Skip to main content

March 25, 2025- Content Update

We are committed to continuously strengthening security operations for our customers through our innovative DARC Vault releases. Just like Microsoft’s Patch Tuesday, the DARC Vault serves as a reliable source for enhanced security content, enabling our users to stay ahead of evolving threats.

We deliver the latest Out-Of-The-Box (OOTB) content that not only introduces brand-new capabilities but also enhances existing detections. This time, we are excited to announce a significant update focused on AWS Config, RDS and ELB.

Below is a summary of the new additions and improvements:

Summary of Improvements

Content TypeActionsCount
DetectionsNew12
Enhanced72
DashboardsNew5
ReportsNew7
New Detections

#NameDescription
1AWS Config Custom Resource Items Deletion ThresholdThis detection monitors the deletion of resource configurations in AWS Config, specifically targeting custom resource types. Deleting resource configurations could indicate an attempt to manipulate or destroy important resource data, which may be a sign of malicious activity or mismanagement.
2AWS Config Stored Query Deletion ThresholdThis detection monitors the deletion of stored queries in AWS Config. Deleting stored queries could indicate attempts to hide compliance status or misconfigurations related to security monitoring. It’s essential to track such activities to prevent potential unauthorized actions.
3AWS Config External Evaluation Update ThresholdThis detection monitors the use of the AWS Config API action “PutExternalEvaluation,” which is used to report the results of external evaluations (such as from custom compliance checks). Multiple calls in a short time could indicate automation or suspicious activity, such as repeated evaluation attempts or unusual behavior.
4AWS ELB Invalid Header Dropping DisabledThis use case detects when the AWS Elastic Load Balancer (ELB) configuration is modified to disable the dropping of invalid HTTP headers. This setting, when set tofalse, allows malformed or potentially malicious HTTP requests to pass through, increasing the risk of security vulnerabilities such as header injection, request smuggling, and other web-based attacks.
5AWS ELB Security Group ModificationThis use case detects modifications to security groups associated with AWS Elastic Load Balancers (ELBs). Unauthorized changes to load balancer security groups can expose critical services to unauthorized access or potential cyberattacks. Monitoring such modifications helps ensure that only authorized users update security configurations.
6AWS ELB Houdini Iniduoh njRAT User-AgentUser-Agent strings used by Houdini/Iniduoh/njRAT malware.
7AWS ELB HTTP Requests from Security ScannerThis detection focuses on identifying HTTP requests to AWS Elastic Load Balancers (ELB) that originate from known security scanners or suspicious user agents. These requests may indicate reconnaissance or scanning activities targeting your infrastructure.
8AWS RDS Security Group ModificationAWS RDS Security Group Modification involves changes to security groups, such as altering access rules or creating/deleting groups, which control network access to RDS instances. Monitoring these modifications ensures proper security.
9AWS RDS Instance Public RestorationAWS RDS Instance Public Restoration refers to the process of restoring an RDS instance from a snapshot that is publicly accessible. This can potentially expose sensitive data to unauthorized users if not properly controlled. Monitoring this action helps ensure that data restoration does not unintentionally make an RDS instance publicly accessible.
10AWS RDS Credential Access Password ResetAWS RDS Credential Access Password Reset is the process of changing the password for an RDS instance’s master user or credentials, often for security or access recovery purposes. Monitoring this event helps detect unauthorized changes.
11AWS RDS Snapshot shared with another accountAWS RDS Snapshot Shared with Another Account refers to the process of making an RDS snapshot accessible to another AWS account. This action allows other users or accounts to restore the snapshot, potentially accessing sensitive data. Monitoring this activity ensures that snapshots are not shared unintentionally, which could pose security risks.
12AWS RDS Manual or Public Snapshot CreatedDetection of AWS RDS Manual or Public Snapshot Created identifies when a user manually creates a snapshot or makes it publicly available, helping ensure security and compliance by monitoring potential data exposure.
New Dashboards

Name
AWS – Config – Monitoring Insights
AWS – ELB – Monitoring Insights
AWS – ELB – Security Insights
AWS – RDS – Monitoring Insights
AWS – RDS – Security Insights
New Reports

Name
AWS – Config – Operations Monitoring
AWS – ELB – Monitoring Insights
AWS – ELB – Security Monitoring
AWS – RDS – Monitoring Insights
AWS – RDS – Security Insights
Enhanced Detections

#NameRun TypeActive / Inactive
1Timestomping using Touch CommandstreamedActive
2System Log File ModificationstreamedActive
3Sudoers File ModificationstreamedActive
4Socat Process ActivitystreamedActive
5Setgid Bit Set via chmodstreamedActive
6User Discovery via WhoamistreamedActive
7Base64 Encoding or Decoding ActivitystreamedActive
8Virtual Machine FingerprintingstreamedActive
9Potential DNS Tunneling via IodinestreamedActive
10Connection to Internal Network via TelnetstreamedActive
11Setuid Bit Set via chmodstreamedActive
12RDP Hijacking Tool DetectedstreamedActive
13Connection to External Network via TelnetstreamedActive
14Strace Process ActivitystreamedActive
15Base16 Base32 and Base64 Encoding or Decoding ActivitystreamedActive
16Suspicious Bitsadmin Job Via BitsAdmin ExeoffActive
17Netsh Program Allowed with Suspcious LocationoffActive
18Suspicious Esentutl UseoffActive
19Stop Windows ServiceoffActive
20Ransomware Decryption Instructions CreatedoffActive
21Suspicious Eventlog Clear or Configuration Using WevtutiloffActive
22Net exe ExecutionstreamedActive
23Lsass Process Connected to a PipeoffActive
24PowerShell DownloadFileoffActive
25Tap Installer ExecutionoffActive
26New Service CreationoffActive
27Possible Modification of Boot ConfigurationoffActive
28System Information Discovery DetectionoffActive
29Processes launching netshoffActive
30Windows Mangement Instrumentation DLL Loaded Via Microsoft WordoffActive
31Windows Network EnumerationoffActive
32WMI Persistence – Command Line Event ConsumeroffActive
33Possible Privilege Escalation via Weak Service PermissionsoffActive
34WMI Modules LoadedoffActive
35WMI Backdoor Exchange Transport AgentoffActive
36Process Dump via Comsvcs DLLoffActive
37Ping Hex IPoffActive
38Remote Email collection detection via PowershelloffActive
39Windows Security Account Manager StoppedstreamedActive
40Trickbot Malware Recon ActivityoffActive
41Possible Bitsadmin Download DetectedoffActive
42XSL Script ProcessingoffActive
43PowerShell Encoded Character SyntaxoffActive
44Network Sniffing DetectedoffActive
45VBA DLL Loaded Via Microsoft WordoffActive
46Suspicious Commandline EscapeoffActive
47Load of dbghelp or dbgcore DLL from Suspicious ProcessoffActive
48Possible App Whitelisting Bypass via WinDbg CDB as a Shellcode RunneroffActive
49Remote Access Software Usage with PowershelloffActive
50Suspicious Access to lsass ProcessoffActive
51Query Registry DetectedoffActive
52USN Journal DeletionstreamedActive
53Sc exe Manipulating Windows ServicesoffActive
54Microsoft Office Product Spawning Windows ShelloffActive
55Renamed PowerShelloffActive
56Malicious PowerShell Process – Encoded CommandoffActive
57Suspicious Double ExtensionoffActive
58Suspicious Csc exe Source File FolderoffActive
59Malicious PowerShell Process – Connect To Internet With Hidden WindowoffActive
60Suspicious AdFind ExecutionoffActive
61Modification of Boot ConfigurationoffActive
62Process Execution via WMIoffActive
63Malicious Service InstalledoffActive
64Reg exe Manipulating Windows Services Registry KeysoffActive
65RedMimicry Winnti Playbook ExecuteoffActive
66Reconnaissance Activity with Net CommandoffActive
67Authentication Package DetectedoffActive
68AppCert DLLs DetectedoffActive
69Registry New RUN Key Pointing to Suspicious Folder DetectedoffActive
70Registry Local Port MonitoroffActive
71Disabling Remote User Account ControloffActive
72Accessibility Features-RegistryoffActive