LoFP LoFP / t1566.002

t1566.002

TitleTags
administrators that submit known phishing training exercises.
false positives are expected from legitimate applications generating events that are similar to those generated by malicious activity. for example, event id 1122 is generated when a process attempts to load a dll that is blocked by an asr rule. this can be triggered by legitimate applications that attempt to load dlls that are not blocked by asr rules. this is audit only.
false positives are expected to occur, since `.lnk` files can be created legitimately by users or applications. to reduce false positives. to reduce noise, think of joining this to the process that created the lnk file and see if it's a known good process.
false positives are not expected with this analytic, since it is a hunting analytic. it is meant to show the use of asr rules and how they can be used to detect malicious activity.
in most organizations, device code authentication will be used to access common microsoft service but it may be legitimate for others. filter as needed.
legitimate users may have to use ssm to perform actions against machines in the cloud to update or maintain them
no false positives have been identified at this time.
there are legitimate uses of ssm to send commands to ec2 instances
unknown