You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: detections/endpoint/windows_system_remote_discovery_with_query.yml
+18-25Lines changed: 18 additions & 25 deletions
Original file line number
Diff line number
Diff line change
@@ -10,11 +10,12 @@ data_source:
10
10
- Sysmon Event ID 1
11
11
- Windows Security Event ID 4688
12
12
- CrowdStrike ProcessRollup2
13
-
search: '| tstats `security_content_summariesonly` values(Processes.process_current_directory) as Processes.process_current_directory values(Processes.process_id) as Processes.process_id values(Processes.process) as Processes.process values(Processes.parent_process_id) as Processes.parent_process_id values(Processes.parent_process) as Processes.parent_process count min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Processes where (Processes.process_name="query.exe" OR Processes.original_file_name="query.exe") AND (Processes.process=*/server*) by Processes.dest Processes.user Processes.process_name Processes.parent_process_name
| tstats `security_content_summariesonly` values(Processes.process_current_directory) as Processes.process_current_directory values(Processes.process_id) as Processes.process_id values(Processes.process) as Processes.process values(Processes.parent_process_id) as Processes.parent_process_id values(Processes.parent_process) as Processes.parent_process count min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Processes where (Processes.process_name="query.exe" OR Processes.original_file_name="query.exe") AND (Processes.process=*/server*) by Processes.dest Processes.user Processes.process_name Processes.parent_process_name
how_to_implement: The detection is based on data that originates from Endpoint Detection and Response (EDR) agents. These agents are designed to provide security-related telemetry from the endpoints where the agent is installed. To implement this search, you must ingest logs that contain the process GUID, process name, and parent process. Additionally, you must ingest complete command-line executions. These logs must be processed using the appropriate Splunk Technology Add-ons that are specific to the EDR product. The logs must also be mapped to the `Processes` node of the `Endpoint` data model. Use the Splunk Common Information Model (CIM) to normalize the field names and speed up the data modeling process.
19
20
known_false_positives: Administrators or power users may use this command for troubleshooting.
20
21
references:
@@ -32,36 +33,28 @@ drilldown_searches:
32
33
search: '| from datamodel:Endpoint.Processes | search dest=$dest$ process_name = $process_name|s$'
33
34
earliest_offset: $info_min_time$
34
35
latest_offset: $info_max_time$
36
+
rba:
37
+
message: The user $user$ ran the Query command to enumerate the remote system $dest$
38
+
risk_objects:
39
+
- field: user
40
+
type: user
41
+
score: 25
42
+
- field: dest
43
+
type: system
44
+
score: 25
45
+
threat_objects:
46
+
- field: process_name
47
+
type: process_name
35
48
tags:
36
49
analytic_story:
37
50
- Active Directory Discovery
38
51
asset_type: Endpoint
39
-
confidence: 49
40
-
impact: 49
41
-
message: The user $user$ ran the Query command to query information from a remote system from $dest$
0 commit comments