@@ -15,30 +15,34 @@ The following queries detect activity associated with the malicious DLL, *cyzfc.
1515``` Kusto
1616// Query 1: Events involving the DLL container
1717let fileHash = "9858d5cb2a6614be3c48e33911bf9f7978b441bf";
18- find in (FileCreationEvents, ProcessCreationEvents, MiscEvents ,
19- RegistryEvents, NetworkCommunicationEvents, ImageLoadEvents )
18+ find in (DeviceFileEvents, DeviceProcessEvents, DeviceEvents ,
19+ DeviceRegistryEvents, DeviceNetworkEvents, DeviceImageLoadEvents )
2020where SHA1 == fileHash or InitiatingProcessSHA1 == fileHash
21- | where EventTime > ago(10d)
21+ | where Timestamp > ago(10d)
22+
2223// Query 2: C2 connection
23- NetworkCommunicationEvents
24- | where EventTime > ago(10d)
24+ DeviceNetworkEvents
25+ | where Timestamp > ago(10d)
2526| where RemoteUrl == "pandorasong.com"
27+
2628// Query 3: Malicious PowerShell
27- ProcessCreationEvents
28- | where EventTime > ago(10d)
29+ DeviceProcessEvents
30+ | where Timestamp > ago(10d)
2931| where ProcessCommandLine contains
3032"-noni -ep bypass $zk='JHB0Z3Q9MHgwMDA1ZTJiZTskdmNxPTB4MDAwNjIzYjY7JHRiPSJ"
33+
3134// Query 4: Malicious domain in default browser commandline
32- ProcessCreationEvents
33- | where EventTime > ago(10d)
35+ DeviceProcessEvents
36+ | where Timestamp > ago(10d)
3437| where ProcessCommandLine contains
3538"https://www.jmj.com/personal/nauerthn_state_gov"
39+
3640// Query 5: Events involving the ZIP
3741let fileHash = "cd92f19d3ad4ec50f6d19652af010fe07dca55e1";
38- find in (FileCreationEvents, ProcessCreationEvents, MiscEvents ,
39- RegistryEvents, NetworkCommunicationEvents, ImageLoadEvents )
42+ find in (DeviceFileEvents, DeviceProcessEvents, DeviceEvents ,
43+ DeviceRegistryEvents, DeviceNetworkEvents, DeviceImageLoadEvents )
4044where SHA1 == fileHash or InitiatingProcessSHA1 == fileHash
41- | where EventTime > ago(10d
45+ | where Timestamp > ago(10d)
4246```
4347
4448## Category
@@ -65,4 +69,4 @@ This query can be used to detect the following attack techniques and tactics ([s
6569
6670## Contributor info
6771
68- ** Contributor:** Microsoft Threat Protection team
72+ ** Contributor:** Microsoft Threat Protection team
0 commit comments