft Build Engine (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Credential Access via DCSync (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ A scheduled task was updated (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ InstallUtil Process Making Network Connections (eql)
  • ❌ Potential LSASS Clone Creation via PssCaptureSnapShot (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Subsystem for Linux Distribution Installed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ DNS-over-HTTPS Enabled via Registry (eql)
  • ❌ PowerShell Mailbox Collection Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via local SxS Shared Module (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious MS Office Child Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Credential Acquisition via Registry Hive Dumping (eql)
  • ❌ Persistence via Hidden Run Key Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remotely Started Services via RPC (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Process Calling the Metadata Service (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious WerFault Child Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Outlook Home Page Registry Modification (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ WPS Office Exploitation via DLL Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Invoke-Mimikatz PowerShell Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Managed Code Hosting Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Signed Proxy Execution via MS Work Folders (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Suspicious Portable Executable Encoded in Powershell Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Execution via Microsoft Office Add-Ins (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Local Scheduled Task Creation (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Netsh Helper DLL (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network Connection via Compiled HTML File (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Endpoint Security Parent Process (eql)
  • ❌ Code Signing Policy Modification Through Built-in tools (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Clearing Windows Console History (eql)
  • ❌ Volume Shadow Copy Deleted or Resized via VssAdmin (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Script Interpreter Executing Process via WMI (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Potential Veeam Credential Access Command (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Privilege Escalation via Service ImagePath Modification (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Invoke-NinjaCopy script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Creation or Modification of Domain Backup DPAPI private key (eql)
  • ❌ Network Connection via MsXsl (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Kirbi File Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ UAC Bypass Attempt with IEditionUpgradeManager Elevated COM Interface (eql)
  • ❌ Group Policy Abuse for Privilege Addition (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ SolarWinds Process Disabling Services via Registry (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Network Activity (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Image Load (taskschd.dll) from MS Office (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Keylogging Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Print Spooler Point and Print DLL (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Potential Privileged Escalation via SamAccountName Spoofing (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via Windows Command Debugging Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Host Detected with Suspicious Windows Process(es) (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Searching for Saved Credentials via VaultCmd (eql)
  • ✅ Suspicious DLL Loaded for Persistence or Privilege Escalation (eql)
  • ❌ Creation or Modification of a new GPO Scheduled Task or Service (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Microsoft IIS Connection Strings Decryption (eql)
  • ❌ Mshta Making Network Connections (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Persistence via BITS Job Notify Cmdline (eql)
  • ✅ Mounting Hidden or WebDav Remote Shares (eql)
  • ✅ Suspicious Print Spooler File Deletion (eql)
  • ✅ Potential Remote Desktop Shadowing Activity (eql)
  • ❌ Potential Credential Access via Renamed COM+ Services DLL (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Installation of Custom Shim Databases (eql)
  • ✅ Microsoft Build Engine Started by an Office Application (eql)
  • ✅ Remote File Download via MpCmdRun (eql)
  • ❌ Unusual Network Connection via DllHost (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual File Modification by dns.exe (eql)
  • ✅ Suspicious Startup Shell Folder Modification (eql)
  • ✅ Disabling Windows Defender Security Settings via PowerShell (eql)
  • ❌ Potential PowerShell HackTool Script by Function Names (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ New ActiveSyncAllowedDeviceID Added via PowerShell (eql)
  • ✅ Execution from Unusual Directory - Command Line (eql)
  • ✅ Registry Persistence via AppInit DLL (eql)
  • ✅ Symbolic Link to Shadow Copy Created (eql)
  • ✅ Disabling User Account Control via Registry Modification (eql)
  • ✅ Clearing Windows Event Logs (eql)
  • ❌ Remote Windows Service Installed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privilege Escalation via Windir Environment Variable (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Service Command Lateral Movement (eql)
  • ❌ Modification of WDigest Security Provider (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Command Execution via SolarWinds Process (eql)
  • ❌ NTDS Dump via Wbadmin (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Volume Shadow Copy Deletion via PowerShell (eql)
  • ❌ Suspicious Windows Command Shell Arguments (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Code Signing Policy Modification Through Registry (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Service was Installed in the System (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Pass-the-Hash (PtH) Attempt (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network-Level Authentication (NLA) Disabled (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via Windows Subsystem for Linux (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Volume Shadow Copy Deletion via WMIC (eql)
  • ❌ Suspicious Execution from INET Cache (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Attempt to Install Kali Linux via WSL (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ NullSessionPipe Registry Modification (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Child Process from a System Virtual Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows User Calling the Metadata Service (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential privilege escalation via CVE-2022-38028 (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ KRBTGT Delegation Backdoor (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious .NET Reflection via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Subsystem for Linux Enabled via Dism Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Process Execution via Renamed PsExec Executable (eql)
  • ✅ Process Activity via Compiled HTML File (eql)
  • ✅ Connection to Commonly Abused Free SSL Certificate Providers (eql)
  • ❌ First Time Seen NewCredentials Logon Process (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Service Creation via Local Kerberos Authentication (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Kerberos Pre-authentication Disabled for User (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution of Persistent Suspicious Program (eql)
  • ❌ Unusual Execution via Microsoft Common Console File (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Service Control Spawned via Script Interpreter (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Installation of Security Support Provider (eql)
  • ❌ Host Files System Changes via Windows Subsystem for Linux (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Executable File Creation by a System Critical Process (eql)
  • ❌ Unusual Process Spawned by a Parent Process (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Script with Webcam Video Capture Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Kerberos Ticket Request (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Mimikatz Memssp Log File Detected (eql)
  • ✅ IIS HTTP Logging Disabled (eql)
  • ❌ Process Execution from an Unusual Directory (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ AdFind Command Activity (eql)
  • ❌ ImageLoad via Windows Update Auto Update Client (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Print Spooler Child Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Whoami Process Activity (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Child Processes of RunDLL32 (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ SIP Provider Modification (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ LSASS Memory Dump Creation (eql)
  • ❌ WMI Incoming Lateral Movement (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Remote Desktop File Opened from Suspicious Path (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Persistence via Microsoft Office AddIns (eql)
  • ❌ Sensitive Privilege SeEnableDelegationPrivilege assigned to a User (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Windows Script Executing PowerShell (eql)
  • ❌ Rare SMB Connection to the Internet (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Parent Process Detected with Suspicious Windows Process(es) (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Windows Firewall Disabled via PowerShell (eql)
  • ✅ Delete Volume USN Journal with Fsutil (eql)
  • ❌ Persistent Scripts in the Startup Directory (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Microsoft Exchange Worker Spawning Suspicious Processes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Modification of AmsiEnable Registry Key (eql)
  • ❌ Potential Active Directory Replication Account Backdoor (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Untrusted DLL Loaded by Azure AD Sync Service (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Browser Extension Install (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privileged Account Brute Force (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remote File Copy to a Hidden Share (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Suspicious Antimalware Scan Interface DLL (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network Connection via Registration Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass Attempt via Elevated COM Internet Explorer Add-On Installer (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential Application Shimming via Sdbinst (eql)
  • ✅ Suspicious CertUtil Commands (eql)
  • ❌ Svchost spawning Cmd (kuery)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ PowerShell Kerberos Ticket Dump (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Microsoft Windows Defender Tampering (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ MS Office Macro Security Registry Modifications (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Alternate Data Stream Creation/Execution at Volume Root Directory (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@tradebot-elastic
Copy link

tradebot-elastic commented Mar 21, 2025

⛔️ Tests failed:

Results
  • ✅ Potential Credential Access via Windows Utilities (eql)
  • ✅ System Shells via Services (eql)
  • ✅ Potential Cookies Theft via Browser Debugging (eql)
  • ❌ Potential Credential Access via DuplicateHandle in LSASS (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ High Number of Process and/or Service Terminations (kuery)
  • ❌ Potential Escalation via Vulnerable MSI Repair (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential DLL Side-Loading via Microsoft Antimalware Service Executable (eql)
  • ✅ Conhost Spawned By Suspicious Parent Process (eql)
  • ❌ Enumerating Domain Trusts via DSQUERY.EXE (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential Evasion via Filter Manager (eql)
  • ✅ Remote Desktop Enabled in Windows Firewall by Netsh (eql)
  • ❌ Local Account TokenFilter Policy Disabled (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ First Time Seen Removable Device (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Anomalous Windows Process Creation (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ User account exposed to Kerberoasting (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Attempt to Establish VScode Remote Tunnel (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Peripheral Device Discovery (eql)
  • ❌ MsBuild Making Network Connections (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Sensitive Audit Policy Sub-Category Disabled (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential LSASS Memory Dump via PssCaptureSnapShot (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential DLL Side-Loading via Trusted Microsoft Programs (eql)
  • ❌ UAC Bypass via Windows Firewall Snap-In Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Script with Token Impersonation Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ User Detected with Suspicious Windows Process(es) (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Lsass Process Access (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Exploitation of an Unquoted Service Path Vulnerability (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Cmd Execution via WMI (eql)
  • ✅ Persistence via Scheduled Job Creation (eql)
  • ❌ Potential Ransomware Behavior - High count of Readme files by System (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Persistence via Time Provider Modification (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Scheduled Task Execution at Scale via GPO (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Remote File Download via Desktopimgdownldr Utility (eql)
  • ❌ File Creation Time Changed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Startup/Logon Script added to Group Policy Object (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Username (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Service (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Powershell Script (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows User Privilege Elevation Activity (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Remote User (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Renamed Utility Executed with Short Program Name (eql)
  • ❌ Script Execution via Microsoft HTML Application (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution of COM object via Xwizard (eql)
  • ❌ User Account Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming Execution via WinRM Remote Shell (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remote File Download via Script Interpreter (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ PowerShell Script with Encryption/Decryption Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass via DiskCleanup Scheduled Task Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution of File Written or Modified by PDF Reader (eql)
  • ❌ Creation of a DNS-Named Record (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Antimalware Scan Interface Bypass via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Network Activity from a Windows System Binary (eql)
  • ✅ Suspicious .NET Code Compilation (eql)
  • ✅ Creation or Modification of Root Certificate (eql)
  • ❌ Werfault ReflectDebugger Persistence (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ LSASS Memory Dump Handle Access (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Full User-Mode Dumps Enabled System-Wide (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Lateral Movement via Startup Folder (eql)
  • ❌ Potential PowerShell HackTool Script by Author (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Relay Attack against a Domain Controller (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Persistence via Update Orchestrator Service Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming Execution via PowerShell Remoting (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Account Password Reset Remotely (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Account Discovery Command via SYSTEM Account (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass Attempt via Windows Directory Masquerading (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Enumeration of Privileged Local Groups Membership (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Adobe Hijack Persistence (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Windows Defender Exclusions Added via PowerShell (eql)
  • ✅ Suspicious Microsoft Diagnostics Wizard Execution (eql)
  • ❌ Potential Foxmail Exploitation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Command and Scripting Interpreter via Windows Scripts (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Process Access via Direct System Call (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Wireless Credential Dumping using Netsh Command (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential File Transfer via Curl for Windows (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Renamed AutoIt Scripts Interpreter (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Process Injection via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Creation of a Hidden Local User Account (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Script with Audio Capture Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Windows Defender Disabled via Registry Modification (eql)
  • ❌ Bypass UAC via Event Viewer (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Program Files Directory Masquerading (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious MS Outlook Child Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Port Forwarding Rule Addition (eql)
  • ✅ Unusual Parent-Child Relationship (eql)
  • ✅ Suspicious ImagePath Service Creation (eql)
  • ✅ Persistence via Microsoft Outlook VBA (eql)
  • ✅ Potential DNS Tunneling via NsLookup (eql)
  • ❌ WDAC Policy File by an Unusual Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Parent Process for cmd.exe (eql)
  • ✅ NTDS or SAM Database File Copied (eql)
  • ❌ ScreenConnect Server Spawning Suspicious Processes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Execution via Windows Subsystem for Linux (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privilege Escalation via Named Pipe Impersonation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Process Creation CallTrace (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Command Execution via ForFiles (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Process Spawned by a User (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Persistence via Services Registry (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Control Panel Process with Unusual Arguments (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Process Creation via Secondary Logon (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Startup Persistence by a Suspicious Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Windows Path Activity (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Multiple Vault Web Credentials Read (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Event Logs Cleared (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Encrypting Files with WinRar or 7z (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Adding Hidden File Attribute via Attrib (eql)
  • ✅ Potential Local NTLM Relay via HTTP (eql)
  • ❌ Suspicious Remote Registry Access via SeBackupPrivilege (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Microsoft Exchange Server UM Spawning Suspicious Processes (eql)
  • ❌ Multiple Logon Failure from the same Source Address (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Disable Windows Firewall Rules via Netsh (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Process Execution Path - Alternate Data Stream (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Share Enumeration Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Disable Windows Event and Security Logs Using Built-in Tools (eql)
  • ❌ Multiple Logon Failure Followed by Logon Success (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution via MSSQL xp_cmdshell Stored Procedure (eql)
  • ❌ Suspicious Script Object Execution (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via TSClient Mountpoint (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Registry Persistence via AppCert DLL (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Service DACL Modification via sc.exe (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming DCOM Lateral Movement with MMC (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Network Connection via RunDLL32 (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious PDF Reader Child Process (eql)
  • ❌ Uncommon Registry Persistence Change (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Exchange Mailbox Export via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Network Logon Provider Registry Modification (eql)
  • ❌ Windows Service Installed via an Unusual Client (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PsExec Network Connection (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Process Spawned by a Host (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows CryptoAPI Spoofing Vulnerability (CVE-2020-0601 - CurveBall) (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell PSReflect Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell MiniDump Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ DNS Global Query Block List Modified or Disabled (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Deleting Backup Catalogs with Wbadmin (eql)
  • ✅ RDP Enabled via Registry (eql)
  • ❌ UAC Bypass Attempt via Privileged IFileOperation COM Interface (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Secure File Deletion via SDelete Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious PrintSpooler Service Executable File Creation (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Script with Veeam Credential Access Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ FirstTime Seen Account Performing DCSync (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Outbound Scheduled Task Activity via PowerShell (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ User Added to Privileged Group (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Persistence via PowerShell profile (eql)
  • ✅ Suspicious Execution via Scheduled Task (eql)
  • ❌ Unsigned DLL loaded by DNS Service (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential File Download via a Headless Browser (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Process Network Connection (eql)
  • ❌ Interactive Logon by an Unusual Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Discovery Related Windows API Functions (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ AdminSDHolder SDProp Exclusion Added (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming DCOM Lateral Movement via MSHTA (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Account Configured with Never-Expiring Password (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network Connection via Signed Binary (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ MsiExec Service Child Process With Network Connection (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ WebServer Access Logs Deleted (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Modification of the msPKIAccountCredentials (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Image File Execution Options Injection (eql)
  • ✅ Persistence via TelemetryController Scheduled Task Hijack (eql)
  • ❌ Scheduled Task Created by a Windows Script (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Access to LDAP Attributes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass via ICMLuaUtil Elevated COM Interface (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Modification of Boot Configuration (eql)
  • ✅ Unusual Service Host Child Process - Childless Service (eql)
  • ✅ Exporting Exchange Mailbox via PowerShell (eql)
  • ❌ Remote Computer Account DnsHostName Update (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Microsoft Exchange Server UM Writing Suspicious Files (eql)
  • ❌ Unusual Process For a Windows Host (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ First Time Seen Commonly Abused Remote Access Tool Execution (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Anomalous Process For a Windows Population (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ AdminSDHolder Backdoor (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Windows Error Manager Masquerading (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Active Directory Group Modification by SYSTEM (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual File Creation - Alternate Data Stream (eql)
  • ✅ Suspicious RDP ActiveX Client Loaded (eql)
  • ❌ Suspicious JetBrains TeamCity Child Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Modification of Accessibility Binaries (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Access to a Sensitive LDAP Attribute (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privilege Escalation via Rogue Named Pipe Impersonation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential Remote Desktop Tunneling Detected (eql)
  • ✅ Enumeration Command Spawned via WMIPrvSE (eql)
  • ❌ Suspicious ScreenConnect Client Child Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential File Transfer via Certreq (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Shadow Credentials added to AD Object (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious LSASS Access via MalSecLogon (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Microsoft Management Console File from Unusual Path (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ File with Right-to-Left Override Character (RTLO) Created/Executed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious WMIC XSL Script Execution (eql)
  • ❌ Potential PowerShell Obfuscated Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ PowerShell Script Block Logging Disabled (eql)
  • ❌ PowerShell Suspicious Payload Encoded and Compressed (kuery)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Temporarily Scheduled Task Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Windows Powershell Arguments (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Enumerating Domain Trusts via NLTEST.EXE (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Enumeration of Administrator Accounts (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Suspicious WMI Image Load from MS Office (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential WPAD Spoofing via DNS Record Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Command Prompt Network Connection (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Execution from a Mounted Device (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Executable File Creation with Multiple Extensions (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Enable Host Network Discovery via Netsh (eql)
  • ✅ Unusual Child Process of dns.exe (eql)
  • ❌ Potential WSUS Abuse for Lateral Movement (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential ADIDNS Poisoning via Wildcard Record Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming DCOM Lateral Movement with ShellBrowserWindow or ShellWindows (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Script with Clipboard Retrieval Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ A scheduled task was created (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Evasion via Windows Filtering Platform (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Encoded Executable Stored in the Registry (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Group Policy Discovery via Microsoft GPResult Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential PowerShell Pass-the-Hash/Relay Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remote Scheduled Task Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Script with Screenshot Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ SeDebugPrivilege Enabled by a Suspicious Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Zoom Child Process (eql)
  • ❌ Machine Learning Detected a Suspicious Windows Event with a High Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Credential Access via LSASS Memory Dump (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Explorer Child Process (eql)
  • ✅ Scheduled Tasks AT Command Enabled (eql)
  • ✅ Persistence via WMI Event Subscription (eql)
  • ✅ Hosts File Modified (eql)
  • ❌ Remote Scheduled Task Creation via RPC (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Command Shell Activity Started via RunDLL32 (eql)
  • ✅ Microsoft Build Engine Started by a Script Process (kuery)
  • ✅ Microsoft Build Engine Started by a System Process (eql)
  • ✅ Microsoft Build Engine Using an Alternate Name (eql)
  • ✅ Potential Credential Access via Trusted Developer Utility (eql)
  • ✅ Microsoft Build Engine Started an Unusual Process (kuery)
  • ❌ Process Injection by the Microsoft Build Engine (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Credential Access via DCSync (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ A scheduled task was updated (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ InstallUtil Process Making Network Connections (eql)
  • ❌ Potential LSASS Clone Creation via PssCaptureSnapShot (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Subsystem for Linux Distribution Installed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ DNS-over-HTTPS Enabled via Registry (eql)
  • ❌ PowerShell Mailbox Collection Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via local SxS Shared Module (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious MS Office Child Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Credential Acquisition via Registry Hive Dumping (eql)
  • ❌ Persistence via Hidden Run Key Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remotely Started Services via RPC (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Process Calling the Metadata Service (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious WerFault Child Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Outlook Home Page Registry Modification (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ WPS Office Exploitation via DLL Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Invoke-Mimikatz PowerShell Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Managed Code Hosting Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Signed Proxy Execution via MS Work Folders (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Suspicious Portable Executable Encoded in Powershell Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Execution via Microsoft Office Add-Ins (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Local Scheduled Task Creation (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Netsh Helper DLL (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network Connection via Compiled HTML File (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Endpoint Security Parent Process (eql)
  • ❌ Code Signing Policy Modification Through Built-in tools (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Clearing Windows Console History (eql)
  • ❌ Volume Shadow Copy Deleted or Resized via VssAdmin (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Script Interpreter Executing Process via WMI (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Potential Veeam Credential Access Command (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Privilege Escalation via Service ImagePath Modification (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Invoke-NinjaCopy script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Creation or Modification of Domain Backup DPAPI private key (eql)
  • ❌ Network Connection via MsXsl (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Kirbi File Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ UAC Bypass Attempt with IEditionUpgradeManager Elevated COM Interface (eql)
  • ❌ Group Policy Abuse for Privilege Addition (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ SolarWinds Process Disabling Services via Registry (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Network Activity (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Image Load (taskschd.dll) from MS Office (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Keylogging Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Print Spooler Point and Print DLL (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Potential Privileged Escalation via SamAccountName Spoofing (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via Windows Command Debugging Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Host Detected with Suspicious Windows Process(es) (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Searching for Saved Credentials via VaultCmd (eql)
  • ✅ Suspicious DLL Loaded for Persistence or Privilege Escalation (eql)
  • ❌ Creation or Modification of a new GPO Scheduled Task or Service (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Microsoft IIS Connection Strings Decryption (eql)
  • ❌ Mshta Making Network Connections (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Persistence via BITS Job Notify Cmdline (eql)
  • ✅ Mounting Hidden or WebDav Remote Shares (eql)
  • ✅ Suspicious Print Spooler File Deletion (eql)
  • ✅ Potential Remote Desktop Shadowing Activity (eql)
  • ❌ Potential Credential Access via Renamed COM+ Services DLL (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Installation of Custom Shim Databases (eql)
  • ✅ Microsoft Build Engine Started by an Office Application (eql)
  • ✅ Remote File Download via MpCmdRun (eql)
  • ❌ Unusual Network Connection via DllHost (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual File Modification by dns.exe (eql)
  • ✅ Suspicious Startup Shell Folder Modification (eql)
  • ✅ Disabling Windows Defender Security Settings via PowerShell (eql)
  • ❌ Potential PowerShell HackTool Script by Function Names (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ New ActiveSyncAllowedDeviceID Added via PowerShell (eql)
  • ✅ Execution from Unusual Directory - Command Line (eql)
  • ✅ Registry Persistence via AppInit DLL (eql)
  • ✅ Symbolic Link to Shadow Copy Created (eql)
  • ✅ Disabling User Account Control via Registry Modification (eql)
  • ✅ Clearing Windows Event Logs (eql)
  • ❌ Remote Windows Service Installed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privilege Escalation via Windir Environment Variable (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Service Command Lateral Movement (eql)
  • ❌ Modification of WDigest Security Provider (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Command Execution via SolarWinds Process (eql)
  • ❌ NTDS Dump via Wbadmin (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Volume Shadow Copy Deletion via PowerShell (eql)
  • ❌ Suspicious Windows Command Shell Arguments (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Code Signing Policy Modification Through Registry (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Service was Installed in the System (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Pass-the-Hash (PtH) Attempt (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network-Level Authentication (NLA) Disabled (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via Windows Subsystem for Linux (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Volume Shadow Copy Deletion via WMIC (eql)
  • ❌ Suspicious Execution from INET Cache (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Attempt to Install Kali Linux via WSL (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ NullSessionPipe Registry Modification (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Child Process from a System Virtual Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows User Calling the Metadata Service (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential privilege escalation via CVE-2022-38028 (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ KRBTGT Delegation Backdoor (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious .NET Reflection via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Subsystem for Linux Enabled via Dism Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Process Execution via Renamed PsExec Executable (eql)
  • ✅ Process Activity via Compiled HTML File (eql)
  • ✅ Connection to Commonly Abused Free SSL Certificate Providers (eql)
  • ❌ First Time Seen NewCredentials Logon Process (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Service Creation via Local Kerberos Authentication (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Kerberos Pre-authentication Disabled for User (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution of Persistent Suspicious Program (eql)
  • ❌ Unusual Execution via Microsoft Common Console File (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Service Control Spawned via Script Interpreter (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Installation of Security Support Provider (eql)
  • ❌ Host Files System Changes via Windows Subsystem for Linux (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Executable File Creation by a System Critical Process (eql)
  • ❌ Unusual Process Spawned by a Parent Process (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Script with Webcam Video Capture Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Kerberos Ticket Request (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Mimikatz Memssp Log File Detected (eql)
  • ✅ IIS HTTP Logging Disabled (eql)
  • ❌ Process Execution from an Unusual Directory (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ AdFind Command Activity (eql)
  • ❌ ImageLoad via Windows Update Auto Update Client (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Print Spooler Child Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Whoami Process Activity (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Child Processes of RunDLL32 (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ SIP Provider Modification (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ LSASS Memory Dump Creation (eql)
  • ❌ WMI Incoming Lateral Movement (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Remote Desktop File Opened from Suspicious Path (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Persistence via Microsoft Office AddIns (eql)
  • ❌ Sensitive Privilege SeEnableDelegationPrivilege assigned to a User (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Windows Script Executing PowerShell (eql)
  • ❌ Rare SMB Connection to the Internet (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Parent Process Detected with Suspicious Windows Process(es) (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Windows Firewall Disabled via PowerShell (eql)
  • ✅ Delete Volume USN Journal with Fsutil (eql)
  • ❌ Persistent Scripts in the Startup Directory (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Microsoft Exchange Worker Spawning Suspicious Processes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Modification of AmsiEnable Registry Key (eql)
  • ❌ Potential Active Directory Replication Account Backdoor (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Untrusted DLL Loaded by Azure AD Sync Service (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Browser Extension Install (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privileged Account Brute Force (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remote File Copy to a Hidden Share (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Suspicious Antimalware Scan Interface DLL (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network Connection via Registration Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass Attempt via Elevated COM Internet Explorer Add-On Installer (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential Application Shimming via Sdbinst (eql)
  • ✅ Suspicious CertUtil Commands (eql)
  • ❌ Svchost spawning Cmd (kuery)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ PowerShell Kerberos Ticket Dump (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Microsoft Windows Defender Tampering (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ MS Office Macro Security Registry Modifications (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Alternate Data Stream Creation/Execution at Volume Root Directory (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@elastic elastic deleted a comment from tradebot-elastic Mar 21, 2025
@elastic elastic deleted a comment from tradebot-elastic Mar 21, 2025
@tradebot-elastic
Copy link

tradebot-elastic commented Mar 24, 2025

⛔️ Tests failed:

Results
  • ✅ Potential Credential Access via Windows Utilities (eql)
  • ✅ System Shells via Services (eql)
  • ✅ Potential Cookies Theft via Browser Debugging (eql)
  • ❌ Potential Credential Access via DuplicateHandle in LSASS (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ High Number of Process and/or Service Terminations (kuery)
  • ❌ Potential Escalation via Vulnerable MSI Repair (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential DLL Side-Loading via Microsoft Antimalware Service Executable (eql)
  • ✅ Conhost Spawned By Suspicious Parent Process (eql)
  • ❌ Enumerating Domain Trusts via DSQUERY.EXE (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential Evasion via Filter Manager (eql)
  • ✅ Remote Desktop Enabled in Windows Firewall by Netsh (eql)
  • ❌ Local Account TokenFilter Policy Disabled (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ First Time Seen Removable Device (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Anomalous Windows Process Creation (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ User account exposed to Kerberoasting (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Attempt to Establish VScode Remote Tunnel (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Peripheral Device Discovery (eql)
  • ❌ MsBuild Making Network Connections (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Sensitive Audit Policy Sub-Category Disabled (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential LSASS Memory Dump via PssCaptureSnapShot (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential DLL Side-Loading via Trusted Microsoft Programs (eql)
  • ❌ UAC Bypass via Windows Firewall Snap-In Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Script with Token Impersonation Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ User Detected with Suspicious Windows Process(es) (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Lsass Process Access (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Exploitation of an Unquoted Service Path Vulnerability (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Cmd Execution via WMI (eql)
  • ✅ Persistence via Scheduled Job Creation (eql)
  • ❌ Potential Ransomware Behavior - High count of Readme files by System (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Persistence via Time Provider Modification (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Scheduled Task Execution at Scale via GPO (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Remote File Download via Desktopimgdownldr Utility (eql)
  • ❌ File Creation Time Changed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Startup/Logon Script added to Group Policy Object (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Username (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Service (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Powershell Script (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows User Privilege Elevation Activity (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Remote User (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Renamed Utility Executed with Short Program Name (eql)
  • ❌ Script Execution via Microsoft HTML Application (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution of COM object via Xwizard (eql)
  • ❌ User Account Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming Execution via WinRM Remote Shell (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remote File Download via Script Interpreter (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ PowerShell Script with Encryption/Decryption Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass via DiskCleanup Scheduled Task Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution of File Written or Modified by PDF Reader (eql)
  • ❌ Creation of a DNS-Named Record (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Antimalware Scan Interface Bypass via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Network Activity from a Windows System Binary (eql)
  • ✅ Suspicious .NET Code Compilation (eql)
  • ✅ Creation or Modification of Root Certificate (eql)
  • ❌ Werfault ReflectDebugger Persistence (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ LSASS Memory Dump Handle Access (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Full User-Mode Dumps Enabled System-Wide (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Lateral Movement via Startup Folder (eql)
  • ❌ Potential PowerShell HackTool Script by Author (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Relay Attack against a Domain Controller (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Persistence via Update Orchestrator Service Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming Execution via PowerShell Remoting (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Account Password Reset Remotely (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Account Discovery Command via SYSTEM Account (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass Attempt via Windows Directory Masquerading (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Enumeration of Privileged Local Groups Membership (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Adobe Hijack Persistence (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Windows Defender Exclusions Added via PowerShell (eql)
  • ✅ Suspicious Microsoft Diagnostics Wizard Execution (eql)
  • ❌ Potential Foxmail Exploitation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Command and Scripting Interpreter via Windows Scripts (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Process Access via Direct System Call (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Wireless Credential Dumping using Netsh Command (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential File Transfer via Curl for Windows (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Renamed AutoIt Scripts Interpreter (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Process Injection via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Creation of a Hidden Local User Account (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Script with Audio Capture Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Windows Defender Disabled via Registry Modification (eql)
  • ❌ Bypass UAC via Event Viewer (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Program Files Directory Masquerading (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious MS Outlook Child Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Port Forwarding Rule Addition (eql)
  • ✅ Unusual Parent-Child Relationship (eql)
  • ✅ Suspicious ImagePath Service Creation (eql)
  • ✅ Persistence via Microsoft Outlook VBA (eql)
  • ✅ Potential DNS Tunneling via NsLookup (eql)
  • ❌ WDAC Policy File by an Unusual Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Parent Process for cmd.exe (eql)
  • ✅ NTDS or SAM Database File Copied (eql)
  • ❌ ScreenConnect Server Spawning Suspicious Processes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Execution via Windows Subsystem for Linux (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privilege Escalation via Named Pipe Impersonation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Process Creation CallTrace (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Command Execution via ForFiles (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Process Spawned by a User (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Persistence via Services Registry (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Control Panel Process with Unusual Arguments (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Process Creation via Secondary Logon (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Startup Persistence by a Suspicious Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Windows Path Activity (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Multiple Vault Web Credentials Read (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Event Logs Cleared (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Encrypting Files with WinRar or 7z (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Adding Hidden File Attribute via Attrib (eql)
  • ✅ Potential Local NTLM Relay via HTTP (eql)
  • ❌ Suspicious Remote Registry Access via SeBackupPrivilege (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Microsoft Exchange Server UM Spawning Suspicious Processes (eql)
  • ❌ Multiple Logon Failure from the same Source Address (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Disable Windows Firewall Rules via Netsh (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Process Execution Path - Alternate Data Stream (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Share Enumeration Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Disable Windows Event and Security Logs Using Built-in Tools (eql)
  • ❌ Multiple Logon Failure Followed by Logon Success (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution via MSSQL xp_cmdshell Stored Procedure (eql)
  • ❌ Suspicious Script Object Execution (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via TSClient Mountpoint (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Registry Persistence via AppCert DLL (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Service DACL Modification via sc.exe (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming DCOM Lateral Movement with MMC (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Network Connection via RunDLL32 (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious PDF Reader Child Process (eql)
  • ❌ Uncommon Registry Persistence Change (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Exchange Mailbox Export via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Network Logon Provider Registry Modification (eql)
  • ❌ Windows Service Installed via an Unusual Client (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PsExec Network Connection (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Process Spawned by a Host (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows CryptoAPI Spoofing Vulnerability (CVE-2020-0601 - CurveBall) (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell PSReflect Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell MiniDump Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ DNS Global Query Block List Modified or Disabled (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Deleting Backup Catalogs with Wbadmin (eql)
  • ✅ RDP Enabled via Registry (eql)
  • ❌ UAC Bypass Attempt via Privileged IFileOperation COM Interface (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Secure File Deletion via SDelete Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious PrintSpooler Service Executable File Creation (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Script with Veeam Credential Access Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ FirstTime Seen Account Performing DCSync (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Outbound Scheduled Task Activity via PowerShell (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ User Added to Privileged Group (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Persistence via PowerShell profile (eql)
  • ✅ Suspicious Execution via Scheduled Task (eql)
  • ❌ Unsigned DLL loaded by DNS Service (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential File Download via a Headless Browser (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Process Network Connection (eql)
  • ❌ Interactive Logon by an Unusual Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Discovery Related Windows API Functions (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ AdminSDHolder SDProp Exclusion Added (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming DCOM Lateral Movement via MSHTA (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Account Configured with Never-Expiring Password (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network Connection via Signed Binary (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ MsiExec Service Child Process With Network Connection (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ WebServer Access Logs Deleted (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Modification of the msPKIAccountCredentials (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Image File Execution Options Injection (eql)
  • ✅ Persistence via TelemetryController Scheduled Task Hijack (eql)
  • ❌ Scheduled Task Created by a Windows Script (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Access to LDAP Attributes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass via ICMLuaUtil Elevated COM Interface (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Modification of Boot Configuration (eql)
  • ✅ Unusual Service Host Child Process - Childless Service (eql)
  • ✅ Exporting Exchange Mailbox via PowerShell (eql)
  • ❌ Remote Computer Account DnsHostName Update (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Microsoft Exchange Server UM Writing Suspicious Files (eql)
  • ❌ Unusual Process For a Windows Host (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ First Time Seen Commonly Abused Remote Access Tool Execution (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Anomalous Process For a Windows Population (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ AdminSDHolder Backdoor (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Windows Error Manager Masquerading (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Active Directory Group Modification by SYSTEM (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual File Creation - Alternate Data Stream (eql)
  • ✅ Suspicious RDP ActiveX Client Loaded (eql)
  • ❌ Suspicious JetBrains TeamCity Child Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Modification of Accessibility Binaries (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Access to a Sensitive LDAP Attribute (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privilege Escalation via Rogue Named Pipe Impersonation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential Remote Desktop Tunneling Detected (eql)
  • ✅ Enumeration Command Spawned via WMIPrvSE (eql)
  • ❌ Suspicious ScreenConnect Client Child Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential File Transfer via Certreq (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Shadow Credentials added to AD Object (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious LSASS Access via MalSecLogon (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Microsoft Management Console File from Unusual Path (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ File with Right-to-Left Override Character (RTLO) Created/Executed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious WMIC XSL Script Execution (eql)
  • ❌ Potential PowerShell Obfuscated Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ PowerShell Script Block Logging Disabled (eql)
  • ❌ PowerShell Suspicious Payload Encoded and Compressed (kuery)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Temporarily Scheduled Task Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Windows Powershell Arguments (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Enumerating Domain Trusts via NLTEST.EXE (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Enumeration of Administrator Accounts (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Suspicious WMI Image Load from MS Office (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential WPAD Spoofing via DNS Record Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Command Prompt Network Connection (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Execution from a Mounted Device (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Executable File Creation with Multiple Extensions (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Enable Host Network Discovery via Netsh (eql)
  • ✅ Unusual Child Process of dns.exe (eql)
  • ❌ Potential WSUS Abuse for Lateral Movement (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential ADIDNS Poisoning via Wildcard Record Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming DCOM Lateral Movement with ShellBrowserWindow or ShellWindows (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Script with Clipboard Retrieval Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ A scheduled task was created (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Evasion via Windows Filtering Platform (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Encoded Executable Stored in the Registry (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Group Policy Discovery via Microsoft GPResult Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential PowerShell Pass-the-Hash/Relay Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remote Scheduled Task Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Script with Screenshot Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ SeDebugPrivilege Enabled by a Suspicious Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Zoom Child Process (eql)
  • ❌ Machine Learning Detected a Suspicious Windows Event with a High Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Credential Access via LSASS Memory Dump (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Explorer Child Process (eql)
  • ✅ Scheduled Tasks AT Command Enabled (eql)
  • ✅ Persistence via WMI Event Subscription (eql)
  • ✅ Hosts File Modified (eql)
  • ❌ Remote Scheduled Task Creation via RPC (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Command Shell Activity Started via RunDLL32 (eql)
  • ✅ Microsoft Build Engine Started by a Script Process (kuery)
  • ✅ Microsoft Build Engine Started by a System Process (eql)
  • ✅ Microsoft Build Engine Using an Alternate Name (eql)
  • ✅ Potential Credential Access via Trusted Developer Utility (eql)
  • ✅ Microsoft Build Engine Started an Unusual Process (kuery)
  • ❌ Process Injection by the Microsoft Build Engine (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Credential Access via DCSync (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ A scheduled task was updated (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ InstallUtil Process Making Network Connections (eql)
  • ❌ Potential LSASS Clone Creation via PssCaptureSnapShot (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Subsystem for Linux Distribution Installed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ DNS-over-HTTPS Enabled via Registry (eql)
  • ❌ PowerShell Mailbox Collection Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via local SxS Shared Module (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious MS Office Child Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Credential Acquisition via Registry Hive Dumping (eql)
  • ❌ Persistence via Hidden Run Key Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remotely Started Services via RPC (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Process Calling the Metadata Service (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious WerFault Child Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Outlook Home Page Registry Modification (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ WPS Office Exploitation via DLL Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Invoke-Mimikatz PowerShell Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Managed Code Hosting Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Signed Proxy Execution via MS Work Folders (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Suspicious Portable Executable Encoded in Powershell Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Execution via Microsoft Office Add-Ins (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Local Scheduled Task Creation (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Netsh Helper DLL (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network Connection via Compiled HTML File (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Endpoint Security Parent Process (eql)
  • ❌ Code Signing Policy Modification Through Built-in tools (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Clearing Windows Console History (eql)
  • ❌ Volume Shadow Copy Deleted or Resized via VssAdmin (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Script Interpreter Executing Process via WMI (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Potential Veeam Credential Access Command (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Privilege Escalation via Service ImagePath Modification (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Invoke-NinjaCopy script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Creation or Modification of Domain Backup DPAPI private key (eql)
  • ❌ Network Connection via MsXsl (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Kirbi File Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ UAC Bypass Attempt with IEditionUpgradeManager Elevated COM Interface (eql)
  • ❌ Group Policy Abuse for Privilege Addition (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ SolarWinds Process Disabling Services via Registry (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Network Activity (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Image Load (taskschd.dll) from MS Office (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Keylogging Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Print Spooler Point and Print DLL (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Potential Privileged Escalation via SamAccountName Spoofing (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via Windows Command Debugging Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Host Detected with Suspicious Windows Process(es) (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Searching for Saved Credentials via VaultCmd (eql)
  • ✅ Suspicious DLL Loaded for Persistence or Privilege Escalation (eql)
  • ❌ Creation or Modification of a new GPO Scheduled Task or Service (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Microsoft IIS Connection Strings Decryption (eql)
  • ❌ Mshta Making Network Connections (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Persistence via BITS Job Notify Cmdline (eql)
  • ✅ Mounting Hidden or WebDav Remote Shares (eql)
  • ✅ Suspicious Print Spooler File Deletion (eql)
  • ✅ Potential Remote Desktop Shadowing Activity (eql)
  • ❌ Potential Credential Access via Renamed COM+ Services DLL (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Installation of Custom Shim Databases (eql)
  • ✅ Microsoft Build Engine Started by an Office Application (eql)
  • ✅ Remote File Download via MpCmdRun (eql)
  • ❌ Unusual Network Connection via DllHost (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual File Modification by dns.exe (eql)
  • ✅ Suspicious Startup Shell Folder Modification (eql)
  • ✅ Disabling Windows Defender Security Settings via PowerShell (eql)
  • ❌ Potential PowerShell HackTool Script by Function Names (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ New ActiveSyncAllowedDeviceID Added via PowerShell (eql)
  • ✅ Execution from Unusual Directory - Command Line (eql)
  • ✅ Registry Persistence via AppInit DLL (eql)
  • ✅ Symbolic Link to Shadow Copy Created (eql)
  • ✅ Disabling User Account Control via Registry Modification (eql)
  • ✅ Clearing Windows Event Logs (eql)
  • ❌ Remote Windows Service Installed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privilege Escalation via Windir Environment Variable (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Service Command Lateral Movement (eql)
  • ❌ Modification of WDigest Security Provider (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Command Execution via SolarWinds Process (eql)
  • ❌ NTDS Dump via Wbadmin (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Volume Shadow Copy Deletion via PowerShell (eql)
  • ❌ Suspicious Windows Command Shell Arguments (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Code Signing Policy Modification Through Registry (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Service was Installed in the System (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Pass-the-Hash (PtH) Attempt (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network-Level Authentication (NLA) Disabled (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via Windows Subsystem for Linux (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Volume Shadow Copy Deletion via WMIC (eql)
  • ❌ Suspicious Execution from INET Cache (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Attempt to Install Kali Linux via WSL (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ NullSessionPipe Registry Modification (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Child Process from a System Virtual Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows User Calling the Metadata Service (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential privilege escalation via CVE-2022-38028 (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ KRBTGT Delegation Backdoor (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious .NET Reflection via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Subsystem for Linux Enabled via Dism Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Process Execution via Renamed PsExec Executable (eql)
  • ✅ Process Activity via Compiled HTML File (eql)
  • ✅ Connection to Commonly Abused Free SSL Certificate Providers (eql)
  • ❌ First Time Seen NewCredentials Logon Process (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Service Creation via Local Kerberos Authentication (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Kerberos Pre-authentication Disabled for User (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution of Persistent Suspicious Program (eql)
  • ❌ Unusual Execution via Microsoft Common Console File (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Service Control Spawned via Script Interpreter (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Installation of Security Support Provider (eql)
  • ❌ Host Files System Changes via Windows Subsystem for Linux (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Executable File Creation by a System Critical Process (eql)
  • ❌ Unusual Process Spawned by a Parent Process (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Script with Webcam Video Capture Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Kerberos Ticket Request (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Mimikatz Memssp Log File Detected (eql)
  • ✅ IIS HTTP Logging Disabled (eql)
  • ❌ Process Execution from an Unusual Directory (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ AdFind Command Activity (eql)
  • ❌ ImageLoad via Windows Update Auto Update Client (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Print Spooler Child Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Whoami Process Activity (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Child Processes of RunDLL32 (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ SIP Provider Modification (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ LSASS Memory Dump Creation (eql)
  • ❌ WMI Incoming Lateral Movement (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Remote Desktop File Opened from Suspicious Path (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Persistence via Microsoft Office AddIns (eql)
  • ❌ Sensitive Privilege SeEnableDelegationPrivilege assigned to a User (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Windows Script Executing PowerShell (eql)
  • ❌ Rare SMB Connection to the Internet (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Parent Process Detected with Suspicious Windows Process(es) (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Windows Firewall Disabled via PowerShell (eql)
  • ✅ Delete Volume USN Journal with Fsutil (eql)
  • ❌ Persistent Scripts in the Startup Directory (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Microsoft Exchange Worker Spawning Suspicious Processes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Modification of AmsiEnable Registry Key (eql)
  • ❌ Potential Active Directory Replication Account Backdoor (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Untrusted DLL Loaded by Azure AD Sync Service (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Browser Extension Install (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privileged Account Brute Force (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remote File Copy to a Hidden Share (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Suspicious Antimalware Scan Interface DLL (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network Connection via Registration Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass Attempt via Elevated COM Internet Explorer Add-On Installer (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential Application Shimming via Sdbinst (eql)
  • ✅ Suspicious CertUtil Commands (eql)
  • ❌ Svchost spawning Cmd (kuery)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ PowerShell Kerberos Ticket Dump (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Microsoft Windows Defender Tampering (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ MS Office Macro Security Registry Modifications (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Alternate Data Stream Creation/Execution at Volume Root Directory (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@tradebot-elastic
Copy link

tradebot-elastic commented Mar 24, 2025

⛔️ Test failed

Results
  • ✅ Potential Credential Access via Windows Utilities (eql)
  • ✅ System Shells via Services (eql)
  • ✅ Potential Cookies Theft via Browser Debugging (eql)
  • ❌ Potential Credential Access via DuplicateHandle in LSASS (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ High Number of Process and/or Service Terminations (kuery)
  • ❌ Potential Escalation via Vulnerable MSI Repair (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential DLL Side-Loading via Microsoft Antimalware Service Executable (eql)
  • ✅ Conhost Spawned By Suspicious Parent Process (eql)
  • ❌ Enumerating Domain Trusts via DSQUERY.EXE (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential Evasion via Filter Manager (eql)
  • ✅ Remote Desktop Enabled in Windows Firewall by Netsh (eql)
  • ❌ Local Account TokenFilter Policy Disabled (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ First Time Seen Removable Device (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Anomalous Windows Process Creation (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ User account exposed to Kerberoasting (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Attempt to Establish VScode Remote Tunnel (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Peripheral Device Discovery (eql)
  • ❌ MsBuild Making Network Connections (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Sensitive Audit Policy Sub-Category Disabled (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential LSASS Memory Dump via PssCaptureSnapShot (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential DLL Side-Loading via Trusted Microsoft Programs (eql)
  • ❌ UAC Bypass via Windows Firewall Snap-In Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Script with Token Impersonation Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ User Detected with Suspicious Windows Process(es) (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Lsass Process Access (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Exploitation of an Unquoted Service Path Vulnerability (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Cmd Execution via WMI (eql)
  • ✅ Persistence via Scheduled Job Creation (eql)
  • ❌ Potential Ransomware Behavior - High count of Readme files by System (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Persistence via Time Provider Modification (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Scheduled Task Execution at Scale via GPO (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Remote File Download via Desktopimgdownldr Utility (eql)
  • ❌ File Creation Time Changed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Startup/Logon Script added to Group Policy Object (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Username (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Service (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Powershell Script (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows User Privilege Elevation Activity (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Remote User (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Renamed Utility Executed with Short Program Name (eql)
  • ❌ Script Execution via Microsoft HTML Application (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution of COM object via Xwizard (eql)
  • ❌ User Account Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming Execution via WinRM Remote Shell (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remote File Download via Script Interpreter (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ PowerShell Script with Encryption/Decryption Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass via DiskCleanup Scheduled Task Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution of File Written or Modified by PDF Reader (eql)
  • ❌ Creation of a DNS-Named Record (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Antimalware Scan Interface Bypass via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Network Activity from a Windows System Binary (eql)
  • ✅ Suspicious .NET Code Compilation (eql)
  • ✅ Creation or Modification of Root Certificate (eql)
  • ❌ Werfault ReflectDebugger Persistence (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ LSASS Memory Dump Handle Access (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Full User-Mode Dumps Enabled System-Wide (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Lateral Movement via Startup Folder (eql)
  • ❌ Potential PowerShell HackTool Script by Author (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Relay Attack against a Domain Controller (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Persistence via Update Orchestrator Service Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming Execution via PowerShell Remoting (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Account Password Reset Remotely (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Account Discovery Command via SYSTEM Account (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass Attempt via Windows Directory Masquerading (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Enumeration of Privileged Local Groups Membership (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Adobe Hijack Persistence (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Windows Defender Exclusions Added via PowerShell (eql)
  • ✅ Suspicious Microsoft Diagnostics Wizard Execution (eql)
  • ❌ Potential Foxmail Exploitation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Command and Scripting Interpreter via Windows Scripts (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Process Access via Direct System Call (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Wireless Credential Dumping using Netsh Command (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential File Transfer via Curl for Windows (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Renamed AutoIt Scripts Interpreter (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Process Injection via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Creation of a Hidden Local User Account (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Script with Audio Capture Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Windows Defender Disabled via Registry Modification (eql)
  • ❌ Bypass UAC via Event Viewer (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Program Files Directory Masquerading (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious MS Outlook Child Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Port Forwarding Rule Addition (eql)
  • ✅ Unusual Parent-Child Relationship (eql)
  • ✅ Suspicious ImagePath Service Creation (eql)
  • ✅ Persistence via Microsoft Outlook VBA (eql)
  • ✅ Potential DNS Tunneling via NsLookup (eql)
  • ❌ WDAC Policy File by an Unusual Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Parent Process for cmd.exe (eql)
  • ✅ NTDS or SAM Database File Copied (eql)
  • ❌ ScreenConnect Server Spawning Suspicious Processes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Execution via Windows Subsystem for Linux (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privilege Escalation via Named Pipe Impersonation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Process Creation CallTrace (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Command Execution via ForFiles (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Process Spawned by a User (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Persistence via Services Registry (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Control Panel Process with Unusual Arguments (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Process Creation via Secondary Logon (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Startup Persistence by a Suspicious Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Windows Path Activity (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Multiple Vault Web Credentials Read (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Event Logs Cleared (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Encrypting Files with WinRar or 7z (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Adding Hidden File Attribute via Attrib (eql)
  • ✅ Potential Local NTLM Relay via HTTP (eql)
  • ❌ Suspicious Remote Registry Access via SeBackupPrivilege (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Microsoft Exchange Server UM Spawning Suspicious Processes (eql)
  • ❌ Multiple Logon Failure from the same Source Address (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Disable Windows Firewall Rules via Netsh (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Process Execution Path - Alternate Data Stream (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Share Enumeration Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Disable Windows Event and Security Logs Using Built-in Tools (eql)
  • ❌ Multiple Logon Failure Followed by Logon Success (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution via MSSQL xp_cmdshell Stored Procedure (eql)
  • ❌ Suspicious Script Object Execution (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via TSClient Mountpoint (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Registry Persistence via AppCert DLL (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Service DACL Modification via sc.exe (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming DCOM Lateral Movement with MMC (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Network Connection via RunDLL32 (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious PDF Reader Child Process (eql)
  • ❌ Uncommon Registry Persistence Change (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Exchange Mailbox Export via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Network Logon Provider Registry Modification (eql)
  • ❌ Windows Service Installed via an Unusual Client (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PsExec Network Connection (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Process Spawned by a Host (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows CryptoAPI Spoofing Vulnerability (CVE-2020-0601 - CurveBall) (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell PSReflect Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell MiniDump Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ DNS Global Query Block List Modified or Disabled (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Deleting Backup Catalogs with Wbadmin (eql)
  • ✅ RDP Enabled via Registry (eql)
  • ❌ UAC Bypass Attempt via Privileged IFileOperation COM Interface (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Secure File Deletion via SDelete Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious PrintSpooler Service Executable File Creation (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Script with Veeam Credential Access Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ FirstTime Seen Account Performing DCSync (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Outbound Scheduled Task Activity via PowerShell (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ User Added to Privileged Group (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Persistence via PowerShell profile (eql)
  • ✅ Suspicious Execution via Scheduled Task (eql)
  • ❌ Unsigned DLL loaded by DNS Service (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential File Download via a Headless Browser (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Process Network Connection (eql)
  • ❌ Interactive Logon by an Unusual Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Discovery Related Windows API Functions (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ AdminSDHolder SDProp Exclusion Added (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming DCOM Lateral Movement via MSHTA (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Account Configured with Never-Expiring Password (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network Connection via Signed Binary (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ MsiExec Service Child Process With Network Connection (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ WebServer Access Logs Deleted (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Modification of the msPKIAccountCredentials (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Image File Execution Options Injection (eql)
  • ✅ Persistence via TelemetryController Scheduled Task Hijack (eql)
  • ❌ Scheduled Task Created by a Windows Script (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Access to LDAP Attributes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass via ICMLuaUtil Elevated COM Interface (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Modification of Boot Configuration (eql)
  • ✅ Unusual Service Host Child Process - Childless Service (eql)
  • ✅ Exporting Exchange Mailbox via PowerShell (eql)
  • ❌ Remote Computer Account DnsHostName Update (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Microsoft Exchange Server UM Writing Suspicious Files (eql)
  • ❌ Unusual Process For a Windows Host (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ First Time Seen Commonly Abused Remote Access Tool Execution (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Anomalous Process For a Windows Population (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ AdminSDHolder Backdoor (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Windows Error Manager Masquerading (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Active Directory Group Modification by SYSTEM (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual File Creation - Alternate Data Stream (eql)
  • ✅ Suspicious RDP ActiveX Client Loaded (eql)
  • ❌ Suspicious JetBrains TeamCity Child Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Modification of Accessibility Binaries (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Access to a Sensitive LDAP Attribute (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privilege Escalation via Rogue Named Pipe Impersonation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential Remote Desktop Tunneling Detected (eql)
  • ✅ Enumeration Command Spawned via WMIPrvSE (eql)
  • ❌ Suspicious ScreenConnect Client Child Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential File Transfer via Certreq (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Shadow Credentials added to AD Object (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious LSASS Access via MalSecLogon (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Microsoft Management Console File from Unusual Path (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ File with Right-to-Left Override Character (RTLO) Created/Executed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious WMIC XSL Script Execution (eql)
  • ❌ Potential PowerShell Obfuscated Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ PowerShell Script Block Logging Disabled (eql)
  • ❌ PowerShell Suspicious Payload Encoded and Compressed (kuery)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Temporarily Scheduled Task Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Windows Powershell Arguments (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Enumerating Domain Trusts via NLTEST.EXE (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Enumeration of Administrator Accounts (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Suspicious WMI Image Load from MS Office (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential WPAD Spoofing via DNS Record Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Command Prompt Network Connection (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Execution from a Mounted Device (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Executable File Creation with Multiple Extensions (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Enable Host Network Discovery via Netsh (eql)
  • ✅ Unusual Child Process of dns.exe (eql)
  • ❌ Potential WSUS Abuse for Lateral Movement (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential ADIDNS Poisoning via Wildcard Record Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming DCOM Lateral Movement with ShellBrowserWindow or ShellWindows (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Script with Clipboard Retrieval Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ A scheduled task was created (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Evasion via Windows Filtering Platform (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Encoded Executable Stored in the Registry (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Group Policy Discovery via Microsoft GPResult Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential PowerShell Pass-the-Hash/Relay Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remote Scheduled Task Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Script with Screenshot Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ SeDebugPrivilege Enabled by a Suspicious Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Zoom Child Process (eql)
  • ❌ Machine Learning Detected a Suspicious Windows Event with a High Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Credential Access via LSASS Memory Dump (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Explorer Child Process (eql)
  • ✅ Scheduled Tasks AT Command Enabled (eql)
  • ✅ Persistence via WMI Event Subscription (eql)
  • ✅ Hosts File Modified (eql)
  • ❌ Remote Scheduled Task Creation via RPC (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Command Shell Activity Started via RunDLL32 (eql)
  • ✅ Microsoft Build Engine Started by a Script Process (kuery)
  • ✅ Microsoft Build Engine Started by a System Process (eql)
  • ✅ Microsoft Build Engine Using an Alternate Name (eql)
  • ✅ Potential Credential Access via Trusted Developer Utility (eql)
  • ✅ Microsoft Build Engine Started an Unusual Process (kuery)
  • ❌ Process Injection by the Microsoft Build Engine (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Credential Access via DCSync (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ A scheduled task was updated (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ InstallUtil Process Making Network Connections (eql)
  • ❌ Potential LSASS Clone Creation via PssCaptureSnapShot (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Subsystem for Linux Distribution Installed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ DNS-over-HTTPS Enabled via Registry (eql)
  • ❌ PowerShell Mailbox Collection Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via local SxS Shared Module (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious MS Office Child Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Credential Acquisition via Registry Hive Dumping (eql)
  • ❌ Persistence via Hidden Run Key Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remotely Started Services via RPC (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Process Calling the Metadata Service (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious WerFault Child Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Outlook Home Page Registry Modification (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ WPS Office Exploitation via DLL Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Invoke-Mimikatz PowerShell Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Managed Code Hosting Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Signed Proxy Execution via MS Work Folders (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Suspicious Portable Executable Encoded in Powershell Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Execution via Microsoft Office Add-Ins (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Local Scheduled Task Creation (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Netsh Helper DLL (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network Connection via Compiled HTML File (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Endpoint Security Parent Process (eql)
  • ❌ Code Signing Policy Modification Through Built-in tools (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Clearing Windows Console History (eql)
  • ❌ Volume Shadow Copy Deleted or Resized via VssAdmin (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Script Interpreter Executing Process via WMI (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Potential Veeam Credential Access Command (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Privilege Escalation via Service ImagePath Modification (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Invoke-NinjaCopy script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Creation or Modification of Domain Backup DPAPI private key (eql)
  • ❌ Network Connection via MsXsl (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Kirbi File Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ UAC Bypass Attempt with IEditionUpgradeManager Elevated COM Interface (eql)
  • ❌ Group Policy Abuse for Privilege Addition (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ SolarWinds Process Disabling Services via Registry (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Network Activity (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Image Load (taskschd.dll) from MS Office (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Keylogging Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Print Spooler Point and Print DLL (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Potential Privileged Escalation via SamAccountName Spoofing (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via Windows Command Debugging Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Host Detected with Suspicious Windows Process(es) (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Searching for Saved Credentials via VaultCmd (eql)
  • ✅ Suspicious DLL Loaded for Persistence or Privilege Escalation (eql)
  • ❌ Creation or Modification of a new GPO Scheduled Task or Service (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Microsoft IIS Connection Strings Decryption (eql)
  • ❌ Mshta Making Network Connections (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Persistence via BITS Job Notify Cmdline (eql)
  • ✅ Mounting Hidden or WebDav Remote Shares (eql)
  • ✅ Suspicious Print Spooler File Deletion (eql)
  • ✅ Potential Remote Desktop Shadowing Activity (eql)
  • ❌ Potential Credential Access via Renamed COM+ Services DLL (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Installation of Custom Shim Databases (eql)
  • ✅ Microsoft Build Engine Started by an Office Application (eql)
  • ✅ Remote File Download via MpCmdRun (eql)
  • ❌ Unusual Network Connection via DllHost (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual File Modification by dns.exe (eql)
  • ✅ Suspicious Startup Shell Folder Modification (eql)
  • ✅ Disabling Windows Defender Security Settings via PowerShell (eql)
  • ❌ Potential PowerShell HackTool Script by Function Names (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ New ActiveSyncAllowedDeviceID Added via PowerShell (eql)
  • ✅ Execution from Unusual Directory - Command Line (eql)
  • ✅ Registry Persistence via AppInit DLL (eql)
  • ✅ Symbolic Link to Shadow Copy Created (eql)
  • ✅ Disabling User Account Control via Registry Modification (eql)
  • ✅ Clearing Windows Event Logs (eql)
  • ❌ Remote Windows Service Installed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privilege Escalation via Windir Environment Variable (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Service Command Lateral Movement (eql)
  • ❌ Modification of WDigest Security Provider (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Command Execution via SolarWinds Process (eql)
  • ❌ NTDS Dump via Wbadmin (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Volume Shadow Copy Deletion via PowerShell (eql)
  • ❌ Suspicious Windows Command Shell Arguments (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Code Signing Policy Modification Through Registry (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Service was Installed in the System (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Pass-the-Hash (PtH) Attempt (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network-Level Authentication (NLA) Disabled (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via Windows Subsystem for Linux (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Volume Shadow Copy Deletion via WMIC (eql)
  • ❌ Suspicious Execution from INET Cache (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Attempt to Install Kali Linux via WSL (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ NullSessionPipe Registry Modification (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Child Process from a System Virtual Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows User Calling the Metadata Service (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential privilege escalation via CVE-2022-38028 (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ KRBTGT Delegation Backdoor (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious .NET Reflection via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Subsystem for Linux Enabled via Dism Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Process Execution via Renamed PsExec Executable (eql)
  • ✅ Process Activity via Compiled HTML File (eql)
  • ✅ Connection to Commonly Abused Free SSL Certificate Providers (eql)
  • ❌ First Time Seen NewCredentials Logon Process (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Service Creation via Local Kerberos Authentication (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Kerberos Pre-authentication Disabled for User (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution of Persistent Suspicious Program (eql)
  • ❌ Unusual Execution via Microsoft Common Console File (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Service Control Spawned via Script Interpreter (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Installation of Security Support Provider (eql)
  • ❌ Host Files System Changes via Windows Subsystem for Linux (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Executable File Creation by a System Critical Process (eql)
  • ❌ Unusual Process Spawned by a Parent Process (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Script with Webcam Video Capture Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Kerberos Ticket Request (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Mimikatz Memssp Log File Detected (eql)
  • ✅ IIS HTTP Logging Disabled (eql)
  • ❌ Process Execution from an Unusual Directory (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ AdFind Command Activity (eql)
  • ❌ ImageLoad via Windows Update Auto Update Client (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Print Spooler Child Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Whoami Process Activity (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Child Processes of RunDLL32 (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ SIP Provider Modification (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ LSASS Memory Dump Creation (eql)
  • ❌ WMI Incoming Lateral Movement (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Remote Desktop File Opened from Suspicious Path (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Persistence via Microsoft Office AddIns (eql)
  • ❌ Sensitive Privilege SeEnableDelegationPrivilege assigned to a User (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Windows Script Executing PowerShell (eql)
  • ❌ Rare SMB Connection to the Internet (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Parent Process Detected with Suspicious Windows Process(es) (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Windows Firewall Disabled via PowerShell (eql)
  • ✅ Delete Volume USN Journal with Fsutil (eql)
  • ❌ Persistent Scripts in the Startup Directory (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Microsoft Exchange Worker Spawning Suspicious Processes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Modification of AmsiEnable Registry Key (eql)
  • ❌ Potential Active Directory Replication Account Backdoor (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Untrusted DLL Loaded by Azure AD Sync Service (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Browser Extension Install (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privileged Account Brute Force (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remote File Copy to a Hidden Share (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Suspicious Antimalware Scan Interface DLL (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network Connection via Registration Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass Attempt via Elevated COM Internet Explorer Add-On Installer (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential Application Shimming via Sdbinst (eql)
  • ✅ Suspicious CertUtil Commands (eql)
  • ❌ Svchost spawning Cmd (kuery)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ PowerShell Kerberos Ticket Dump (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Microsoft Windows Defender Tampering (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ MS Office Macro Security Registry Modifications (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Alternate Data Stream Creation/Execution at Volume Root Directory (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@elastic elastic deleted a comment from eric-forte-elastic Mar 24, 2025
@tradebot-elastic
Copy link

tradebot-elastic commented Mar 25, 2025

⛔️ Test failed

Results
  • ✅ Potential Credential Access via Windows Utilities (eql)
  • ✅ System Shells via Services (eql)
  • ✅ Potential Cookies Theft via Browser Debugging (eql)
  • ❌ Potential Credential Access via DuplicateHandle in LSASS (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ High Number of Process and/or Service Terminations (kuery)
  • ❌ Potential Escalation via Vulnerable MSI Repair (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential DLL Side-Loading via Microsoft Antimalware Service Executable (eql)
  • ✅ Conhost Spawned By Suspicious Parent Process (eql)
  • ❌ Enumerating Domain Trusts via DSQUERY.EXE (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential Evasion via Filter Manager (eql)
  • ✅ Remote Desktop Enabled in Windows Firewall by Netsh (eql)
  • ❌ Local Account TokenFilter Policy Disabled (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ First Time Seen Removable Device (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Anomalous Windows Process Creation (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ User account exposed to Kerberoasting (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Attempt to Establish VScode Remote Tunnel (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Peripheral Device Discovery (eql)
  • ❌ MsBuild Making Network Connections (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Sensitive Audit Policy Sub-Category Disabled (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential LSASS Memory Dump via PssCaptureSnapShot (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential DLL Side-Loading via Trusted Microsoft Programs (eql)
  • ❌ UAC Bypass via Windows Firewall Snap-In Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Script with Token Impersonation Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ User Detected with Suspicious Windows Process(es) (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Lsass Process Access (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Exploitation of an Unquoted Service Path Vulnerability (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Cmd Execution via WMI (eql)
  • ✅ Persistence via Scheduled Job Creation (eql)
  • ❌ Potential Ransomware Behavior - High count of Readme files by System (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Persistence via Time Provider Modification (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Scheduled Task Execution at Scale via GPO (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Remote File Download via Desktopimgdownldr Utility (eql)
  • ❌ File Creation Time Changed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Startup/Logon Script added to Group Policy Object (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Username (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Service (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Powershell Script (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows User Privilege Elevation Activity (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Remote User (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Renamed Utility Executed with Short Program Name (eql)
  • ❌ Script Execution via Microsoft HTML Application (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution of COM object via Xwizard (eql)
  • ❌ User Account Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming Execution via WinRM Remote Shell (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remote File Download via Script Interpreter (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ PowerShell Script with Encryption/Decryption Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass via DiskCleanup Scheduled Task Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution of File Written or Modified by PDF Reader (eql)
  • ❌ Creation of a DNS-Named Record (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Antimalware Scan Interface Bypass via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Network Activity from a Windows System Binary (eql)
  • ✅ Suspicious .NET Code Compilation (eql)
  • ✅ Creation or Modification of Root Certificate (eql)
  • ❌ Werfault ReflectDebugger Persistence (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ LSASS Memory Dump Handle Access (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Full User-Mode Dumps Enabled System-Wide (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Lateral Movement via Startup Folder (eql)
  • ❌ Potential PowerShell HackTool Script by Author (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Relay Attack against a Domain Controller (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Persistence via Update Orchestrator Service Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming Execution via PowerShell Remoting (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Account Password Reset Remotely (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Account Discovery Command via SYSTEM Account (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass Attempt via Windows Directory Masquerading (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Enumeration of Privileged Local Groups Membership (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Adobe Hijack Persistence (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Windows Defender Exclusions Added via PowerShell (eql)
  • ✅ Suspicious Microsoft Diagnostics Wizard Execution (eql)
  • ❌ Potential Foxmail Exploitation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Command and Scripting Interpreter via Windows Scripts (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Process Access via Direct System Call (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Wireless Credential Dumping using Netsh Command (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential File Transfer via Curl for Windows (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Renamed AutoIt Scripts Interpreter (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Process Injection via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Creation of a Hidden Local User Account (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Script with Audio Capture Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Windows Defender Disabled via Registry Modification (eql)
  • ❌ Bypass UAC via Event Viewer (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Program Files Directory Masquerading (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious MS Outlook Child Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Port Forwarding Rule Addition (eql)
  • ✅ Unusual Parent-Child Relationship (eql)
  • ✅ Suspicious ImagePath Service Creation (eql)
  • ✅ Persistence via Microsoft Outlook VBA (eql)
  • ✅ Potential DNS Tunneling via NsLookup (eql)
  • ❌ WDAC Policy File by an Unusual Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Parent Process for cmd.exe (eql)
  • ✅ NTDS or SAM Database File Copied (eql)
  • ❌ ScreenConnect Server Spawning Suspicious Processes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Execution via Windows Subsystem for Linux (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privilege Escalation via Named Pipe Impersonation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Process Creation CallTrace (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Command Execution via ForFiles (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Process Spawned by a User (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Persistence via Services Registry (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Control Panel Process with Unusual Arguments (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Process Creation via Secondary Logon (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Startup Persistence by a Suspicious Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Windows Path Activity (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Multiple Vault Web Credentials Read (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Event Logs Cleared (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Encrypting Files with WinRar or 7z (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Adding Hidden File Attribute via Attrib (eql)
  • ✅ Potential Local NTLM Relay via HTTP (eql)
  • ❌ Suspicious Remote Registry Access via SeBackupPrivilege (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Microsoft Exchange Server UM Spawning Suspicious Processes (eql)
  • ❌ Multiple Logon Failure from the same Source Address (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Disable Windows Firewall Rules via Netsh (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Process Execution Path - Alternate Data Stream (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Share Enumeration Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Disable Windows Event and Security Logs Using Built-in Tools (eql)
  • ❌ Multiple Logon Failure Followed by Logon Success (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution via MSSQL xp_cmdshell Stored Procedure (eql)
  • ❌ Suspicious Script Object Execution (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via TSClient Mountpoint (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Registry Persistence via AppCert DLL (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Service DACL Modification via sc.exe (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming DCOM Lateral Movement with MMC (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Network Connection via RunDLL32 (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious PDF Reader Child Process (eql)
  • ❌ Uncommon Registry Persistence Change (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Exchange Mailbox Export via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Network Logon Provider Registry Modification (eql)
  • ❌ Windows Service Installed via an Unusual Client (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PsExec Network Connection (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Process Spawned by a Host (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows CryptoAPI Spoofing Vulnerability (CVE-2020-0601 - CurveBall) (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell PSReflect Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell MiniDump Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ DNS Global Query Block List Modified or Disabled (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Deleting Backup Catalogs with Wbadmin (eql)
  • ✅ RDP Enabled via Registry (eql)
  • ❌ UAC Bypass Attempt via Privileged IFileOperation COM Interface (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Secure File Deletion via SDelete Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious PrintSpooler Service Executable File Creation (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Script with Veeam Credential Access Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ FirstTime Seen Account Performing DCSync (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Outbound Scheduled Task Activity via PowerShell (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ User Added to Privileged Group (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Persistence via PowerShell profile (eql)
  • ✅ Suspicious Execution via Scheduled Task (eql)
  • ❌ Unsigned DLL loaded by DNS Service (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential File Download via a Headless Browser (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Process Network Connection (eql)
  • ❌ Interactive Logon by an Unusual Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Discovery Related Windows API Functions (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ AdminSDHolder SDProp Exclusion Added (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming DCOM Lateral Movement via MSHTA (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Account Configured with Never-Expiring Password (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network Connection via Signed Binary (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ MsiExec Service Child Process With Network Connection (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ WebServer Access Logs Deleted (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Modification of the msPKIAccountCredentials (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Image File Execution Options Injection (eql)
  • ✅ Persistence via TelemetryController Scheduled Task Hijack (eql)
  • ❌ Scheduled Task Created by a Windows Script (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Access to LDAP Attributes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass via ICMLuaUtil Elevated COM Interface (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Modification of Boot Configuration (eql)
  • ✅ Unusual Service Host Child Process - Childless Service (eql)
  • ✅ Exporting Exchange Mailbox via PowerShell (eql)
  • ❌ Remote Computer Account DnsHostName Update (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Microsoft Exchange Server UM Writing Suspicious Files (eql)
  • ❌ Unusual Process For a Windows Host (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ First Time Seen Commonly Abused Remote Access Tool Execution (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Anomalous Process For a Windows Population (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ AdminSDHolder Backdoor (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Windows Error Manager Masquerading (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Active Directory Group Modification by SYSTEM (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual File Creation - Alternate Data Stream (eql)
  • ✅ Suspicious RDP ActiveX Client Loaded (eql)
  • ❌ Suspicious JetBrains TeamCity Child Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Modification of Accessibility Binaries (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Access to a Sensitive LDAP Attribute (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privilege Escalation via Rogue Named Pipe Impersonation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential Remote Desktop Tunneling Detected (eql)
  • ✅ Enumeration Command Spawned via WMIPrvSE (eql)
  • ❌ Suspicious ScreenConnect Client Child Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential File Transfer via Certreq (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Shadow Credentials added to AD Object (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious LSASS Access via MalSecLogon (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Microsoft Management Console File from Unusual Path (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ File with Right-to-Left Override Character (RTLO) Created/Executed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious WMIC XSL Script Execution (eql)
  • ❌ Potential PowerShell Obfuscated Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ PowerShell Script Block Logging Disabled (eql)
  • ❌ PowerShell Suspicious Payload Encoded and Compressed (kuery)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Temporarily Scheduled Task Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Windows Powershell Arguments (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Enumerating Domain Trusts via NLTEST.EXE (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Enumeration of Administrator Accounts (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Suspicious WMI Image Load from MS Office (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential WPAD Spoofing via DNS Record Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Command Prompt Network Connection (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Execution from a Mounted Device (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Executable File Creation with Multiple Extensions (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Enable Host Network Discovery via Netsh (eql)
  • ✅ Unusual Child Process of dns.exe (eql)
  • ❌ Potential WSUS Abuse for Lateral Movement (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential ADIDNS Poisoning via Wildcard Record Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming DCOM Lateral Movement with ShellBrowserWindow or ShellWindows (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Script with Clipboard Retrieval Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ A scheduled task was created (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Evasion via Windows Filtering Platform (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Encoded Executable Stored in the Registry (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Group Policy Discovery via Microsoft GPResult Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential PowerShell Pass-the-Hash/Relay Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remote Scheduled Task Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Script with Screenshot Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ SeDebugPrivilege Enabled by a Suspicious Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Zoom Child Process (eql)
  • ❌ Machine Learning Detected a Suspicious Windows Event with a High Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Credential Access via LSASS Memory Dump (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Explorer Child Process (eql)
  • ✅ Scheduled Tasks AT Command Enabled (eql)
  • ✅ Persistence via WMI Event Subscription (eql)
  • ✅ Hosts File Modified (eql)
  • ❌ Remote Scheduled Task Creation via RPC (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Command Shell Activity Started via RunDLL32 (eql)
  • ✅ Microsoft Build Engine Started by a Script Process (kuery)
  • ✅ Microsoft Build Engine Started by a System Process (eql)
  • ✅ Microsoft Build Engine Using an Alternate Name (eql)
  • ✅ Potential Credential Access via Trusted Developer Utility (eql)
  • ✅ Microsoft Build Engine Started an Unusual Process (kuery)
  • ❌ Process Injection by the Microsoft Build Engine (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Credential Access via DCSync (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ A scheduled task was updated (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ InstallUtil Process Making Network Connections (eql)
  • ❌ Potential LSASS Clone Creation via PssCaptureSnapShot (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Subsystem for Linux Distribution Installed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ DNS-over-HTTPS Enabled via Registry (eql)
  • ❌ PowerShell Mailbox Collection Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via local SxS Shared Module (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious MS Office Child Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Credential Acquisition via Registry Hive Dumping (eql)
  • ❌ Persistence via Hidden Run Key Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remotely Started Services via RPC (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Process Calling the Metadata Service (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious WerFault Child Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Outlook Home Page Registry Modification (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ WPS Office Exploitation via DLL Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Invoke-Mimikatz PowerShell Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Managed Code Hosting Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Signed Proxy Execution via MS Work Folders (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Suspicious Portable Executable Encoded in Powershell Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Execution via Microsoft Office Add-Ins (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Local Scheduled Task Creation (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Netsh Helper DLL (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network Connection via Compiled HTML File (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Endpoint Security Parent Process (eql)
  • ❌ Code Signing Policy Modification Through Built-in tools (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Clearing Windows Console History (eql)
  • ❌ Volume Shadow Copy Deleted or Resized via VssAdmin (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Script Interpreter Executing Process via WMI (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Potential Veeam Credential Access Command (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Privilege Escalation via Service ImagePath Modification (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Invoke-NinjaCopy script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Creation or Modification of Domain Backup DPAPI private key (eql)
  • ❌ Network Connection via MsXsl (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Kirbi File Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ UAC Bypass Attempt with IEditionUpgradeManager Elevated COM Interface (eql)
  • ❌ Group Policy Abuse for Privilege Addition (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ SolarWinds Process Disabling Services via Registry (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Network Activity (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Image Load (taskschd.dll) from MS Office (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Keylogging Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Print Spooler Point and Print DLL (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Potential Privileged Escalation via SamAccountName Spoofing (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via Windows Command Debugging Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Host Detected with Suspicious Windows Process(es) (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Searching for Saved Credentials via VaultCmd (eql)
  • ✅ Suspicious DLL Loaded for Persistence or Privilege Escalation (eql)
  • ❌ Creation or Modification of a new GPO Scheduled Task or Service (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Microsoft IIS Connection Strings Decryption (eql)
  • ❌ Mshta Making Network Connections (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Persistence via BITS Job Notify Cmdline (eql)
  • ✅ Mounting Hidden or WebDav Remote Shares (eql)
  • ✅ Suspicious Print Spooler File Deletion (eql)
  • ✅ Potential Remote Desktop Shadowing Activity (eql)
  • ❌ Potential Credential Access via Renamed COM+ Services DLL (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Installation of Custom Shim Databases (eql)
  • ✅ Microsoft Build Engine Started by an Office Application (eql)
  • ✅ Remote File Download via MpCmdRun (eql)
  • ❌ Unusual Network Connection via DllHost (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual File Modification by dns.exe (eql)
  • ✅ Suspicious Startup Shell Folder Modification (eql)
  • ✅ Disabling Windows Defender Security Settings via PowerShell (eql)
  • ❌ Potential PowerShell HackTool Script by Function Names (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ New ActiveSyncAllowedDeviceID Added via PowerShell (eql)
  • ✅ Execution from Unusual Directory - Command Line (eql)
  • ✅ Registry Persistence via AppInit DLL (eql)
  • ✅ Symbolic Link to Shadow Copy Created (eql)
  • ✅ Disabling User Account Control via Registry Modification (eql)
  • ✅ Clearing Windows Event Logs (eql)
  • ❌ Remote Windows Service Installed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privilege Escalation via Windir Environment Variable (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Service Command Lateral Movement (eql)
  • ❌ Modification of WDigest Security Provider (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Command Execution via SolarWinds Process (eql)
  • ❌ NTDS Dump via Wbadmin (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Volume Shadow Copy Deletion via PowerShell (eql)
  • ❌ Suspicious Windows Command Shell Arguments (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Code Signing Policy Modification Through Registry (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Service was Installed in the System (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Pass-the-Hash (PtH) Attempt (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network-Level Authentication (NLA) Disabled (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via Windows Subsystem for Linux (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Volume Shadow Copy Deletion via WMIC (eql)
  • ❌ Suspicious Execution from INET Cache (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Attempt to Install Kali Linux via WSL (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ NullSessionPipe Registry Modification (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Child Process from a System Virtual Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows User Calling the Metadata Service (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential privilege escalation via CVE-2022-38028 (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ KRBTGT Delegation Backdoor (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious .NET Reflection via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Subsystem for Linux Enabled via Dism Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Process Execution via Renamed PsExec Executable (eql)
  • ✅ Process Activity via Compiled HTML File (eql)
  • ✅ Connection to Commonly Abused Free SSL Certificate Providers (eql)
  • ❌ First Time Seen NewCredentials Logon Process (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Service Creation via Local Kerberos Authentication (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Kerberos Pre-authentication Disabled for User (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution of Persistent Suspicious Program (eql)
  • ❌ Unusual Execution via Microsoft Common Console File (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Service Control Spawned via Script Interpreter (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Installation of Security Support Provider (eql)
  • ❌ Host Files System Changes via Windows Subsystem for Linux (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Executable File Creation by a System Critical Process (eql)
  • ❌ Unusual Process Spawned by a Parent Process (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Script with Webcam Video Capture Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Kerberos Ticket Request (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Mimikatz Memssp Log File Detected (eql)
  • ✅ IIS HTTP Logging Disabled (eql)
  • ❌ Process Execution from an Unusual Directory (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ AdFind Command Activity (eql)
  • ❌ ImageLoad via Windows Update Auto Update Client (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Print Spooler Child Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Whoami Process Activity (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Child Processes of RunDLL32 (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ SIP Provider Modification (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ LSASS Memory Dump Creation (eql)
  • ❌ WMI Incoming Lateral Movement (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Remote Desktop File Opened from Suspicious Path (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Persistence via Microsoft Office AddIns (eql)
  • ❌ Sensitive Privilege SeEnableDelegationPrivilege assigned to a User (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Windows Script Executing PowerShell (eql)
  • ❌ Rare SMB Connection to the Internet (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Parent Process Detected with Suspicious Windows Process(es) (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Windows Firewall Disabled via PowerShell (eql)
  • ✅ Delete Volume USN Journal with Fsutil (eql)
  • ❌ Persistent Scripts in the Startup Directory (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Microsoft Exchange Worker Spawning Suspicious Processes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Modification of AmsiEnable Registry Key (eql)
  • ❌ Potential Active Directory Replication Account Backdoor (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Untrusted DLL Loaded by Azure AD Sync Service (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Browser Extension Install (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privileged Account Brute Force (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remote File Copy to a Hidden Share (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Suspicious Antimalware Scan Interface DLL (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network Connection via Registration Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass Attempt via Elevated COM Internet Explorer Add-On Installer (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential Application Shimming via Sdbinst (eql)
  • ✅ Suspicious CertUtil Commands (eql)
  • ❌ Svchost spawning Cmd (kuery)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ PowerShell Kerberos Ticket Dump (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Microsoft Windows Defender Tampering (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ MS Office Macro Security Registry Modifications (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Alternate Data Stream Creation/Execution at Volume Root Directory (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

Copy link
Contributor

@eric-forte-elastic eric-forte-elastic left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Great discussion ! LGTM 👍

@tradebot-elastic
Copy link

tradebot-elastic commented Mar 26, 2025

⛔️ Test failed

Results
  • ✅ Potential Credential Access via Windows Utilities (eql)
  • ✅ System Shells via Services (eql)
  • ✅ Potential Cookies Theft via Browser Debugging (eql)
  • ❌ Potential Credential Access via DuplicateHandle in LSASS (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ High Number of Process and/or Service Terminations (kuery)
  • ❌ Potential Escalation via Vulnerable MSI Repair (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential DLL Side-Loading via Microsoft Antimalware Service Executable (eql)
  • ✅ Conhost Spawned By Suspicious Parent Process (eql)
  • ❌ Enumerating Domain Trusts via DSQUERY.EXE (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential Evasion via Filter Manager (eql)
  • ✅ Remote Desktop Enabled in Windows Firewall by Netsh (eql)
  • ❌ Local Account TokenFilter Policy Disabled (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ First Time Seen Removable Device (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Anomalous Windows Process Creation (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ User account exposed to Kerberoasting (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Attempt to Establish VScode Remote Tunnel (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Peripheral Device Discovery (eql)
  • ❌ MsBuild Making Network Connections (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Sensitive Audit Policy Sub-Category Disabled (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential LSASS Memory Dump via PssCaptureSnapShot (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential DLL Side-Loading via Trusted Microsoft Programs (eql)
  • ❌ UAC Bypass via Windows Firewall Snap-In Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Script with Token Impersonation Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ User Detected with Suspicious Windows Process(es) (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Lsass Process Access (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Exploitation of an Unquoted Service Path Vulnerability (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Cmd Execution via WMI (eql)
  • ✅ Persistence via Scheduled Job Creation (eql)
  • ❌ Potential Ransomware Behavior - High count of Readme files by System (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Persistence via Time Provider Modification (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Scheduled Task Execution at Scale via GPO (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Remote File Download via Desktopimgdownldr Utility (eql)
  • ❌ File Creation Time Changed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Startup/Logon Script added to Group Policy Object (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Username (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Service (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Powershell Script (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows User Privilege Elevation Activity (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Remote User (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Renamed Utility Executed with Short Program Name (eql)
  • ❌ Script Execution via Microsoft HTML Application (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution of COM object via Xwizard (eql)
  • ❌ User Account Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming Execution via WinRM Remote Shell (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remote File Download via Script Interpreter (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ PowerShell Script with Encryption/Decryption Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass via DiskCleanup Scheduled Task Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution of File Written or Modified by PDF Reader (eql)
  • ❌ Creation of a DNS-Named Record (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Antimalware Scan Interface Bypass via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Network Activity from a Windows System Binary (eql)
  • ✅ Suspicious .NET Code Compilation (eql)
  • ✅ Creation or Modification of Root Certificate (eql)
  • ❌ Werfault ReflectDebugger Persistence (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ LSASS Memory Dump Handle Access (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Full User-Mode Dumps Enabled System-Wide (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Lateral Movement via Startup Folder (eql)
  • ❌ Potential PowerShell HackTool Script by Author (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Relay Attack against a Domain Controller (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Persistence via Update Orchestrator Service Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming Execution via PowerShell Remoting (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Account Password Reset Remotely (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Account Discovery Command via SYSTEM Account (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass Attempt via Windows Directory Masquerading (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Enumeration of Privileged Local Groups Membership (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Adobe Hijack Persistence (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Windows Defender Exclusions Added via PowerShell (eql)
  • ✅ Suspicious Microsoft Diagnostics Wizard Execution (eql)
  • ❌ Potential Foxmail Exploitation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Command and Scripting Interpreter via Windows Scripts (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Process Access via Direct System Call (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Wireless Credential Dumping using Netsh Command (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential File Transfer via Curl for Windows (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Renamed AutoIt Scripts Interpreter (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Process Injection via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Creation of a Hidden Local User Account (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Script with Audio Capture Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Windows Defender Disabled via Registry Modification (eql)
  • ❌ Bypass UAC via Event Viewer (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Program Files Directory Masquerading (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious MS Outlook Child Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Port Forwarding Rule Addition (eql)
  • ✅ Unusual Parent-Child Relationship (eql)
  • ✅ Suspicious ImagePath Service Creation (eql)
  • ✅ Persistence via Microsoft Outlook VBA (eql)
  • ✅ Potential DNS Tunneling via NsLookup (eql)
  • ❌ WDAC Policy File by an Unusual Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Parent Process for cmd.exe (eql)
  • ✅ NTDS or SAM Database File Copied (eql)
  • ❌ ScreenConnect Server Spawning Suspicious Processes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Execution via Windows Subsystem for Linux (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privilege Escalation via Named Pipe Impersonation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Process Creation CallTrace (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Command Execution via ForFiles (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Process Spawned by a User (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Persistence via Services Registry (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Control Panel Process with Unusual Arguments (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Process Creation via Secondary Logon (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Startup Persistence by a Suspicious Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Windows Path Activity (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Multiple Vault Web Credentials Read (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Event Logs Cleared (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Encrypting Files with WinRar or 7z (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Adding Hidden File Attribute via Attrib (eql)
  • ✅ Potential Local NTLM Relay via HTTP (eql)
  • ❌ Suspicious Remote Registry Access via SeBackupPrivilege (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Microsoft Exchange Server UM Spawning Suspicious Processes (eql)
  • ❌ Multiple Logon Failure from the same Source Address (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Disable Windows Firewall Rules via Netsh (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Process Execution Path - Alternate Data Stream (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Share Enumeration Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Disable Windows Event and Security Logs Using Built-in Tools (eql)
  • ❌ Multiple Logon Failure Followed by Logon Success (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution via MSSQL xp_cmdshell Stored Procedure (eql)
  • ❌ Suspicious Script Object Execution (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via TSClient Mountpoint (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Registry Persistence via AppCert DLL (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Service DACL Modification via sc.exe (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming DCOM Lateral Movement with MMC (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Network Connection via RunDLL32 (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious PDF Reader Child Process (eql)
  • ❌ Uncommon Registry Persistence Change (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Exchange Mailbox Export via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Network Logon Provider Registry Modification (eql)
  • ❌ Windows Service Installed via an Unusual Client (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PsExec Network Connection (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Process Spawned by a Host (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows CryptoAPI Spoofing Vulnerability (CVE-2020-0601 - CurveBall) (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell PSReflect Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell MiniDump Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ DNS Global Query Block List Modified or Disabled (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Deleting Backup Catalogs with Wbadmin (eql)
  • ✅ RDP Enabled via Registry (eql)
  • ❌ UAC Bypass Attempt via Privileged IFileOperation COM Interface (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Secure File Deletion via SDelete Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious PrintSpooler Service Executable File Creation (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Script with Veeam Credential Access Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ FirstTime Seen Account Performing DCSync (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Outbound Scheduled Task Activity via PowerShell (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ User Added to Privileged Group (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Persistence via PowerShell profile (eql)
  • ✅ Suspicious Execution via Scheduled Task (eql)
  • ❌ Unsigned DLL loaded by DNS Service (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential File Download via a Headless Browser (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Process Network Connection (eql)
  • ❌ Interactive Logon by an Unusual Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Discovery Related Windows API Functions (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ AdminSDHolder SDProp Exclusion Added (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming DCOM Lateral Movement via MSHTA (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Account Configured with Never-Expiring Password (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network Connection via Signed Binary (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ MsiExec Service Child Process With Network Connection (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ WebServer Access Logs Deleted (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Modification of the msPKIAccountCredentials (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Image File Execution Options Injection (eql)
  • ✅ Persistence via TelemetryController Scheduled Task Hijack (eql)
  • ❌ Scheduled Task Created by a Windows Script (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Access to LDAP Attributes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass via ICMLuaUtil Elevated COM Interface (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Modification of Boot Configuration (eql)
  • ✅ Unusual Service Host Child Process - Childless Service (eql)
  • ✅ Exporting Exchange Mailbox via PowerShell (eql)
  • ❌ Remote Computer Account DnsHostName Update (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Microsoft Exchange Server UM Writing Suspicious Files (eql)
  • ❌ Unusual Process For a Windows Host (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ First Time Seen Commonly Abused Remote Access Tool Execution (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Anomalous Process For a Windows Population (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ AdminSDHolder Backdoor (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Windows Error Manager Masquerading (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Active Directory Group Modification by SYSTEM (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual File Creation - Alternate Data Stream (eql)
  • ✅ Suspicious RDP ActiveX Client Loaded (eql)
  • ❌ Suspicious JetBrains TeamCity Child Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Modification of Accessibility Binaries (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Access to a Sensitive LDAP Attribute (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privilege Escalation via Rogue Named Pipe Impersonation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential Remote Desktop Tunneling Detected (eql)
  • ✅ Enumeration Command Spawned via WMIPrvSE (eql)
  • ❌ Suspicious ScreenConnect Client Child Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential File Transfer via Certreq (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Shadow Credentials added to AD Object (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious LSASS Access via MalSecLogon (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Microsoft Management Console File from Unusual Path (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ File with Right-to-Left Override Character (RTLO) Created/Executed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious WMIC XSL Script Execution (eql)
  • ❌ Potential PowerShell Obfuscated Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ PowerShell Script Block Logging Disabled (eql)
  • ❌ PowerShell Suspicious Payload Encoded and Compressed (kuery)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Temporarily Scheduled Task Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Windows Powershell Arguments (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Enumerating Domain Trusts via NLTEST.EXE (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Enumeration of Administrator Accounts (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Suspicious WMI Image Load from MS Office (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential WPAD Spoofing via DNS Record Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Command Prompt Network Connection (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Execution from a Mounted Device (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Executable File Creation with Multiple Extensions (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Enable Host Network Discovery via Netsh (eql)
  • ✅ Unusual Child Process of dns.exe (eql)
  • ❌ Potential WSUS Abuse for Lateral Movement (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential ADIDNS Poisoning via Wildcard Record Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming DCOM Lateral Movement with ShellBrowserWindow or ShellWindows (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Script with Clipboard Retrieval Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ A scheduled task was created (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Evasion via Windows Filtering Platform (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Encoded Executable Stored in the Registry (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Group Policy Discovery via Microsoft GPResult Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential PowerShell Pass-the-Hash/Relay Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remote Scheduled Task Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Script with Screenshot Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ SeDebugPrivilege Enabled by a Suspicious Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Zoom Child Process (eql)
  • ❌ Machine Learning Detected a Suspicious Windows Event with a High Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Credential Access via LSASS Memory Dump (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Explorer Child Process (eql)
  • ✅ Scheduled Tasks AT Command Enabled (eql)
  • ✅ Persistence via WMI Event Subscription (eql)
  • ✅ Hosts File Modified (eql)
  • ❌ Remote Scheduled Task Creation via RPC (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Command Shell Activity Started via RunDLL32 (eql)
  • ✅ Microsoft Build Engine Started by a Script Process (kuery)
  • ✅ Microsoft Build Engine Started by a System Process (eql)
  • ✅ Microsoft Build Engine Using an Alternate Name (eql)
  • ✅ Potential Credential Access via Trusted Developer Utility (eql)
  • ✅ Microsoft Build Engine Started an Unusual Process (kuery)
  • ❌ Process Injection by the Microsoft Build Engine (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Credential Access via DCSync (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ A scheduled task was updated (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ InstallUtil Process Making Network Connections (eql)
  • ❌ Potential LSASS Clone Creation via PssCaptureSnapShot (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Subsystem for Linux Distribution Installed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ DNS-over-HTTPS Enabled via Registry (eql)
  • ❌ PowerShell Mailbox Collection Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via local SxS Shared Module (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious MS Office Child Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Credential Acquisition via Registry Hive Dumping (eql)
  • ❌ Persistence via Hidden Run Key Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remotely Started Services via RPC (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Process Calling the Metadata Service (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious WerFault Child Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Outlook Home Page Registry Modification (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ WPS Office Exploitation via DLL Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Invoke-Mimikatz PowerShell Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Managed Code Hosting Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Signed Proxy Execution via MS Work Folders (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Suspicious Portable Executable Encoded in Powershell Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Execution via Microsoft Office Add-Ins (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Local Scheduled Task Creation (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Netsh Helper DLL (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network Connection via Compiled HTML File (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Endpoint Security Parent Process (eql)
  • ❌ Code Signing Policy Modification Through Built-in tools (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Clearing Windows Console History (eql)
  • ❌ Volume Shadow Copy Deleted or Resized via VssAdmin (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Script Interpreter Executing Process via WMI (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Potential Veeam Credential Access Command (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Privilege Escalation via Service ImagePath Modification (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Invoke-NinjaCopy script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Creation or Modification of Domain Backup DPAPI private key (eql)
  • ❌ Network Connection via MsXsl (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Kirbi File Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ UAC Bypass Attempt with IEditionUpgradeManager Elevated COM Interface (eql)
  • ❌ Group Policy Abuse for Privilege Addition (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ SolarWinds Process Disabling Services via Registry (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Network Activity (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Image Load (taskschd.dll) from MS Office (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Keylogging Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Print Spooler Point and Print DLL (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Potential Privileged Escalation via SamAccountName Spoofing (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via Windows Command Debugging Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Host Detected with Suspicious Windows Process(es) (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Searching for Saved Credentials via VaultCmd (eql)
  • ✅ Suspicious DLL Loaded for Persistence or Privilege Escalation (eql)
  • ❌ Creation or Modification of a new GPO Scheduled Task or Service (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Microsoft IIS Connection Strings Decryption (eql)
  • ❌ Mshta Making Network Connections (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Persistence via BITS Job Notify Cmdline (eql)
  • ✅ Mounting Hidden or WebDav Remote Shares (eql)
  • ✅ Suspicious Print Spooler File Deletion (eql)
  • ✅ Potential Remote Desktop Shadowing Activity (eql)
  • ❌ Potential Credential Access via Renamed COM+ Services DLL (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Installation of Custom Shim Databases (eql)
  • ✅ Microsoft Build Engine Started by an Office Application (eql)
  • ✅ Remote File Download via MpCmdRun (eql)
  • ❌ Unusual Network Connection via DllHost (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual File Modification by dns.exe (eql)
  • ✅ Suspicious Startup Shell Folder Modification (eql)
  • ✅ Disabling Windows Defender Security Settings via PowerShell (eql)
  • ❌ Potential PowerShell HackTool Script by Function Names (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ New ActiveSyncAllowedDeviceID Added via PowerShell (eql)
  • ✅ Execution from Unusual Directory - Command Line (eql)
  • ✅ Registry Persistence via AppInit DLL (eql)
  • ✅ Symbolic Link to Shadow Copy Created (eql)
  • ✅ Disabling User Account Control via Registry Modification (eql)
  • ✅ Clearing Windows Event Logs (eql)
  • ❌ Remote Windows Service Installed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privilege Escalation via Windir Environment Variable (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Service Command Lateral Movement (eql)
  • ❌ Modification of WDigest Security Provider (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Command Execution via SolarWinds Process (eql)
  • ❌ NTDS Dump via Wbadmin (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Volume Shadow Copy Deletion via PowerShell (eql)
  • ❌ Suspicious Windows Command Shell Arguments (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Code Signing Policy Modification Through Registry (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Service was Installed in the System (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Pass-the-Hash (PtH) Attempt (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network-Level Authentication (NLA) Disabled (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via Windows Subsystem for Linux (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Volume Shadow Copy Deletion via WMIC (eql)
  • ❌ Suspicious Execution from INET Cache (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Attempt to Install Kali Linux via WSL (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ NullSessionPipe Registry Modification (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Child Process from a System Virtual Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows User Calling the Metadata Service (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential privilege escalation via CVE-2022-38028 (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ KRBTGT Delegation Backdoor (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious .NET Reflection via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Subsystem for Linux Enabled via Dism Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Process Execution via Renamed PsExec Executable (eql)
  • ✅ Process Activity via Compiled HTML File (eql)
  • ✅ Connection to Commonly Abused Free SSL Certificate Providers (eql)
  • ❌ First Time Seen NewCredentials Logon Process (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Service Creation via Local Kerberos Authentication (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Kerberos Pre-authentication Disabled for User (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution of Persistent Suspicious Program (eql)
  • ❌ Unusual Execution via Microsoft Common Console File (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Service Control Spawned via Script Interpreter (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Installation of Security Support Provider (eql)
  • ❌ Host Files System Changes via Windows Subsystem for Linux (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Executable File Creation by a System Critical Process (eql)
  • ❌ Unusual Process Spawned by a Parent Process (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Script with Webcam Video Capture Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Kerberos Ticket Request (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Mimikatz Memssp Log File Detected (eql)
  • ✅ IIS HTTP Logging Disabled (eql)
  • ❌ Process Execution from an Unusual Directory (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ AdFind Command Activity (eql)
  • ❌ ImageLoad via Windows Update Auto Update Client (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Print Spooler Child Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Whoami Process Activity (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Child Processes of RunDLL32 (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ SIP Provider Modification (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ LSASS Memory Dump Creation (eql)
  • ❌ WMI Incoming Lateral Movement (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Remote Desktop File Opened from Suspicious Path (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Persistence via Microsoft Office AddIns (eql)
  • ❌ Sensitive Privilege SeEnableDelegationPrivilege assigned to a User (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Windows Script Executing PowerShell (eql)
  • ❌ Rare SMB Connection to the Internet (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Parent Process Detected with Suspicious Windows Process(es) (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Windows Firewall Disabled via PowerShell (eql)
  • ✅ Delete Volume USN Journal with Fsutil (eql)
  • ❌ Persistent Scripts in the Startup Directory (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Microsoft Exchange Worker Spawning Suspicious Processes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Modification of AmsiEnable Registry Key (eql)
  • ❌ Potential Active Directory Replication Account Backdoor (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Untrusted DLL Loaded by Azure AD Sync Service (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Browser Extension Install (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privileged Account Brute Force (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remote File Copy to a Hidden Share (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Suspicious Antimalware Scan Interface DLL (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network Connection via Registration Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass Attempt via Elevated COM Internet Explorer Add-On Installer (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential Application Shimming via Sdbinst (eql)
  • ✅ Suspicious CertUtil Commands (eql)
  • ❌ Svchost spawning Cmd (kuery)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ PowerShell Kerberos Ticket Dump (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Microsoft Windows Defender Tampering (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ MS Office Macro Security Registry Modifications (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Alternate Data Stream Creation/Execution at Volume Root Directory (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@shashank-elastic shashank-elastic force-pushed the prep-for-next-release-9.1 branch from d8a0196 to c22b7c5 Compare March 26, 2025 14:03
@tradebot-elastic
Copy link

tradebot-elastic commented Mar 26, 2025

⛔️ Test failed

Results
  • ✅ Potential Credential Access via Windows Utilities (eql)
  • ✅ System Shells via Services (eql)
  • ✅ Potential Cookies Theft via Browser Debugging (eql)
  • ❌ Potential Credential Access via DuplicateHandle in LSASS (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ High Number of Process and/or Service Terminations (kuery)
  • ❌ Potential Escalation via Vulnerable MSI Repair (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential DLL Side-Loading via Microsoft Antimalware Service Executable (eql)
  • ✅ Conhost Spawned By Suspicious Parent Process (eql)
  • ❌ Enumerating Domain Trusts via DSQUERY.EXE (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential Evasion via Filter Manager (eql)
  • ✅ Remote Desktop Enabled in Windows Firewall by Netsh (eql)
  • ❌ Local Account TokenFilter Policy Disabled (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ First Time Seen Removable Device (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Anomalous Windows Process Creation (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ User account exposed to Kerberoasting (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Attempt to Establish VScode Remote Tunnel (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Peripheral Device Discovery (eql)
  • ❌ MsBuild Making Network Connections (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Sensitive Audit Policy Sub-Category Disabled (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential LSASS Memory Dump via PssCaptureSnapShot (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential DLL Side-Loading via Trusted Microsoft Programs (eql)
  • ❌ UAC Bypass via Windows Firewall Snap-In Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Script with Token Impersonation Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ User Detected with Suspicious Windows Process(es) (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Lsass Process Access (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Exploitation of an Unquoted Service Path Vulnerability (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Cmd Execution via WMI (eql)
  • ✅ Persistence via Scheduled Job Creation (eql)
  • ❌ Potential Ransomware Behavior - High count of Readme files by System (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Persistence via Time Provider Modification (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Scheduled Task Execution at Scale via GPO (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Remote File Download via Desktopimgdownldr Utility (eql)
  • ❌ File Creation Time Changed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Startup/Logon Script added to Group Policy Object (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Username (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Service (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Powershell Script (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows User Privilege Elevation Activity (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Remote User (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Renamed Utility Executed with Short Program Name (eql)
  • ❌ Script Execution via Microsoft HTML Application (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution of COM object via Xwizard (eql)
  • ❌ User Account Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming Execution via WinRM Remote Shell (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remote File Download via Script Interpreter (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ PowerShell Script with Encryption/Decryption Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass via DiskCleanup Scheduled Task Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution of File Written or Modified by PDF Reader (eql)
  • ❌ Creation of a DNS-Named Record (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Antimalware Scan Interface Bypass via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Network Activity from a Windows System Binary (eql)
  • ✅ Suspicious .NET Code Compilation (eql)
  • ✅ Creation or Modification of Root Certificate (eql)
  • ❌ Werfault ReflectDebugger Persistence (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ LSASS Memory Dump Handle Access (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Full User-Mode Dumps Enabled System-Wide (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Lateral Movement via Startup Folder (eql)
  • ❌ Potential PowerShell HackTool Script by Author (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Relay Attack against a Domain Controller (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Persistence via Update Orchestrator Service Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming Execution via PowerShell Remoting (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Account Password Reset Remotely (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Account Discovery Command via SYSTEM Account (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass Attempt via Windows Directory Masquerading (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Enumeration of Privileged Local Groups Membership (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Adobe Hijack Persistence (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Windows Defender Exclusions Added via PowerShell (eql)
  • ✅ Suspicious Microsoft Diagnostics Wizard Execution (eql)
  • ❌ Potential Foxmail Exploitation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Command and Scripting Interpreter via Windows Scripts (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Process Access via Direct System Call (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Wireless Credential Dumping using Netsh Command (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential File Transfer via Curl for Windows (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Renamed AutoIt Scripts Interpreter (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Process Injection via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Creation of a Hidden Local User Account (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Script with Audio Capture Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Windows Defender Disabled via Registry Modification (eql)
  • ❌ Bypass UAC via Event Viewer (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Program Files Directory Masquerading (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious MS Outlook Child Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Port Forwarding Rule Addition (eql)
  • ✅ Unusual Parent-Child Relationship (eql)
  • ✅ Suspicious ImagePath Service Creation (eql)
  • ✅ Persistence via Microsoft Outlook VBA (eql)
  • ✅ Potential DNS Tunneling via NsLookup (eql)
  • ❌ WDAC Policy File by an Unusual Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Parent Process for cmd.exe (eql)
  • ✅ NTDS or SAM Database File Copied (eql)
  • ❌ ScreenConnect Server Spawning Suspicious Processes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Execution via Windows Subsystem for Linux (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privilege Escalation via Named Pipe Impersonation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Process Creation CallTrace (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Command Execution via ForFiles (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Process Spawned by a User (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Persistence via Services Registry (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Control Panel Process with Unusual Arguments (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Process Creation via Secondary Logon (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Startup Persistence by a Suspicious Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Windows Path Activity (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Multiple Vault Web Credentials Read (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Event Logs Cleared (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Encrypting Files with WinRar or 7z (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Adding Hidden File Attribute via Attrib (eql)
  • ✅ Potential Local NTLM Relay via HTTP (eql)
  • ❌ Suspicious Remote Registry Access via SeBackupPrivilege (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Microsoft Exchange Server UM Spawning Suspicious Processes (eql)
  • ❌ Multiple Logon Failure from the same Source Address (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Disable Windows Firewall Rules via Netsh (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Process Execution Path - Alternate Data Stream (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Share Enumeration Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Disable Windows Event and Security Logs Using Built-in Tools (eql)
  • ❌ Multiple Logon Failure Followed by Logon Success (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution via MSSQL xp_cmdshell Stored Procedure (eql)
  • ❌ Suspicious Script Object Execution (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via TSClient Mountpoint (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Registry Persistence via AppCert DLL (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Service DACL Modification via sc.exe (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming DCOM Lateral Movement with MMC (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Network Connection via RunDLL32 (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious PDF Reader Child Process (eql)
  • ❌ Uncommon Registry Persistence Change (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Exchange Mailbox Export via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Network Logon Provider Registry Modification (eql)
  • ❌ Windows Service Installed via an Unusual Client (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PsExec Network Connection (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Process Spawned by a Host (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows CryptoAPI Spoofing Vulnerability (CVE-2020-0601 - CurveBall) (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell PSReflect Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell MiniDump Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ DNS Global Query Block List Modified or Disabled (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Deleting Backup Catalogs with Wbadmin (eql)
  • ✅ RDP Enabled via Registry (eql)
  • ❌ UAC Bypass Attempt via Privileged IFileOperation COM Interface (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Secure File Deletion via SDelete Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious PrintSpooler Service Executable File Creation (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Script with Veeam Credential Access Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ FirstTime Seen Account Performing DCSync (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Outbound Scheduled Task Activity via PowerShell (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ User Added to Privileged Group (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Persistence via PowerShell profile (eql)
  • ✅ Suspicious Execution via Scheduled Task (eql)
  • ❌ Unsigned DLL loaded by DNS Service (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential File Download via a Headless Browser (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Process Network Connection (eql)
  • ❌ Interactive Logon by an Unusual Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Discovery Related Windows API Functions (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ AdminSDHolder SDProp Exclusion Added (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming DCOM Lateral Movement via MSHTA (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Account Configured with Never-Expiring Password (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network Connection via Signed Binary (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ MsiExec Service Child Process With Network Connection (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ WebServer Access Logs Deleted (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Modification of the msPKIAccountCredentials (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Image File Execution Options Injection (eql)
  • ✅ Persistence via TelemetryController Scheduled Task Hijack (eql)
  • ❌ Scheduled Task Created by a Windows Script (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Access to LDAP Attributes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass via ICMLuaUtil Elevated COM Interface (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Modification of Boot Configuration (eql)
  • ✅ Unusual Service Host Child Process - Childless Service (eql)
  • ✅ Exporting Exchange Mailbox via PowerShell (eql)
  • ❌ Remote Computer Account DnsHostName Update (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Microsoft Exchange Server UM Writing Suspicious Files (eql)
  • ❌ Unusual Process For a Windows Host (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ First Time Seen Commonly Abused Remote Access Tool Execution (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Anomalous Process For a Windows Population (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ AdminSDHolder Backdoor (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Windows Error Manager Masquerading (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Active Directory Group Modification by SYSTEM (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual File Creation - Alternate Data Stream (eql)
  • ✅ Suspicious RDP ActiveX Client Loaded (eql)
  • ❌ Suspicious JetBrains TeamCity Child Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Modification of Accessibility Binaries (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Access to a Sensitive LDAP Attribute (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privilege Escalation via Rogue Named Pipe Impersonation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential Remote Desktop Tunneling Detected (eql)
  • ✅ Enumeration Command Spawned via WMIPrvSE (eql)
  • ❌ Suspicious ScreenConnect Client Child Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential File Transfer via Certreq (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Shadow Credentials added to AD Object (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious LSASS Access via MalSecLogon (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Microsoft Management Console File from Unusual Path (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ File with Right-to-Left Override Character (RTLO) Created/Executed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious WMIC XSL Script Execution (eql)
  • ❌ Potential PowerShell Obfuscated Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ PowerShell Script Block Logging Disabled (eql)
  • ❌ PowerShell Suspicious Payload Encoded and Compressed (kuery)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Temporarily Scheduled Task Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Windows Powershell Arguments (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Enumerating Domain Trusts via NLTEST.EXE (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Enumeration of Administrator Accounts (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Suspicious WMI Image Load from MS Office (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential WPAD Spoofing via DNS Record Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Command Prompt Network Connection (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Execution from a Mounted Device (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Executable File Creation with Multiple Extensions (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Enable Host Network Discovery via Netsh (eql)
  • ✅ Unusual Child Process of dns.exe (eql)
  • ❌ Potential WSUS Abuse for Lateral Movement (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential ADIDNS Poisoning via Wildcard Record Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming DCOM Lateral Movement with ShellBrowserWindow or ShellWindows (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Script with Clipboard Retrieval Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ A scheduled task was created (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Evasion via Windows Filtering Platform (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Encoded Executable Stored in the Registry (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Group Policy Discovery via Microsoft GPResult Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential PowerShell Pass-the-Hash/Relay Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remote Scheduled Task Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Script with Screenshot Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ SeDebugPrivilege Enabled by a Suspicious Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Zoom Child Process (eql)
  • ❌ Machine Learning Detected a Suspicious Windows Event with a High Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Credential Access via LSASS Memory Dump (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Explorer Child Process (eql)
  • ✅ Scheduled Tasks AT Command Enabled (eql)
  • ✅ Persistence via WMI Event Subscription (eql)
  • ✅ Hosts File Modified (eql)
  • ❌ Remote Scheduled Task Creation via RPC (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Command Shell Activity Started via RunDLL32 (eql)
  • ✅ Microsoft Build Engine Started by a Script Process (kuery)
  • ✅ Microsoft Build Engine Started by a System Process (eql)
  • ✅ Microsoft Build Engine Using an Alternate Name (eql)
  • ✅ Potential Credential Access via Trusted Developer Utility (eql)
  • ✅ Microsoft Build Engine Started an Unusual Process (kuery)
  • ❌ Process Injection by the Microsoft Build Engine (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Credential Access via DCSync (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ A scheduled task was updated (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ InstallUtil Process Making Network Connections (eql)
  • ❌ Potential LSASS Clone Creation via PssCaptureSnapShot (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Subsystem for Linux Distribution Installed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ DNS-over-HTTPS Enabled via Registry (eql)
  • ❌ PowerShell Mailbox Collection Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via local SxS Shared Module (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious MS Office Child Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Credential Acquisition via Registry Hive Dumping (eql)
  • ❌ Persistence via Hidden Run Key Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remotely Started Services via RPC (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Process Calling the Metadata Service (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious WerFault Child Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Outlook Home Page Registry Modification (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ WPS Office Exploitation via DLL Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Invoke-Mimikatz PowerShell Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Managed Code Hosting Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Signed Proxy Execution via MS Work Folders (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Suspicious Portable Executable Encoded in Powershell Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Execution via Microsoft Office Add-Ins (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Local Scheduled Task Creation (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Netsh Helper DLL (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network Connection via Compiled HTML File (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Endpoint Security Parent Process (eql)
  • ❌ Code Signing Policy Modification Through Built-in tools (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Clearing Windows Console History (eql)
  • ❌ Volume Shadow Copy Deleted or Resized via VssAdmin (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Script Interpreter Executing Process via WMI (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Potential Veeam Credential Access Command (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Privilege Escalation via Service ImagePath Modification (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Invoke-NinjaCopy script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Creation or Modification of Domain Backup DPAPI private key (eql)
  • ❌ Network Connection via MsXsl (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Kirbi File Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ UAC Bypass Attempt with IEditionUpgradeManager Elevated COM Interface (eql)
  • ❌ Group Policy Abuse for Privilege Addition (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ SolarWinds Process Disabling Services via Registry (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Network Activity (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Image Load (taskschd.dll) from MS Office (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Keylogging Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Print Spooler Point and Print DLL (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Potential Privileged Escalation via SamAccountName Spoofing (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via Windows Command Debugging Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Host Detected with Suspicious Windows Process(es) (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Searching for Saved Credentials via VaultCmd (eql)
  • ✅ Suspicious DLL Loaded for Persistence or Privilege Escalation (eql)
  • ❌ Creation or Modification of a new GPO Scheduled Task or Service (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Microsoft IIS Connection Strings Decryption (eql)
  • ❌ Mshta Making Network Connections (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Persistence via BITS Job Notify Cmdline (eql)
  • ✅ Mounting Hidden or WebDav Remote Shares (eql)
  • ✅ Suspicious Print Spooler File Deletion (eql)
  • ✅ Potential Remote Desktop Shadowing Activity (eql)
  • ❌ Potential Credential Access via Renamed COM+ Services DLL (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Installation of Custom Shim Databases (eql)
  • ✅ Microsoft Build Engine Started by an Office Application (eql)
  • ✅ Remote File Download via MpCmdRun (eql)
  • ❌ Unusual Network Connection via DllHost (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual File Modification by dns.exe (eql)
  • ✅ Suspicious Startup Shell Folder Modification (eql)
  • ✅ Disabling Windows Defender Security Settings via PowerShell (eql)
  • ❌ Potential PowerShell HackTool Script by Function Names (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ New ActiveSyncAllowedDeviceID Added via PowerShell (eql)
  • ✅ Execution from Unusual Directory - Command Line (eql)
  • ✅ Registry Persistence via AppInit DLL (eql)
  • ✅ Symbolic Link to Shadow Copy Created (eql)
  • ✅ Disabling User Account Control via Registry Modification (eql)
  • ✅ Clearing Windows Event Logs (eql)
  • ❌ Remote Windows Service Installed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privilege Escalation via Windir Environment Variable (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Service Command Lateral Movement (eql)
  • ❌ Modification of WDigest Security Provider (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Command Execution via SolarWinds Process (eql)
  • ❌ NTDS Dump via Wbadmin (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Volume Shadow Copy Deletion via PowerShell (eql)
  • ❌ Suspicious Windows Command Shell Arguments (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Code Signing Policy Modification Through Registry (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Service was Installed in the System (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Pass-the-Hash (PtH) Attempt (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network-Level Authentication (NLA) Disabled (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via Windows Subsystem for Linux (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Volume Shadow Copy Deletion via WMIC (eql)
  • ❌ Suspicious Execution from INET Cache (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Attempt to Install Kali Linux via WSL (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ NullSessionPipe Registry Modification (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Child Process from a System Virtual Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows User Calling the Metadata Service (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential privilege escalation via CVE-2022-38028 (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ KRBTGT Delegation Backdoor (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious .NET Reflection via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Subsystem for Linux Enabled via Dism Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Process Execution via Renamed PsExec Executable (eql)
  • ✅ Process Activity via Compiled HTML File (eql)
  • ✅ Connection to Commonly Abused Free SSL Certificate Providers (eql)
  • ❌ First Time Seen NewCredentials Logon Process (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Service Creation via Local Kerberos Authentication (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Kerberos Pre-authentication Disabled for User (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution of Persistent Suspicious Program (eql)
  • ❌ Unusual Execution via Microsoft Common Console File (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Service Control Spawned via Script Interpreter (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Installation of Security Support Provider (eql)
  • ❌ Host Files System Changes via Windows Subsystem for Linux (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Executable File Creation by a System Critical Process (eql)
  • ❌ Unusual Process Spawned by a Parent Process (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Script with Webcam Video Capture Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Kerberos Ticket Request (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Mimikatz Memssp Log File Detected (eql)
  • ✅ IIS HTTP Logging Disabled (eql)
  • ❌ Process Execution from an Unusual Directory (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ AdFind Command Activity (eql)
  • ❌ ImageLoad via Windows Update Auto Update Client (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Print Spooler Child Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Whoami Process Activity (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Child Processes of RunDLL32 (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ SIP Provider Modification (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ LSASS Memory Dump Creation (eql)
  • ❌ WMI Incoming Lateral Movement (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Remote Desktop File Opened from Suspicious Path (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Persistence via Microsoft Office AddIns (eql)
  • ❌ Sensitive Privilege SeEnableDelegationPrivilege assigned to a User (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Windows Script Executing PowerShell (eql)
  • ❌ Rare SMB Connection to the Internet (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Parent Process Detected with Suspicious Windows Process(es) (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Windows Firewall Disabled via PowerShell (eql)
  • ✅ Delete Volume USN Journal with Fsutil (eql)
  • ❌ Persistent Scripts in the Startup Directory (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Microsoft Exchange Worker Spawning Suspicious Processes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Modification of AmsiEnable Registry Key (eql)
  • ❌ Potential Active Directory Replication Account Backdoor (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Untrusted DLL Loaded by Azure AD Sync Service (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Browser Extension Install (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privileged Account Brute Force (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remote File Copy to a Hidden Share (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Suspicious Antimalware Scan Interface DLL (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network Connection via Registration Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass Attempt via Elevated COM Internet Explorer Add-On Installer (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential Application Shimming via Sdbinst (eql)
  • ✅ Suspicious CertUtil Commands (eql)
  • ❌ Svchost spawning Cmd (kuery)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ PowerShell Kerberos Ticket Dump (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Microsoft Windows Defender Tampering (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ MS Office Macro Security Registry Modifications (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Alternate Data Stream Creation/Execution at Volume Root Directory (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

@tradebot-elastic
Copy link

tradebot-elastic commented Mar 26, 2025

⛔️ Test failed

Results
  • ✅ Potential Credential Access via Windows Utilities (eql)
  • ✅ System Shells via Services (eql)
  • ✅ Potential Cookies Theft via Browser Debugging (eql)
  • ❌ Potential Credential Access via DuplicateHandle in LSASS (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ High Number of Process and/or Service Terminations (kuery)
  • ❌ Potential Escalation via Vulnerable MSI Repair (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential DLL Side-Loading via Microsoft Antimalware Service Executable (eql)
  • ✅ Conhost Spawned By Suspicious Parent Process (eql)
  • ❌ Enumerating Domain Trusts via DSQUERY.EXE (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential Evasion via Filter Manager (eql)
  • ✅ Remote Desktop Enabled in Windows Firewall by Netsh (eql)
  • ❌ Local Account TokenFilter Policy Disabled (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ First Time Seen Removable Device (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Anomalous Windows Process Creation (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ User account exposed to Kerberoasting (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Attempt to Establish VScode Remote Tunnel (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Peripheral Device Discovery (eql)
  • ❌ MsBuild Making Network Connections (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Sensitive Audit Policy Sub-Category Disabled (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential LSASS Memory Dump via PssCaptureSnapShot (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential DLL Side-Loading via Trusted Microsoft Programs (eql)
  • ❌ UAC Bypass via Windows Firewall Snap-In Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Script with Token Impersonation Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ User Detected with Suspicious Windows Process(es) (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Lsass Process Access (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Exploitation of an Unquoted Service Path Vulnerability (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Cmd Execution via WMI (eql)
  • ✅ Persistence via Scheduled Job Creation (eql)
  • ❌ Potential Ransomware Behavior - High count of Readme files by System (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Persistence via Time Provider Modification (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Scheduled Task Execution at Scale via GPO (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Remote File Download via Desktopimgdownldr Utility (eql)
  • ❌ File Creation Time Changed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Startup/Logon Script added to Group Policy Object (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Username (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Service (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Powershell Script (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows User Privilege Elevation Activity (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Remote User (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Renamed Utility Executed with Short Program Name (eql)
  • ❌ Script Execution via Microsoft HTML Application (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution of COM object via Xwizard (eql)
  • ❌ User Account Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming Execution via WinRM Remote Shell (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remote File Download via Script Interpreter (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ PowerShell Script with Encryption/Decryption Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass via DiskCleanup Scheduled Task Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution of File Written or Modified by PDF Reader (eql)
  • ❌ Creation of a DNS-Named Record (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Antimalware Scan Interface Bypass via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Network Activity from a Windows System Binary (eql)
  • ✅ Suspicious .NET Code Compilation (eql)
  • ✅ Creation or Modification of Root Certificate (eql)
  • ❌ Werfault ReflectDebugger Persistence (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ LSASS Memory Dump Handle Access (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Full User-Mode Dumps Enabled System-Wide (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Lateral Movement via Startup Folder (eql)
  • ❌ Potential PowerShell HackTool Script by Author (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Relay Attack against a Domain Controller (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Persistence via Update Orchestrator Service Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming Execution via PowerShell Remoting (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Account Password Reset Remotely (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Account Discovery Command via SYSTEM Account (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass Attempt via Windows Directory Masquerading (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Web Shell Detection: Script Process Child of Common Web Processes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Enumeration of Privileged Local Groups Membership (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Adobe Hijack Persistence (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Windows Defender Exclusions Added via PowerShell (eql)
  • ✅ Suspicious Microsoft Diagnostics Wizard Execution (eql)
  • ❌ Potential Foxmail Exploitation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Command and Scripting Interpreter via Windows Scripts (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Process Access via Direct System Call (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Wireless Credential Dumping using Netsh Command (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential File Transfer via Curl for Windows (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Renamed AutoIt Scripts Interpreter (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Process Injection via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Creation of a Hidden Local User Account (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Script with Audio Capture Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Windows Defender Disabled via Registry Modification (eql)
  • ❌ Bypass UAC via Event Viewer (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Program Files Directory Masquerading (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious MS Outlook Child Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Port Forwarding Rule Addition (eql)
  • ✅ Unusual Parent-Child Relationship (eql)
  • ✅ Suspicious ImagePath Service Creation (eql)
  • ✅ Persistence via Microsoft Outlook VBA (eql)
  • ✅ Potential DNS Tunneling via NsLookup (eql)
  • ❌ WDAC Policy File by an Unusual Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Parent Process for cmd.exe (eql)
  • ✅ NTDS or SAM Database File Copied (eql)
  • ❌ ScreenConnect Server Spawning Suspicious Processes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Execution via Windows Subsystem for Linux (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privilege Escalation via Named Pipe Impersonation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Process Creation CallTrace (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Command Execution via ForFiles (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Process Spawned by a User (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Persistence via Services Registry (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Control Panel Process with Unusual Arguments (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Process Creation via Secondary Logon (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Startup Persistence by a Suspicious Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Windows Path Activity (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Multiple Vault Web Credentials Read (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Event Logs Cleared (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Encrypting Files with WinRar or 7z (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Adding Hidden File Attribute via Attrib (eql)
  • ✅ Potential Local NTLM Relay via HTTP (eql)
  • ❌ Suspicious Remote Registry Access via SeBackupPrivilege (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Microsoft Exchange Server UM Spawning Suspicious Processes (eql)
  • ❌ Multiple Logon Failure from the same Source Address (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Disable Windows Firewall Rules via Netsh (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Process Execution Path - Alternate Data Stream (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Share Enumeration Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Disable Windows Event and Security Logs Using Built-in Tools (eql)
  • ❌ Multiple Logon Failure Followed by Logon Success (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution via MSSQL xp_cmdshell Stored Procedure (eql)
  • ❌ Suspicious Script Object Execution (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via TSClient Mountpoint (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Registry Persistence via AppCert DLL (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Service DACL Modification via sc.exe (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming DCOM Lateral Movement with MMC (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Network Connection via RunDLL32 (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious PDF Reader Child Process (eql)
  • ❌ Uncommon Registry Persistence Change (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Exchange Mailbox Export via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Network Logon Provider Registry Modification (eql)
  • ❌ Windows Service Installed via an Unusual Client (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PsExec Network Connection (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Process Spawned by a Host (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows CryptoAPI Spoofing Vulnerability (CVE-2020-0601 - CurveBall) (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell PSReflect Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell MiniDump Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ DNS Global Query Block List Modified or Disabled (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Deleting Backup Catalogs with Wbadmin (eql)
  • ✅ RDP Enabled via Registry (eql)
  • ❌ UAC Bypass Attempt via Privileged IFileOperation COM Interface (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Secure File Deletion via SDelete Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious PrintSpooler Service Executable File Creation (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Script with Veeam Credential Access Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ FirstTime Seen Account Performing DCSync (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Outbound Scheduled Task Activity via PowerShell (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ User Added to Privileged Group (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Persistence via PowerShell profile (eql)
  • ✅ Suspicious Execution via Scheduled Task (eql)
  • ❌ Unsigned DLL loaded by DNS Service (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential File Download via a Headless Browser (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Process Network Connection (eql)
  • ❌ Interactive Logon by an Unusual Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Discovery Related Windows API Functions (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ AdminSDHolder SDProp Exclusion Added (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming DCOM Lateral Movement via MSHTA (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Account Configured with Never-Expiring Password (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network Connection via Signed Binary (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ MsiExec Service Child Process With Network Connection (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ WebServer Access Logs Deleted (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Modification of the msPKIAccountCredentials (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Image File Execution Options Injection (eql)
  • ✅ Persistence via TelemetryController Scheduled Task Hijack (eql)
  • ❌ Scheduled Task Created by a Windows Script (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Access to LDAP Attributes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass via ICMLuaUtil Elevated COM Interface (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Modification of Boot Configuration (eql)
  • ✅ Unusual Service Host Child Process - Childless Service (eql)
  • ✅ Exporting Exchange Mailbox via PowerShell (eql)
  • ❌ Remote Computer Account DnsHostName Update (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Microsoft Exchange Server UM Writing Suspicious Files (eql)
  • ❌ Unusual Process For a Windows Host (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ First Time Seen Commonly Abused Remote Access Tool Execution (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Anomalous Process For a Windows Population (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ AdminSDHolder Backdoor (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Windows Error Manager Masquerading (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Active Directory Group Modification by SYSTEM (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual File Creation - Alternate Data Stream (eql)
  • ✅ Suspicious RDP ActiveX Client Loaded (eql)
  • ❌ Suspicious JetBrains TeamCity Child Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Modification of Accessibility Binaries (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Access to a Sensitive LDAP Attribute (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privilege Escalation via Rogue Named Pipe Impersonation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential Remote Desktop Tunneling Detected (eql)
  • ✅ Enumeration Command Spawned via WMIPrvSE (eql)
  • ❌ Suspicious ScreenConnect Client Child Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential File Transfer via Certreq (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Shadow Credentials added to AD Object (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious LSASS Access via MalSecLogon (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Microsoft Management Console File from Unusual Path (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ File with Right-to-Left Override Character (RTLO) Created/Executed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious WMIC XSL Script Execution (eql)
  • ❌ Potential PowerShell Obfuscated Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ PowerShell Script Block Logging Disabled (eql)
  • ❌ PowerShell Suspicious Payload Encoded and Compressed (kuery)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Temporarily Scheduled Task Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Windows Powershell Arguments (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Enumerating Domain Trusts via NLTEST.EXE (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Enumeration of Administrator Accounts (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Suspicious WMI Image Load from MS Office (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential WPAD Spoofing via DNS Record Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Command Prompt Network Connection (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Execution from a Mounted Device (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Executable File Creation with Multiple Extensions (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Enable Host Network Discovery via Netsh (eql)
  • ✅ Unusual Child Process of dns.exe (eql)
  • ❌ Potential WSUS Abuse for Lateral Movement (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential ADIDNS Poisoning via Wildcard Record Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Incoming DCOM Lateral Movement with ShellBrowserWindow or ShellWindows (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Script with Clipboard Retrieval Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ A scheduled task was created (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Evasion via Windows Filtering Platform (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Encoded Executable Stored in the Registry (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Group Policy Discovery via Microsoft GPResult Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential PowerShell Pass-the-Hash/Relay Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remote Scheduled Task Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Suspicious Script with Screenshot Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ SeDebugPrivilege Enabled by a Suspicious Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Zoom Child Process (eql)
  • ❌ Machine Learning Detected a Suspicious Windows Event with a High Malicious Probability Score (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Credential Access via LSASS Memory Dump (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Explorer Child Process (eql)
  • ✅ Scheduled Tasks AT Command Enabled (eql)
  • ✅ Persistence via WMI Event Subscription (eql)
  • ✅ Hosts File Modified (eql)
  • ❌ Remote Scheduled Task Creation via RPC (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Command Shell Activity Started via RunDLL32 (eql)
  • ✅ Microsoft Build Engine Started by a Script Process (kuery)
  • ✅ Microsoft Build Engine Started by a System Process (eql)
  • ✅ Microsoft Build Engine Using an Alternate Name (eql)
  • ✅ Potential Credential Access via Trusted Developer Utility (eql)
  • ✅ Microsoft Build Engine Started an Unusual Process (kuery)
  • ❌ Process Injection by the Microsoft Build Engine (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Credential Access via DCSync (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ A scheduled task was updated (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ InstallUtil Process Making Network Connections (eql)
  • ❌ Potential LSASS Clone Creation via PssCaptureSnapShot (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Subsystem for Linux Distribution Installed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ DNS-over-HTTPS Enabled via Registry (eql)
  • ❌ PowerShell Mailbox Collection Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via local SxS Shared Module (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious MS Office Child Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Credential Acquisition via Registry Hive Dumping (eql)
  • ❌ Persistence via Hidden Run Key Detected (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remotely Started Services via RPC (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Process Calling the Metadata Service (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious WerFault Child Process (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Outlook Home Page Registry Modification (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ WPS Office Exploitation via DLL Hijack (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Invoke-Mimikatz PowerShell Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Managed Code Hosting Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Signed Proxy Execution via MS Work Folders (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Suspicious Portable Executable Encoded in Powershell Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Execution via Microsoft Office Add-Ins (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Local Scheduled Task Creation (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Netsh Helper DLL (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network Connection via Compiled HTML File (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Endpoint Security Parent Process (eql)
  • ❌ Code Signing Policy Modification Through Built-in tools (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Clearing Windows Console History (eql)
  • ❌ Volume Shadow Copy Deleted or Resized via VssAdmin (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Script Interpreter Executing Process via WMI (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Potential Veeam Credential Access Command (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Privilege Escalation via Service ImagePath Modification (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Invoke-NinjaCopy script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Creation or Modification of Domain Backup DPAPI private key (eql)
  • ❌ Network Connection via MsXsl (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Kirbi File Creation (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ UAC Bypass Attempt with IEditionUpgradeManager Elevated COM Interface (eql)
  • ❌ Group Policy Abuse for Privilege Addition (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ SolarWinds Process Disabling Services via Registry (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows Network Activity (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Image Load (taskschd.dll) from MS Office (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Keylogging Script (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Print Spooler Point and Print DLL (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Potential Privileged Escalation via SamAccountName Spoofing (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via Windows Command Debugging Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Host Detected with Suspicious Windows Process(es) (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Searching for Saved Credentials via VaultCmd (eql)
  • ✅ Suspicious DLL Loaded for Persistence or Privilege Escalation (eql)
  • ❌ Creation or Modification of a new GPO Scheduled Task or Service (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Microsoft IIS Connection Strings Decryption (eql)
  • ❌ Mshta Making Network Connections (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Persistence via BITS Job Notify Cmdline (eql)
  • ✅ Mounting Hidden or WebDav Remote Shares (eql)
  • ✅ Suspicious Print Spooler File Deletion (eql)
  • ✅ Potential Remote Desktop Shadowing Activity (eql)
  • ❌ Potential Credential Access via Renamed COM+ Services DLL (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Installation of Custom Shim Databases (eql)
  • ✅ Microsoft Build Engine Started by an Office Application (eql)
  • ✅ Remote File Download via MpCmdRun (eql)
  • ❌ Unusual Network Connection via DllHost (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual File Modification by dns.exe (eql)
  • ✅ Suspicious Startup Shell Folder Modification (eql)
  • ✅ Disabling Windows Defender Security Settings via PowerShell (eql)
  • ❌ Potential PowerShell HackTool Script by Function Names (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ New ActiveSyncAllowedDeviceID Added via PowerShell (eql)
  • ✅ Execution from Unusual Directory - Command Line (eql)
  • ✅ Registry Persistence via AppInit DLL (eql)
  • ✅ Symbolic Link to Shadow Copy Created (eql)
  • ✅ Disabling User Account Control via Registry Modification (eql)
  • ✅ Clearing Windows Event Logs (eql)
  • ❌ Remote Windows Service Installed (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privilege Escalation via Windir Environment Variable (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Service Command Lateral Movement (eql)
  • ❌ Modification of WDigest Security Provider (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Command Execution via SolarWinds Process (eql)
  • ❌ NTDS Dump via Wbadmin (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Volume Shadow Copy Deletion via PowerShell (eql)
  • ❌ Suspicious Windows Command Shell Arguments (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Code Signing Policy Modification Through Registry (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious Service was Installed in the System (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential Pass-the-Hash (PtH) Attempt (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network-Level Authentication (NLA) Disabled (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Execution via Windows Subsystem for Linux (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Volume Shadow Copy Deletion via WMIC (eql)
  • ❌ Suspicious Execution from INET Cache (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Attempt to Install Kali Linux via WSL (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ NullSessionPipe Registry Modification (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Child Process from a System Virtual Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Windows User Calling the Metadata Service (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Potential privilege escalation via CVE-2022-38028 (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ KRBTGT Delegation Backdoor (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Suspicious .NET Reflection via PowerShell (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Windows Subsystem for Linux Enabled via Dism Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Suspicious Process Execution via Renamed PsExec Executable (eql)
  • ✅ Process Activity via Compiled HTML File (eql)
  • ✅ Connection to Commonly Abused Free SSL Certificate Providers (eql)
  • ❌ First Time Seen NewCredentials Logon Process (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Service Creation via Local Kerberos Authentication (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Kerberos Pre-authentication Disabled for User (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Execution of Persistent Suspicious Program (eql)
  • ❌ Unusual Execution via Microsoft Common Console File (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Service Control Spawned via Script Interpreter (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ Installation of Security Support Provider (eql)
  • ❌ Host Files System Changes via Windows Subsystem for Linux (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Unusual Executable File Creation by a System Critical Process (eql)
  • ❌ Unusual Process Spawned by a Parent Process (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Script with Webcam Video Capture Capabilities (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ PowerShell Kerberos Ticket Request (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Mimikatz Memssp Log File Detected (eql)
  • ✅ IIS HTTP Logging Disabled (eql)
  • ❌ Process Execution from an Unusual Directory (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ AdFind Command Activity (eql)
  • ❌ ImageLoad via Windows Update Auto Update Client (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Unusual Print Spooler Child Process (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Whoami Process Activity (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Unusual Child Processes of RunDLL32 (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ SIP Provider Modification (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ✅ LSASS Memory Dump Creation (eql)
  • ❌ WMI Incoming Lateral Movement (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Remote Desktop File Opened from Suspicious Path (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Persistence via Microsoft Office AddIns (eql)
  • ❌ Sensitive Privilege SeEnableDelegationPrivilege assigned to a User (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Windows Script Executing PowerShell (eql)
  • ❌ Rare SMB Connection to the Internet (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Parent Process Detected with Suspicious Windows Process(es) (-)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Windows Firewall Disabled via PowerShell (eql)
  • ✅ Delete Volume USN Journal with Fsutil (eql)
  • ❌ Persistent Scripts in the Startup Directory (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Microsoft Exchange Worker Spawning Suspicious Processes (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Modification of AmsiEnable Registry Key (eql)
  • ❌ Potential Active Directory Replication Account Backdoor (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Untrusted DLL Loaded by Azure AD Sync Service (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Browser Extension Install (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Privileged Account Brute Force (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Remote File Copy to a Hidden Share (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ Suspicious Antimalware Scan Interface DLL (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Network Connection via Registration Utility (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ UAC Bypass Attempt via Elevated COM Internet Explorer Add-On Installer (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ✅ Potential Application Shimming via Sdbinst (eql)
  • ✅ Suspicious CertUtil Commands (eql)
  • ❌ Svchost spawning Cmd (kuery)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ PowerShell Kerberos Ticket Dump (kuery)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Microsoft Windows Defender Tampering (eql)
    • stack_validation_failed: no_alerts - 0 alerts
  • ❌ MS Office Macro Security Registry Modifications (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta
  • ❌ Alternate Data Stream Creation/Execution at Volume Root Directory (eql)
    • coverage_issue: no_rta
    • stack_validation_failed: no_rta

Copy link
Contributor

@Mikaayenson Mikaayenson left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Rule changes are for dropping min_stack support of 8.14

@eric-forte-elastic
Copy link
Contributor

Need to force merge as this is a major version release (9.0) and backporting will not occur and thus the status cannot be updated until this merges.

@eric-forte-elastic eric-forte-elastic merged commit e8c5416 into main Mar 26, 2025
13 of 14 checks passed
@eric-forte-elastic eric-forte-elastic deleted the prep-for-next-release-9.1 branch March 26, 2025 15:04
r0ot added a commit to VigilantSec/detection-rules that referenced this pull request Apr 16, 2025
* Temporaily Disable Changed FIles Workflow (elastic#4538)

* Temporaily Disable Changed FIles Workflow

* bump version

* Add new ML detection rules for Privileged Access Detection (elastic#4516)

Add detection-rules for privileged access detection integration

* Revert "Add new ML detection rules for Privileged Access Detection (elastic#4516)" (elastic#4548)

This reverts commit 2ff8d1b.

* Min stack rules from 4516 (elastic#4549)

* Update defense_evasion_posh_assembly_load.toml (elastic#4543)

Co-authored-by: Jonhnathan <[email protected]>

* Change description and name of problemchild ML detection-rules (elastic#4545)

Changed description and name of problemchild ML detection-rules

* Prep for Release 9.0 (elastic#4550)

* [ci] Add new docs-builder automation. (elastic#4507)

* Add new docs automation

* Add path-pattern filters for documentation folders

* Update .github/workflows/docs-build.yml

Co-authored-by: Jan Calanog <[email protected]>

---------

Co-authored-by: Mika Ayenson, PhD <[email protected]>
Co-authored-by: Terrance DeJesus <[email protected]>
Co-authored-by: Jan Calanog <[email protected]>
Co-authored-by: Sergey Polzunov <[email protected]>

* [FR] Bump changed-files Version to Patched Version (elastic#4542)

* Bump changed-files Version to Patched Version

* patch bump

* reenable workflow

* Use full length commit hash

* Bump 44 to 46

---------

Co-authored-by: shashank-elastic <[email protected]>

* [New Rule] Adding Coverage for DynamoDB Exfiltration Behaviors (elastic#4535)

* new rules for AWS DynamoDB data exfiltration

* bumping patch version

* adjusting investigation guide

* updating patch version

* updating patch version

* updating patch version

---------

Co-authored-by: Colson Wilhoit <[email protected]>

* fix: removing outdated code in Kibana client auth (elastic#4495)

* Simplify kibana session management

* Drop removed options from `kibana_args` set

* Style fix

* Patch version bump

* Bumping kibana lib version

* Relax CLI requirement, making `api_key` optional, to allow `help` to run

* Create new detection rule set documentation to be included in the new docs. (elastic#4508)

* move docs folder to docs-dev

* Add new docs folder

* update docset.yml to reflect latest usage

* Add rules_building_block folder

* revert changes to docs-dev/experimental-machine-learning/url-spoof.md

* bump patch versions

* revert bump

---------

Co-authored-by: Mika Ayenson, PhD <[email protected]>
Co-authored-by: Terrance DeJesus <[email protected]>

* fixing double header in investigation notes (elastic#4490)

* [Bug] Update Custom Rules Markdown Location (elastic#4565)

* Update to custom-rules markdown location

* bump version

* Update link reference

* Prep main for 9.1 (elastic#4555)

* Prep for Release 9.1

* Update Patch Version

* Update Patch version

* Update Patch version

* [Rule Tuning] Added OWA (outlook for web) new AppID (elastic#4568)

* Added OWA (outlook for web) new AppID

**Title:** Add new Outlook for Web AppID to abnormal Microsoft 365 ClientAppID rule

**Description:**

This pull request updates the `initial_access_microsoft_365_abnormal_clientappid` rule to include the newly introduced Outlook for Web AppID:
- **New AppID**: `9199bf20-a13f-4107-85dc-02114787ef48`

### Context

Outlook for Web (OWA) is migrating to a new authentication platform using MSAL and a Single Page Application (SPA) auth model. As part of this backend change, Microsoft is replacing the existing OWA AppID with a new one. This change is being rolled out during the first half of calendar year 2024, with full deployment expected by Q4 2024.
- **Old OWA AppID**: `00000002-0000-0ff1-ce00-000000000000`
- **New OWA AppID**: `9199bf20-a13f-4107-85dc-02114787ef48`
    

Although no action is required for tenant administrators, this new AppID may show up in logs and should be accounted for in detections relying on known legitimate ClientAppIDs.

### Why this change?

The rule `initial_access_microsoft_365_abnormal_clientappid` flags potentially suspicious or unauthorized client applications accessing Microsoft 365 services. To prevent false positives caused by this official change from Microsoft, this PR adds the new OWA AppID to the allowlist.

### References
- Microsoft 365 Message Center notice (ref: MC715025)
- [MSAL documentation](https://learn.microsoft.com/en-us/azure/active-directory/develop/msal-overview)

* Update initial_access_microsoft_365_abnormal_clientappid.toml

Updated updated_date

* Update Max signals value to supported limits (elastic#4556)

* Update ATT&CK coverage URL(s) in docs-dev/ATT&CK-coverage.md (elastic#4571)

* deprecating 'Azure Virtual Network Device Modified or Deleted' (elastic#4559)

* tuning 'Azure Conditional Access Policy Modified' (elastic#4558)

* [Rule Tuning] Tuning Illicit Grant Consent Detections in Azure and M365 (elastic#4557)

* tuning Azure rule for illicit grant activity; creating new rule for M365

* Update rules/integrations/o365/initial_access_microsoft_365_illicit_consent_grant_via_registered_application.toml

* Update rules/integrations/azure/initial_access_entra_illicit_consent_grant_via_registered_application.toml

* adjusted tags

* Update rules/integrations/azure/initial_access_entra_illicit_consent_grant_via_registered_application.toml

* Update defense_evasion_microsoft_defender_tampering.toml (elastic#4573)

Co-authored-by: Jonhnathan <[email protected]>

* [Rule Tuning] O365 Exchange Suspicious Mailbox Right Delegation (elastic#4589)

* Update docset.yml (elastic#4590)

Remove diagnostic hint

* [New] Unusual Network Connection to Suspicious Web Service (elastic#4569)

* [New] Unusual Network Connection to Suspicious Web Service

* Update rule threat order

---------

Co-authored-by: Eric Forte <[email protected]>
Co-authored-by: eric-forte-elastic <[email protected]>
Co-authored-by: Mika Ayenson, PhD <[email protected]>

* [New] Unusual Network Connection to Suspicious Top Level Domain (elastic#4563)

* [Rule Tuning] Add Host Metadata to ES|QL Aggregation Rules (elastic#4592)

Co-authored-by: Mika Ayenson, PhD <[email protected]>

* Add investigation guides (elastic#4600)

* [Rule Tuning] Suspicious Execution via Scheduled Task (elastic#4599)

* Lock versions for releases: 8.14,8.15,8.16,8.17,8.18,9.0 (elastic#4601)

* [FN Tuning] Shared Object Created or Changed by Previously Unknown Pr… (elastic#4529)

* [FN Tuning] Shared Object Created or Changed by Previously Unknown Process

* Update process exclusions in TOML file

---------

Co-authored-by: Colson Wilhoit <[email protected]>
Co-authored-by: shashank-elastic <[email protected]>
Co-authored-by: Terrance DeJesus <[email protected]>
Co-authored-by: Eric Forte <[email protected]>

* [D4C Conversion] Converting Compatible D4C Rules to DR (elastic#4532)

* [D4C Conversion] Converting Compatible D4C Rules to DR

* added host.os.type

* Rename

* Update rules/linux/execution_container_management_binary_launched_inside_container.toml

Co-authored-by: Isai <[email protected]>

* Update rules/linux/privilege_escalation_debugfs_launched_inside_container.toml

Co-authored-by: Isai <[email protected]>

* Update rules/linux/privilege_escalation_debugfs_launched_inside_container.toml

Co-authored-by: Isai <[email protected]>

* Update rules/linux/privilege_escalation_mount_launched_inside_container.toml

Co-authored-by: Isai <[email protected]>

* Update rules/linux/privilege_escalation_mount_launched_inside_container.toml

Co-authored-by: Isai <[email protected]>

---------

Co-authored-by: Isai <[email protected]>
Co-authored-by: shashank-elastic <[email protected]>
Co-authored-by: Terrance DeJesus <[email protected]>
Co-authored-by: Mika Ayenson, PhD <[email protected]>

* Remove Task List reference (elastic#4605)

* [FR] Update Detection Rules MITRE Workflow to SHA Pin  (elastic#4581)

* Update to pinned hash

* version bump

* [FR] Add Kibana Action Connector Error to Exception List Workaround (elastic#4583)

* Add error catch for workaround

* Switch to set for efficiency

* Patch version bump

---------

Co-authored-by: Mika Ayenson, PhD <[email protected]>

* [Rule Tuning] SSH Authorized Keys File Deletion (elastic#4591)

Co-authored-by: Mika Ayenson, PhD <[email protected]>

* [Rule Tuning] Suspicious WMI Event Subscription Created (elastic#4618)

* [Rule Tuning] Suspicious Execution via Scheduled Task

* [Rule Tuning] Suspicious WMI Event Subscription Created

* [Rule Tuning] Adjusting `Microsoft Entra ID Rare Authentication Requirement for Principal User` (elastic#4562)

* tuning 'Microsoft Entra ID Rare Authentication Requirement for Principal User'

* updated MITRE ATT&CK mappings

* updated index target

* updated patch version

* updating patch version

* bumping patch version

* updating patch version

* [Rule Tuning] Tuning `Azure Service Principal Credentials Added` (elastic#4570)

* tuning 'Azure Service Principal Credentials Added'

* updated patch version

* added investigation guide

* updating patch version

* updating patch version

* [FR] Add Support for Local Dates Flag (elastic#4582)

* Add support for local dates flag

* Use two variables

* Add support for import-rules-to-repo

* Revert arg formatting

* Update comment

* Pass Rule Path as Path Object

* Update to rule loader function

* Streamline metadata function

* Also support dictionaries

* Bump patch version

* Reduce complexity

* Add if path exists check

* Fix version bump

* Feature exclude tactic name (elastic#4593)

* Added new cli flag to exclude tactic name in rule file name

* added a shortcut for the flag and adjusted CLI readme

* Add no tactic flag also to import to prevent warnings

* Added info about unit test

* version bump

* Added no_tactic_filename as config option + fixed linting

* pyproject version bump

---------

Co-authored-by: Mika Ayenson, PhD <[email protected]>
Co-authored-by: Eric Forte <[email protected]>

---------

Co-authored-by: Eric Forte <[email protected]>
Co-authored-by: Kirti Sodhi <[email protected]>
Co-authored-by: Samirbous <[email protected]>
Co-authored-by: Jonhnathan <[email protected]>
Co-authored-by: shashank-elastic <[email protected]>
Co-authored-by: Martijn Laarman <[email protected]>
Co-authored-by: Mika Ayenson, PhD <[email protected]>
Co-authored-by: Terrance DeJesus <[email protected]>
Co-authored-by: Jan Calanog <[email protected]>
Co-authored-by: Sergey Polzunov <[email protected]>
Co-authored-by: Colson Wilhoit <[email protected]>
Co-authored-by: M. Visser <[email protected]>
Co-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>
Co-authored-by: eric-forte-elastic <[email protected]>
Co-authored-by: Ruben Groenewoud <[email protected]>
Co-authored-by: Isai <[email protected]>
Co-authored-by: Frederik Berg <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport: auto Domain: Endpoint enhancement New feature or request ML machine learning related rule OS: Windows windows related rules patch python Internal python for the repository schema
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants