Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
14 changes: 14 additions & 0 deletions DefenderXDR/7-Zip Arbritrary File Write to Sensitive Location.kql
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
// contact@ccaves.net for questions or contact
// 7-Zip Arbritrary File Write to Sensitive Location

DeviceFileEvents
| where InitiatingProcessFileName has_any (@"7z.exe", @"7zG.exe", @"7zFM.exe")
| where FileName endswith ".exe"
or FileName endswith ".dll"
or FileName endswith ".bat"
or FileName endswith ".cmd"
or FileName endswith ".ps1"
or FileName endswith ".vbs"
or FileName endswith ".iso"
| where FolderPath has_any (@"\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\", @"\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\", @"\Windows\System32\", @"\Windows\SysWOW64\", @"\Windows\Tasks\", @"\Windows\Temp\")
| project Timestamp, DeviceName, InitiatingProcessAccountName, InitiatingProcessFileName, FolderPath, FileName, InitiatingProcessCommandLine, DeviceId, ReportId
8 changes: 8 additions & 0 deletions DefenderXDR/7-Zip Spawning Suspicious Child Process.kql
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
// contact@ccaves.net for questions or contact
//7-Zip Spawning Suspicious Child Process

DeviceProcessEvents
| where InitiatingProcessCommandLine has_any (@"\7z.exe", @"\7zG.exe", @"\7zFM.exe")
or InitiatingProcessParentFileName has_any (@"\7z.exe", @"\7zG.exe", @"\7zFM.exe")
| where FileName has_any ("cmd.exe", "powershell.exe", "pwsh.exe", "cscript.exe", "wscript.exe", "rundll32.exe", "regsvr32.exe", "bash.exe")
| project Timestamp, DeviceName, InitiatingProcessAccountName, FileName, ProcessCommandLine, InitiatingProcessCommandLine, InitiatingProcessParentFileName, DeviceId, ReportId
6 changes: 6 additions & 0 deletions DefenderXDR/ClickFix Defense Evasion
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
//ClickFix Defense Evasion Checking for the use of 'SetClipboard -value " "'

DeviceProcessEvents
| Where ProcessCommandLine has_all ("set-clipboard", "-value")
| where ProcessCommandLine has_any ('" "', "' '")
| project AccountName, ProccessCommandLine
8 changes: 8 additions & 0 deletions DefenderXDR/ClickFix Defense Evasion (DeviceEvents))
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
// An alternate and slightly more succesful way of catching even obfuscated clipboard clearing. This technique is used for defense evasion with clickfix attacks.
// This detection can be ran in Defender NRT for quick response.

DeviceEvents
| extend Command = tolower(parse_json(AdditionalFields)["Command"])
| where Command has_all ("set-clipboard", "-value")
| where Command has_any ("' '", '" "')
| project Timestamp, InitiatingProcessAccountName, parse_json(AdditionalFields)["Command"], DeviceId, ReportId