<<< Hide Navigation Hide TOC >>>
Potentially Suspicious Usage Of Qemu (5fc297ae-25b6-488a-8f25-cc12ac29b744)
Detects potentially suspicious execution of the Qemu utility in a Windows environment. Threat actors have leveraged this utility and this technique for achieving network access as reported by Kaspersky.
Cluster A![]() |
Galaxy A![]() |
Cluster B![]() |
Galaxy B![]() |
Level![]() |
---|---|---|---|---|
Potentially Suspicious Usage Of Qemu (5fc297ae-25b6-488a-8f25-cc12ac29b744) | Sigma-Rules | Proxy - T1090 (731f4f55-b6d0-41d1-a7a9-072a66389aea) | Attack Pattern | 1 |
Potentially Suspicious Usage Of Qemu (5fc297ae-25b6-488a-8f25-cc12ac29b744) | Sigma-Rules | Protocol Tunneling - T1572 (4fe28b27-b13c-453e-a386-c2ef362a573b) | Attack Pattern | 1 |