1
0
Форкнуть 0
This commit is contained in:
Marty Hernandez Avedon 2021-06-11 12:35:52 -04:00
Родитель da2b2f62d0
Коммит 02f0f9d262
2 изменённых файлов: 76 добавлений и 0 удалений

Просмотреть файл

@ -0,0 +1,39 @@
# Jupyter's evasive PowerShell executions
The following query checks for instances of Jupyter or SolarMarker malware that launch a lengthy PowerShell script, which in turn reads from encoded strings to parse the next malicious script.
'''kusto
DeviceProcessEvents
| where FileName == "powershell.exe"
| where InitiatingProcessFileName endswith ".tmp" and InitiatingProcessCommandLine has_all("/SL5=","Downloads",".exe")
| where ProcessCommandLine has_all("-command","=[System.Convert]::FromBase64String([System.IO.File]::ReadAllText($","));remove-item $",".length;$j++){$","$i++;if($i -ge $","=[System.Text.Encoding]::UTF8.GetString($")
'''
## Category
This query can be used to detect the following attack techniques and tactics ([see MITRE ATT&CK framework](https://attack.mitre.org/)) or security configuration states.
| Technique, tactic, or state | Covered? (v=yes) | Notes |
|------------------------|----------|-------|
| Initial access | | |
| Execution | v | |
| Persistence | | |
| Privilege escalation | | |
| Defense evasion | | |
| Credential Access | | |
| Discovery | | |
| Lateral movement | | |
| Collection | | |
| Command and control | | |
| Exfiltration | | |
| Impact | | |
| Vulnerability | | |
| Exploit | | |
| Misconfiguration | | |
| Malware, component | | |
| Ransomware | | |
## Contributor info
**Contributor:** Microsoft Threat Protection team

Просмотреть файл

@ -0,0 +1,37 @@
# Evasive PowerShell with uncommon read strings
This query searches for a string pattern detected in evasive PowerShell usage. Jupyter or SolarMarker will iterate on this pattern multiple times to read data and call additional processes. This query is not fully specific to Jupyter or SolarMarker, and will also return other malicious malware, but is unlikely to return false positives.
'''kusto
DeviceProcessEvents
| where FileName == "powershell.exe"
| where ProcessCommandLine has_all("-ep bypass","-command","get-content","remove-item","iex")
'''
## Category
This query can be used to detect the following attack techniques and tactics ([see MITRE ATT&CK framework](https://attack.mitre.org/)) or security configuration states.
| Technique, tactic, or state | Covered? (v=yes) | Notes |
|------------------------|----------|-------|
| Initial access | | |
| Execution | v | |
| Persistence | | |
| Privilege escalation | | |
| Defense evasion | v | |
| Credential Access | | |
| Discovery | | |
| Lateral movement | | |
| Collection | | |
| Command and control | | |
| Exfiltration | | |
| Impact | | |
| Vulnerability | | |
| Exploit | | |
| Misconfiguration | | |
| Malware, component | | |
| Ransomware | | |
## Contributor info
**Contributor:** Microsoft Threat Protection team