Skip to content

Commit b97cf57

Browse files
committed
udpating SPL
1 parent e66bb09 commit b97cf57

File tree

1 file changed

+6
-5
lines changed

1 file changed

+6
-5
lines changed

detections/cloud/azure_ad_azurehound_useragent_detected.yml

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,17 +2,18 @@ name: Azure AD AzureHound UserAgent Detected
22
id: d62852db-a1f1-40db-a7fc-c3d56fa8bda3
33
version: 1
44
date: '2025-01-06'
5-
author: Dean Luxton
5+
author: Dean Luxton
66
data_sources:
77
- Azure Active Directory NonInteractiveUserSignInLogs
88
- Azure Active Directory MicrosoftGraphActivityLogs
99
type: TTP
1010
status: production
11-
description: This detection looks for the default AzureHound useragent string within Graph Activity logs and NonInteractive SignIn Logs.
11+
description: This detection identifies the presence of the default AzureHound user-agent string within Microsoft Graph Activity logs and NonInteractive SignIn Logs. AzureHound is a tool used for gathering information about Azure Active Directory environments, often employed by security professionals for legitimate auditing purposes. However, it can also be leveraged by malicious actors to perform reconnaissance activities, mapping out the Azure AD infrastructure to identify potential vulnerabilities and targets for further exploitation. Detecting its usage can help in identifying unauthorized access attempts and preemptively mitigating potential security threats to your Azure environment.
1212
search: >-
13-
`azure_monitor_aad` category IN (MicrosoftGraphActivityLogs, NonInteractiveUserSignInLogs) properties.userAgent=azurehound*
14-
| eval createdDateTime=strptime('properties.createdDateTime',"%Y-%m-%dT%H:%M:%S.%7Q%z")
15-
| stats min(createdDateTime) as _time values(user_agent) as user_agent values(user) as user count values(src_category) as src_category by src tenantId
13+
`azure_monitor_aad` category IN (MicrosoftGraphActivityLogs, NonInteractiveUserSignInLogs) properties.userAgent=azurehound*
14+
| stats count min(_time) as firstTime max(_time) as lastTime values(properties.userAgent) as user_agent values(properties.userId) as user values(src_category) as src_category by src tenantId
15+
| `security_content_ctime(firstTime)`
16+
| `security_content_ctime(lastTime)`
1617
| iplocation src
1718
| `azure_ad_azurehound_useragent_detected_filter`
1819
how_to_implement: The Splunk Add-on for Microsoft Cloud Services add-on is required to ingest NonInteractiveUserSignInLogs and MicrosoftGraphActivityLogs via an Azure EventHub. See reference for links for further details.

0 commit comments

Comments
 (0)