January 19,2026 – Content Update

We are committed to continuously strengthening security operations for our customers through our innovative DARC Vault monthly releases. Much like Microsoft’s Patch Tuesday, the DARC Vault acts as a consistent and reliable source of enhanced security content, empowering users to stay ahead of evolving threats with fresh detections every month.

Each month, we deliver the latest Out-Of-The-Box (OOTB) content that not only introduces brand-new capabilities but also enhances existing detections. This month, we are excited to announce a significant update focused on Windows, Cloudflare, Webserver, and Linux.

Below is a summary of the new additions and improvements:

Summary of Fortnightly Improvements

Content TypeActionsCount
DetectionsNew36
Enhanced3
DashboardsNew
ReportsNew
New Detections

#NameDescription
1SharePoint ToolShell Vulnerability Exploitation Chain-webserverInvestigating SharePoint ToolShell Vulnerability Exploitation Chain targeting public-facing applications.
2UNC5142 In-Memory PowerShell Payload ExecutionInvestigating UNC5142 In-Memory PowerShell Payload Execution on Windows platforms.
3Suspicious Modification of WordPress Core Theme FilesSuspicious modification of WordPress core theme files detected.
4Suspicious DLL Sideloading via Element or VLCSuspicious DLL Sideloading via Element or VLC under investigation.
5Suspicious Child Process of Analysis ToolSuspicious child process of analysis tool detected. Investigate further.
6Stealit Suspicious Browser Extension InstallationStealit Suspicious Browser Extension Installation detected via file creation events.
7SharePoint ToolShell Vulnerability Exploitation ChainInvestigating SharePoint ToolShell Vulnerability Exploitation Chain.
8Detection for TOLLBOOTH IIS Malicious Module Deployment_ep-dnsDetection for TOLLBOOTH IIS Malicious Module Deployment under investigation.
9Stealit Component Execution from AppDataStealit Component Execution from AppData under investigation. Targets various platforms.
10Dropping Elephant VLC Side-Loading and StagingInvestigation of Dropping Elephant VLC Side-Loading and Staging attack.
11Suspicious Child Process Spawned by npmSuspicious child process spawned by npm under investigation.
12Office Macro-Spawned PowerShell ExecutionOffice Macro-Spawned PowerShell Execution under investigation.
13NightEagle APT Chisel Malware ExecutionNightEagle APT Chisel Malware Execution under investigation.
14Detection for SonicCrypt Payload ExecutionDetection for SonicCrypt Payload Execution under investigation.
15DragonForce Ransomware ExecutionDragonForce Ransomware Execution under investigation. Targets various platforms.
16Katz Stealer PowerShell Steganography DropperKatz Stealer PowerShell Steganography Dropper attack under investigation.
17TAG-140 DRAT V2 Initial Execution via MSHTAInvestigating initial execution via MSHTA with malicious command lines.
18Confucius PowerShell Download and ExecutionConfucius PowerShell Download and Execution attack under investigation.
19Detection for TOLLBOOTH IIS Malicious Module Deployment_ep-fileDetection for TOLLBOOTH IIS Malicious Module Deployment under investigation.
20UNC5142 Malware Hash DetectionUNC5142 Malware Hash Detection for PROCESS_ADDED and FILE_CREATED actions.
21Godzilla Webshell File CreationGodzilla Webshell File Creation detected. Investigating file creation with specific hash or filename patterns.
22ClickFix PowerShell ExecutionDetects suspicious PowerShell execution patterns.
23Potential Anti-Malware Analysis Tool Execution – Process and Memory AnalysisPotential Anti-Malware Analysis Tool Execution – Process and Memory Analysis under investigation.
24MonsterV2 Malware Hash Execution DetectionMonsterV2 Malware Hash Execution Detection under investigation.
25GoldMelody Post-Exploitation ActivityGoldMelody Post-Exploitation Activity under investigation.
26Malicious NPM Package Installation Associated With XORIndex CampaignMalicious NPM Package Installation Associated With XORIndex Campaign under investigation.
27Silent File Downloads via CurlSilent File Downloads via Curl under investigation. Detects malicious file downloads using curl.
28Possible Modular Java Backdoor Execution Detection on Modular Cloe MFTPossible Modular Java Backdoor Execution Detection on Modular Cloe MFT under investigation.
29KimJongRAT Loader ExecutionKimJongRAT Loader Execution involves malicious rundll32 or PowerShell scripts in AppData.
30Suspicious Process Injection into ImagingDevicesSuspicious Process Injection into ImagingDevices under investigation. Attack involves process injection by element or VLC executables.
31Possible Malicious MSIX Payload via Google AdPossible Malicious MSIX Payload via Google Ad under investigation.
32APT28 Covenant Grunt Stager_ep-registryAPT28 Covenant Grunt Stager attack under investigation.
33HIDDENDRIVER Rootkit Registry ConfigurationHIDDENDRIVER Rootkit Registry Configuration under investigation.
34Detection of Hidden Accounts and RID Hijacking in WindowsDetection of Hidden Accounts and RID Hijacking in Windows under investigation.
35Custom Cloudflare HTTP Request User EnumerationThis detection identifies attempts to enumerate user accounts or endpoints via HTTP requests with patterns such as predictable usernames, sequential IDs, or common paths.
36Server-Side Code Injection in URLDetects malicious attempts to inject server-side code (e.g., SQL, JavaScript) via the URL to execute unauthorized actions or exfiltrate data.

Updated Detections

1Binary File Modification Detected in System PathsInvestigating suspicious binary file changes involving critical commands.
2Suspicious wevtutil UsageThis rule is designed to identify potentially suspicious usage of the ‘wevtutil’ utility, which is commonly employed for managing event logs on Windows systems. 
3MsiExec Service Child Process With Network Connection_ep-dnsMsiExec Service Child Process With Network Connection under investigation.