Skip to content
This repository was archived by the owner on Nov 16, 2023. It is now read-only.

Commit e24f495

Browse files
authored
Update detect-exploitation-of-cve-2018-8653.md
1 parent f6ececd commit e24f495

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

Execution/detect-exploitation-of-cve-2018-8653.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,8 @@ The following queries detect possible exploitation of this CVE.
1111
## Query
1212

1313
```Kusto
14-
​ProcessCreationEvents
15-
| where EventTime > ago(7d)
14+
DeviceProcessEvents
15+
| where Timestamp > ago(7d)
1616
and InitiatingProcessFileName =~ "svchost.exe"
1717
and InitiatingProcessCommandLine contains "WinHttpAutoProxySvc"
1818
and FileName !~ "pacjsworker.exe"
@@ -44,4 +44,4 @@ This query can be used to detect the following attack techniques and tactics ([s
4444

4545
## Contributor info
4646

47-
**Contributor:** Microsoft Threat Protection team
47+
**Contributor:** Microsoft Threat Protection team

0 commit comments

Comments
 (0)