Query Details
// APT Stealth Falcon - CVE-2025-33053 Detection // https://research.checkpoint.com/2025/stealth-falcon-zero-day/ let QueryPeriod = 1h; let DevicewithDotURL = DeviceFileEvents | where Timestamp > ago(QueryPeriod) | where ActionType == "FileCreated" | where tolower(FileName) endswith ".url" | distinct DeviceName; DeviceProcessEvents | where Timestamp > ago(QueryPeriod) | where InitiatingProcessFileName =~ "iediagcmd.exe" and FileName =~ "route.exe" | where FolderPath startswith "\\" | where DeviceName has_any(DevicewithDotURL)
This KQL (Kusto Query Language) query is designed to detect a specific threat activity related to the APT (Advanced Persistent Threat) group known as Stealth Falcon, exploiting a hypothetical vulnerability identified as CVE-2025-33053. Here's a simplified breakdown of what the query does:
Define the Query Period: The query looks at data from the past hour (1h).
Identify Devices with Specific File Events:
.url extension was created..url files were created.Detect Suspicious Process Activity:
iediagcmd.exe initiated the execution of route.exe.\\), indicating a network path..url file creation).In summary, this query is designed to detect suspicious activity that could indicate exploitation of a vulnerability by checking for specific file creation and process execution patterns on devices.

Steven Lim
Released: June 11, 2025
Tables
Keywords
Operators