Skip to content

Commit 50fd37a

Browse files
authored
Update windows_process_with_netexec_command_line_parameters.yml
Adding drilldowns
1 parent e8f9c1d commit 50fd37a

File tree

1 file changed

+13
-0
lines changed

1 file changed

+13
-0
lines changed

detections/endpoint/windows_process_with_netexec_command_line_parameters.yml

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,19 @@ references:
2121
- https://www.netexec.wiki/
2222
- https://www.johnvictorwolfe.com/2024/07/21/the-successor-to-crackmapexec/
2323
- https://attack.mitre.org/software/S0488/
24+
drilldown_searches:
25+
- name: View the detection results for - "$dest$" and "$user$"
26+
search: '%original_detection_search% | search dest = "$dest$" user = "$user$"'
27+
earliest_offset: $info_min_time$
28+
latest_offset: $info_max_time$
29+
- name: View risk events for the last 7 days for - "$dest$" and "$user$"
30+
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$dest$","$user$") starthoursago=168 | stats count min(_time) as firstTime max(_time) as lastTime values(search_name) as "Search Name" values(risk_message) as "Risk Message" values(analyticstories) as "Analytic Stories" values(annotations._all) as "Annotations" values(annotations.mitre_attack.mitre_tactic) as "ATT&CK Tactics" by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`'
31+
earliest_offset: $info_min_time$
32+
latest_offset: $info_max_time$
33+
- name: Investigate processes on $dest$
34+
search: '| from datamodel:Endpoint.Processes | search dest=$dest$ process_name = $process_name$'
35+
earliest_offset: $info_min_time$
36+
latest_offset: $info_max_time$
2437
tags:
2538
analytic_story:
2639
- Active Directory Kerberos Attacks

0 commit comments

Comments
 (0)