Hunting with Elastic Security: Unmasking concealed artifacts with Elastic Stack insights