Use Case Library
Use Case Library
Initial Access *
Initial Access *
Exploit Public-Facing
Initial Access Application
Execution *
Execution *
Execution *
Execution *
Execution *
Execution *
Execution *
Execution *
Execution *
Execution *
Execution PowerShell
Execution PowerShell
Execution PowerShell
Execution PowerShell
Execution PowerShell
Execution PowerShell
Execution PowerShell
Execution PowerShell
Execution *
Execution *
Exploitation for Client
Execution Execution
Exploitation for Client
Execution Execution
Execution *
Execution *
Execution *
Execution *
Persistence *
Persistence Valid Accounts
Persistence Valid Accounts
Persistence Valid Accounts
Persistence Valid Accounts
Persistence Valid Accounts
Lateral Movement *
Lateral Movement Valid Accounts
Lateral Movement *
Exfiltration Over
Exfiltration Alternative Protocol
Exfiltration Over
Command and Control
Exfiltration Channel
Exfiltration Over
Exfiltration Alternative Protocol
Exfiltration Over
Command and Control
Exfiltration Channel
Exfiltration Over
Command and Control
Exfiltration Channel
Exfiltration Over
Exfiltration Alternative Protocol
Exfiltration Over
Exfiltration Alternative Protocol
Exfiltration Over
Exfiltration Alternative Protocol
Exfiltration Over
Command and Control
Exfiltration Channel
Exfiltration Over
Command and Control
Exfiltration Channel
Exfiltration Over
Command and Control
Exfiltration Channel
Exfiltration Over
Exfiltration Alternative Protocol
Exfiltration Over
Command and Control
Exfiltration Channel
Exfiltration Over
Exfiltration Alternative Protocol
Rootkits Malware
Unique certificate added Malware
Promiscuous Mode Network Sniffing Physical Access
Endpoint
Protection,
Microsoft\
Windows\
Unauthorized USB/Disc/etc DriverFramewo
rks-UserMode
Transaction on
UDMF host
process
Cloud Mail,
Improbable distance between remote logins based on geo-IP VPN, VDI,
IDAM, NPS
Cloud Mail,
User logon from risky IP or a country where no business exists VPN, VDI,
IDAM, NPS
Active account with last accessed time > 30 days AD, OIM
Domain or local admin account logon directly to device Windows 4624
User logons between 1am and 4am local time Windows 4624
Windows 528,
Use of local authentication after machine is attached to domain
Unix secure log
Web Servers,
Repeated exploit attempts per application
WAF
Email from IP address (not domain) or email with attachment from first-time
Mail
sender
Excessive emails sent from internal user/system Mail
Long tail analysis on local host file Custom script
New MAC address in ARP table Custom script
File download from high risk domain, wordpress site, root directory,
Proxy
hardcoded IP, or randomly generated domain
File downloaded with no extention or double extension Proxy
SQL SELECT injection Database
Network
Unauthorized wireless access point connected to the network
Scanner
Alert when users deviate from normal login behavior, such as time-of-day,
Windows 4624
workstation location and duration.
Unix crontab events Custom script
Windows
Suspicious scheduled task created
602/4698
Windows
Scheduled task quickly created then deleted
602/4698/4699
At.exe running on system (schedules commands to run) Windows 4688
Malicious file detected by Sandbox Sandbox Tool
Endpoint
Multiple malware alerts on single machine; different malware
Protection
Endpoint
Multiple malware alerts on single machine; same malware
Protection
Endpoint
Multiple malware alerts on multiple machines; same malware
Protection
Endpoint
Heuristic malware detection
Protection
Endpoint
Malware not quarantined or deleted
Protection
Endpoint
Malware blocked on critical system
Protection
Endpoint
Potentially Unwanted Program
Protection
Ransomware infected file uploaded to cloud O365
Endpoint
Multiple infected devices in same site within 48 hours
Protection
Base64 encoded commands (“-enc”) or (?<base64_code>[A-Za-z0-9+/]{50,}[=] PowerShell
{0,2}) Transcription
PowerShell
“-NonI” – non-interactive; run command without showing prompt
Script Block
PowerShell
“-NoP” – no profile
Script Block
PowerShell
Long command line (>500)
Script Block
PowerShell
Execution of downloaded code (“iex” + “Net.WebClient”)
Script Block
PowerShell
Known bad commands – (wmi, dll, etc.)
Script Block
PowerShell
PowerShell cmdlet not seen before
Script Block
PowerShell
PowerShell invoked outside of powershell (sysmon)
Script Block
Windows
First time application installed on any Hershey device AppLocker,
Windows 11707
Windows
Software installation blocked AppLocker,
Windows 11707
Endpoint
Multiple infected devices in same subnet within 48 hours
Protection
Endpoint
Hack tool installed or run
Protection
Suspicious process executed on a critical host (certutil, etc.) Windows 4688
Endpoint
Use of Remote Execution Tool (RET)
Protection
IDS detecting an attack based on a known signature IDS
Configuration change from baseline MBSA
Windows events: runas Windows 4648
New user account created outside of naming convention Windows 4720
Monitor attempts to access deactivated accounts through audit logging. IDAM
Rapid account creation Windows 4720
Account created not by designated service account Windows 4720
Unix auth.log
groupadd/usera
dd/chfn,
New local user or group created
Windows
4720/4722/472
0
Windows 4720,
Account created and deleted within a day
4725, 4726
Account that cannot be associated with a business process or business owner IDAM
Windows 4624,
Direct access to root user
Unix secure log
Windows 4642,
NTLM authentication to remote system (failed Kerberos)
4822, 4823
Windows
Windows security log cleared 517/1104/104//
1102
WinRegMon,
Modification of critical registry keys/values in HKLM/HKLU
Windows 4657
Microsoft
Long tail analysis on processes
Sysmon
Change to OS binaries outside of patches FIM
Long tail analysis on local certificate store Custom script
Empty result in CAM table indicates device listening in promiscuous mode Switches
Logon attempt using password exploit tool. Some tools leave artificats that can Windows
indicate misuse of authentication. Detect by matching the random regex 4625/4624
Endpoint
Protection,
Internal or External vulnerability scanning from unknown source
Firewall, IDS,
IPS
Multiple network share access attempts from internal host Windows 5140
Microsoft
Permission denied when attempting to access network resource
Sysmon
Endpoint
Honey Token Accessed or Used
Protection
Non-technical user logged onto multiple machines within 24 hours Windows 4624
Windows
PSExec from new source or to new destination 7045/4697/514
0
Endpoint
Protection,
Blocked traffic from internal device
Firewall, IDS,
IPS
Logon event not from network domain, Entropy in source workstation name Windows 4624
eDiscovery action taken by user not authorized to interact with eDiscovery Mail
Packet
Unauthorized Use of Encryption (not decryptable by inspection tools)
Inspection tools
Proxy, Firewall,
Large outbound transfer
Netflow, IDS
Proxy, Firewall,
More bytes uploaded than downloaded from source over 24 hours
Netflow, IDS
Anomalous network connections between devices on the same subnet (1 out Proxy, Firewall,
of 15 HR systems spikes in bytes uploaded) Netflow, IDS
HTTP PUT or POST to non-approved site, threat domain, hardcoded IP, Proxy, Firewall,
pastebin IDS
Exfil over SMTP (SMTP traffic NOT sent to Microsoft) IDS, Firewall
Exfil over ICMP (abnormal ICMP size / lengthy ICMP session) IDS, Firewall
Proxy, Firewall,
Outbound connection to bad domain, IP (C2) or non-business country
IDS
Proxy, Firewall,
Outbound BitTorrent traffic
IDS
Proxy, Firewall,
Excessive volume of HTTP POST commands
IDS
Data Loss Protection alerts reviewed DLP
Endpoint
Protection,
Unauthorized remote admin tools (VNC)
Microsoft
AppLocker
Protocol communication to unauthorized server (DNS, NTP, SQL traffic to
Netflow
devices that don’t host the service)
Proxy, Firewall,
Z-score deviation from #, length, or volume of network connections
IDS
Spike in number of destination IP network connections by source IP Netflow
Persistent connections (>4 hours) not including VPN, backup, screen share, etc. Netflow
DNS query for new domain (last 3 months) excluding Alexa TOP 1M DNS
IDS, Firewall,
DNS, RITA,
Beaconing system
persistent.pl,
Flare
Proxy, Firewall,
Usage of anonymization services (TOR, etc.)
IDS, DNS
VPN logins from suspicious locations VPN
Proxy, Firewall,
Communication with external IP/service on threat list
IDS, Netflow
DNS request for domain not previously requested (dynamic whitelist) DNS
DNS resolution for unauthorized WPAD proxy (wpad.*) DNS
DNS resolution for unauthorized NTP server (time.*, ntp.*) DNS
DNS resolution for unauthorized windows update server (not SCCM) DNS
Repetitive DNS Calls with TTLs < 300, answers with reply record count > 12,
DNS
persistent callbacks
DNS query to external DNS server (non-Infoblox DNS traffic) IDS, Firewall
Proxy, DNS,
Communication with Dynamically Generated Domain (high entropy) Netflow, IDS,
freq.py
Communication to/from domain similar to company brand (her5heys.com) via DNS, Proxy,
DNS, HTTP, Email Netflow, IDS
Network
New port listening on device
Scanner
Service account starting unique process Windows 4688
Windows 7045,
Netflow,
Unauthorized port, service, or protocol detected on a system. Long-tail Network
analysis. Be more suspicious of new services on workstations Scanner,
Microsoft
sysmon