Skip to content

Conversation

@eatinsundip
Copy link
Contributor

Just something I came across in a Microsoft Threat Intel Blog. I found no abnormal uses of this in my environment so it could be used to detect or threat hunt in other environments as well.

Test before prod!

Copy link
Contributor Author

@eatinsundip eatinsundip left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I have now added both techniques I used to monitor for this activity. If you have any questions, please feel free to reach out.

Thank you!

This KQL script detects suspicious child processes spawned by 7-Zip executables in specific folders.
Add KQL script for detecting 7-Zip suspicious processes
This KQL query identifies potential arbitrary file write attempts by 7-Zip to sensitive locations, filtering for specific file types and folders.
@eatinsundip
Copy link
Contributor Author

I'm slow to understand git but I am figuring it out. I refreshed the request with the old ones I had as well as a few new 7-Zip detections.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant