EDR / Host Alerts Flashcards

EDR / Host Alerts (30 cards)

1
Q

What does an alert for “Credential Dumping via LSASS Access” indicate?

A

Potential attempt to extract credentials from memory using tools like Mimikatz.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does a “Suspicious PowerShell Activity” alert mean?

A

PowerShell is being used for potentially malicious scripting or execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is indicated by “Parent Process Anomaly”?

A

A process spawned from an unexpected or uncommon parent (e.g., Word spawning PowerShell).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does “Execution from Suspicious Directory” alert indicate?

A

A binary or script is running from locations like C:\Users\Public or Temp, often abused by attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does “Unsigned Binary Execution” typically imply?

A

An untrusted or possibly malicious executable is running without a digital signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does an alert for “PSEXEC or Remote Admin Tool Detected” mean?

A

Lateral movement using remote execution tools; could be legitimate or malicious.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does “Process Hollowing Detected” indicate?

A

A legitimate process is being used to hide malicious code – often used in malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What alert might indicate exploitation of a zero-day vulnerability?

A

Execution of a suspicious process following unexpected software crash or vulnerability trigger.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does “Encoded Command in PowerShell” mean?

A

Obfuscated commands (e.g., base64) that may hide malicious behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does “Registry Modification for Persistence” alert indicate?

A

Potential attempt to establish persistence by modifying Run keys or other autorun locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does “User Added to Local Administrators Group” alert mean?

A

Possible privilege escalation or lateral movement attempt.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does “New Service Creation” on a host imply?

A

An attacker may be installing a backdoor or creating persistence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does “Scheduled Task Creation” indicate?

A

Potential attempt at persistence or automation of malicious behavior.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does an alert for “Local Account Enumeration” mean?

A

The attacker may be performing reconnaissance on local users for privilege escalation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does “Token Impersonation or Theft” alert suggest?

A

An attacker may be using stolen tokens to impersonate a privileged user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does “Script Block Logging Alert” indicate in PowerShell?

A

A PowerShell script attempted to execute potentially harmful commands.

17
Q

What does “Suspicious File Written to Startup Folder” mean?

A

Possible malware attempting persistence by executing on system boot.

18
Q

What is indicated by “Macros Enabled in Office Document”?

A

User may have enabled macros in a phishing document, potentially leading to malware.

19
Q

What does “Executable File Downloaded via Browser” alert mean?

A

A user or malware has downloaded a potentially dangerous executable.

20
Q

What does “Scripting Engine Abuse (wscript/cscript)” suggest?

A

Possible use of Windows scripting engines for malware execution.

21
Q

What does an “Unusual Outbound Connection to Rare IP” mean?

A

Potential command-and-control (C2) communication or data exfiltration.

22
Q

What does “SMB or RDP from Unusual Host” alert suggest?

A

Lateral movement using network protocols from unexpected endpoints.

23
Q

What does “Reverse Shell Behavior Detected” mean?

A

An attacker may have established a remote shell back to their infrastructure.

24
Q

What does “Use of Living Off the Land Binary (LOLBin)” indicate?

A

An attacker is using built-in OS tools like mshta, certutil, or regsvr32 for evasion.

25
What does "Encrypted Traffic to Unknown Host" suggest?
Possible C2 or exfiltration using encrypted channels like HTTPS or DNS tunneling.
26
What does "Successful Login from New Location or Device" suggest?
Potential compromise or lateral movement.
26
What does "Multiple Failed Login Attempts" alert mean?
Possible brute-force attack or password guessing attempt.
27
What does "Security Logs Cleared or Tampered" alert indicate?
An attacker may be trying to cover their tracks.
28
What does "Unexpected Account Lockouts" imply?
Possible brute-force attempt or account misuse.
29
What does "Execution of Signed Binary with Suspicious Parent" mean?
A signed (legitimate) binary is launched from a process it shouldn't be — a common evasion tactic.