Created
June 9, 2022 00:42
-
-
Save christian-taillon/5711711dbf4e5ed280f57b8695af6718 to your computer and use it in GitHub Desktop.
Search to look for Follina Adversary activity. Written in SPL for Crowdstrike data; however, content can support queries in other products.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
((((ParentBaseFileName IN ("*WINWORD.EXE" , | |
"*EXCEL.EXE" , | |
"*POWERPNT.EXE" , | |
"*MSPUB.EXE" , | |
"*VISIO.EXE" , | |
"*OUTLOOK.EXE" , | |
"*MSACCESS.EXE" , | |
"*MSPROJECT.EXE" , | |
"*ONENOTE.EXE")) | |
AND ((CommandHistory IN ("*msdt.exe*" , | |
"*../*" , | |
"*..\\*")) | |
OR (CommandLine IN ("*msdt.exe*" , | |
"*../*" , | |
"*..\\*")) | |
OR (ImageFileName IN ("*msdt.exe")))) | |
OR ((ParentBaseFileName IN ("*sdiagnhost.exe")) | |
AND NOT (((ImageFileName IN ("*System32\\conhost.exe" , | |
"*System32\\netsh.exe" , | |
"*System32\\wpr.exe")) | |
OR (ImageFileName IN ("*Framework64*") | |
AND ImageFileName IN ("*csc.exe*") | |
AND ImageFileName IN ("*Microsoft.NET*")))))) | |
AND ((ParentBaseFileName IN ("*powershell.exe" , | |
"*cscript.exe" , | |
"*DllHost.exe" , | |
"*gpscript.exe" , | |
"*eqnedt32.exe" , | |
"*hh.exe" , | |
"*cmd.exe" , | |
"*MSBuild.exe" , | |
"*msdt.exe" , | |
"*wscript.exe" , | |
"*fltldr.exe" , | |
"*mshta.exe" , | |
"*RegAsm.exe" , | |
"*regsvcs.exe" , | |
"*rundll32.exe" , | |
"*regsvr32.exe")) | |
AND (ImageFileName IN ("*msdt.exe")) | |
AND ((CommandHistory IN ("*skip*" , | |
"*IT_RebrowseForFile*" , | |
"*IT_BrowseForFile*" , | |
"*ms-msdt:*" , | |
"*af*" , | |
"*PCWDiagnostic*")) | |
OR (CommandLine IN ("*skip*" , | |
"*IT_RebrowseForFile*" , | |
"*IT_BrowseForFile*" , | |
"*ms-msdt:*" , | |
"*af*" , | |
"*PCWDiagnostic*"))))) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment