Detection Query 1 : | resourcename = "Windows Security" AND eventtype = "4688" AND processname IN ("\bash.exe","\bitsadmin.exe","\certutil.exe","\cscript.exe","\curl.exe","\ipconfig.exe","\mshta.exe","\net.exe","\net1.exe","\netsh.exe","\nslookup.exe","\OpenConsole.exe","\perl.exe","\ping.exe","\powershell.exe","\pwsh.exe","\py.exe","\python.exe","\pythonw.exe","\pyw.exe","\reg.exe","\regsvr32.exe","\rundll32.exe","\sc.exe","\sh.exe","\systeminfo.exe","\wget.exe","\whoami.exe","\wmic.exe","\wscript.exe","\wt.exe","\python") and (parentprocessname like "\node.exe") and (parentcommandline IN ("--experimental-https","--experimental-next-config-strip-types","\node_modules\next","next dev","next start","next", "start","node_modules\\.bin\\\\..\\next","react-scripts start","start-server.js")) |
Detection Query 2 : | resourcename = "Windows Security" AND eventtype = "4688" AND (parentprocessname like "\node.exe") and (parentcommandline IN ("--experimental-https","--experimental-next-config-strip-types","\node_modules\next","next dev","next start","next", "start","node_modules\\.bin\\\\..\\next","react-scripts start","start-server.js")) and processname like "\cmd.exe" and (commandline not like "/d" or commandline not like "/s" or commandline like "/c") |
Detection Query 3 : | resourcename = "Windows Security" AND eventtype = "4688" AND (parentprocessname like "\node.exe") and (parentcommandline IN ("--experimental-https","--experimental-next-config-strip-types","\node_modules\next","next dev","next start","next", "start","node_modules\\.bin\\\\..\\next","react-scripts start","start-server.js")) and processname like "\cmd.exe" and (commandline not in ("git config --local --get remote.origin.url") and commandline not in ("netstat -ano","findstr /C:","findstr LISTENING") and commandline not in ("\mkcert","-install") and commandline not in ("\mkcert","-CAROOT")) |
Detection Query 4 : | technologygroup = "EDR" AND processname IN ("\bash.exe","\bitsadmin.exe","\certutil.exe","\cscript.exe","\curl.exe","\ipconfig.exe","\mshta.exe","\net.exe","\net1.exe","\netsh.exe","\nslookup.exe","\OpenConsole.exe","\perl.exe","\ping.exe","\powershell.exe","\pwsh.exe","\py.exe","\python.exe","\pythonw.exe","\pyw.exe","\reg.exe","\regsvr32.exe","\rundll32.exe","\sc.exe","\sh.exe","\systeminfo.exe","\wget.exe","\whoami.exe","\wmic.exe","\wscript.exe","\wt.exe","\python") and (parentprocessname like "\node.exe") and (parentcommandline IN ("--experimental-https","--experimental-next-config-strip-types","\node_modules\next","next dev","next start","next", "start","node_modules\\.bin\\\\..\\next","react-scripts start","start-server.js")) |
Detection Query 5 : | technologygroup = "EDR" AND eventtype = "4688" AND (parentprocessname like "\node.exe") and (parentcommandline IN ("--experimental-https","--experimental-next-config-strip-types","\node_modules\next","next dev","next start","next", "start","node_modules\\.bin\\\\..\\next","react-scripts start","start-server.js")) and processname like "\cmd.exe" and (commandline not like "/d" or commandline not like "/s" or commandline like "/c") |
Detection Query 6 : | technologygroup = "EDR" AND eventtype = "4688" AND (parentprocessname like "\node.exe") and (parentcommandline IN ("--experimental-https","--experimental-next-config-strip-types","\node_modules\next","next dev","next start","next", "start","node_modules\\.bin\\\\..\\next","react-scripts start","start-server.js")) and processname like "\cmd.exe" and (commandline not in ("git config --local --get remote.origin.url") and commandline not in ("netstat -ano","findstr /C:","findstr LISTENING") and commandline not in ("\mkcert","-install") and commandline not in ("\mkcert","-CAROOT")) |