LoFP LoFP / t1204

t1204

TitleTags
3rd party tool may have commandline parameter that can trigger this detection.
a new and unusual program or artifact download in the course of software upgrades, debugging, or troubleshooting could trigger this alert. users downloading and running programs from unusual locations, such as temporary directories, browser caches, or profile paths could trigger this alert.
administrators deploying legitimate binaries to public folders.
all kind of software downloads
all kinds of software downloads
business workflows that occur very occasionally, and involve a business relationship with an organization in a country that does not routinely appear in network events, can trigger this alert. a new business workflow with an organization in a country with which no workflows previously existed may trigger this alert - although the model will learn that the new destination country is no longer anomalous as the activity becomes ongoing. business travelers who roam to many countries for brief periods may trigger this alert.
false positives should be very unlikely.
google workspace users typically share drive resources with a shareable link where parameters are edited to indicate when it is viewable or editable by the intended recipient. it is uncommon for a user in an organization to manually copy a drive object from an external drive to their corporate drive. this may happen where users find a useful spreadsheet in a public drive, for example, and replicate it to their drive. it is uncommon for the copied object to execute a container-bound script either unless the user was intentionally aware, suggesting the object uses container-bound scripts to accomplish a legitimate task.
legitimate administrative actions using mmc to execute misnamed `.msc` files.
legitimate applications packaged with advanced installer using package support framework
legitimate applications using runmru with http links
legitimate installation of new application.
legitimate installation of unsigned packages for legitimate purposes such as development or testing
legitimate macro usage. add the appropriate filter according to your environment
legitimate usage of deno to request a file or bring a dll to a host
legitimate use of powershell or other utilities launched from browser extensions or automation tools
misconfiguration, system reboot, network issues or expected uninstall of the elastic defend agent.
newly setup system.
no false positives have been identified at this time.
operators can execute third party tools using these parameters.
rare legitimate usage of some of the extensions mentioned in the rule
signals are generated by microsoft defender for office 365. false-positives may occur if legitimate user activity is misclassified as a threat.
some legitimate applications installation which have been missed from filtering can generate fps, thus baselining and tuning is recommended before deploying to production
some legitimate processes may be only rarely executed in your environment. apply additional filters as needed.
some tuning might be required to allow or remove certain locations used by the rule if you consider them as safe locations
system updates, scheduled backups, or misconfigured services may trigger this alert.
the html help executable program (hh.exe) runs whenever a user clicks a compiled help (.chm) file or menu item that opens the help file inside the help viewer. this is not always malicious, but adversaries may abuse this technology to conceal malicious code.
third party tool may have same command line parameters as revil ransomware.
this rule is to explore new applications on an endpoint. false positives depends on the organization.
trusted webdav shares used to host trusted content.
unconventional but non-malicious usage of rlo or reversed extensions.
unknown
unknown flash download locations
unlikely
unlikely in most cases, further investigation should be done in the commandline of the browser process to determine the context of the url accessed.
unlikely, since this event notifies about blocked application execution. tune your applocker rules to avoid blocking legitimate applications.
users running scripts in the course of technical support operations of software upgrades could trigger this alert. a newly installed program or one that runs rarely as part of a monthly or quarterly workflow could trigger this alert.