Login
Sign Up
Toggle navigation
Knowledge on Demand
Threat Research
More
Blogs and News
Events
Threat Research
Threat Research
Tags: Sigma
System File Execution Location Anomaly
Identifies when a legitimate Windows system executable normally found in the system directory is launched from an unusual or unexpected location....
2/17/2026
0
Read More »
Windows Suspicious Child Process from Node.js - React2Shell
Identifies suspicious child processes launched by Node.js server processes on Windows, which may signal exploitation of vulnerabilities such as CVE-2025-55182 (React2Shell)....
1/2/2026
0
Read More »
Local File Read Using Curl.EXE
Identifies the execution of curl.exe using the file:// protocol to access and read local files....
12/31/2025
0
Read More »
Suspicious File Created by ArcSOC.exe
Identifies cases where the ArcGIS Server process (ArcSOC.exe), responsible for hosting REST services, creates files with suspicious types that may indicate executables, scripts, or other anomalous files....
12/24/2025
0
Read More »
Suspicious ArcSOC.exe Child Process
Identifies script interpreters, command-line utilities, and other potentially suspicious child processes spawned by ArcSOC.exe. ArcSOC.exe is the process responsible for hosting ArcGIS Server REST services....
12/22/2025
0
Read More »
HTML File Opened From Download Folder
Detects instances where a web browser process opens an HTML file from a user’s Downloads folder. This behavior may be indicative of phishing activity, in which threat actors distribute HTML attachments to users. Opening such attachments can result in the execution of malicious scripts or the delivery of malware....
12/17/2025
0
Read More »
Grixba Malware Reconnaissance Activity
Detects the use of the Grixba reconnaissance tool through characteristic command-line patterns. Grixba, employed by the Play ransomware group, supports pre-attack operations such as network scanning, data collection, and clearing of event logs....
11/28/2025
0
Read More »
Potentially Suspicious NTFS Symlink Behavior Modification
Detects changes to NTFS symbolic link settings via fsutil, which may allow remote-to-local or remote-to-remote symlinks that could be abused in attacks....
11/20/2025
0
Read More »
Suspicious CertReq Command to Download
Detects a suspicious CertReq execution that initiates a file download. This activity is commonly associated with attackers attempting to retrieve additional payloads or configuration files....
11/7/2025
0
Read More »
Exploitation Activity of CVE-2025-59287 - WSUS Suspicious Child Process
Monitors for instances where command-line interpreters like cmd.exe or powershell.exe are spawned as child processes of the WSUS service (wsusservice.exe). This behavior strongly indicates potential exploitation of a critical remote code execution vulnerability, such as CVE-2025-59287, where attackers may launch shells to perform reconnaissance or additional malicious actions....
11/3/2025
0
Read More »
Looking for Something?
Threat Research Categories:
Threat Research
928
Tags
Subscription
Please enter a valid email address.
Info