Query Details

Asr Ransomware

Query

# ASR Ransomware

## Query Information

#### MITRE ATT&CK Technique(s)

| Technique ID | Title    | Link    |
| ---  | --- | --- |
| T1486 | Data Encrypted for Impact |https://attack.mitre.org/techniques/T1486|

#### Description
Detects when the ASR rule AsrRansomwareBlocked or AsrRansomwareAudited is triggered. MDE uses cliend and cloud heuristics to determine of a file resembles ransomware. This file could for example be the script that is used to encrypt files. No alert is generated by default by Defender For Endpoint. This could be the start of a ransomware attack. Additional information available by Microsoft. 

#### Risk
A actor has gained access to your network and tries to execute ransomware.

#### References
- https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/attack-surface-reduction-rules-reference?view=o365-worldwide#use-advanced-protection-against-ransomware

## Defender For Endpoint
```
DeviceEvents
| where Timestamp > ago(30d)
| where ActionType has_any ('AsrRansomwareBlocked', 'AsrRansomwareAudited')
| summarize
		arg_max(Timestamp, *),
		TotalEvents = count(),
		TriggeredFiles = make_set(FileName),
		FileHashes = make_set(SHA1),
		IntiatingProcesses = make_set(InitiatingProcessCommandLine)
		by DeviceName, AccountName
| project
	 Timestamp,
	 DeviceName,
	 AccountDomain,
	 AccountName,
	 TotalEvents,
	 TriggeredFiles,
	 FileHashes,
	 IntiatingProcesses
```
## Sentinel
```
DeviceEvents
| where Timestamp > ago(30d)
| where ActionType has_any ('AsrRansomwareBlocked', 'AsrRansomwareAudited')
| summarize
		arg_max(Timestamp, *),
		TotalEvents = count(),
		TriggeredFiles = make_set(FileName),
		FileHashes = make_set(SHA1),
		IntiatingProcesses = make_set(InitiatingProcessCommandLine)
		by DeviceName, AccountName
| project
	 TimeGenerated,
	 DeviceName,
	 AccountDomain,
	 AccountName,
	 TotalEvents,
	 TriggeredFiles,
	 FileHashes,
	 IntiatingProcesses		 
```


Explanation

This query detects when the ASR rule AsrRansomwareBlocked or AsrRansomwareAudited is triggered. It looks for events in the past 30 days where the ActionType is either 'AsrRansomwareBlocked' or 'AsrRansomwareAudited'. It then summarizes the data by DeviceName and AccountName, and projects the Timestamp, DeviceName, AccountDomain, AccountName, TotalEvents, TriggeredFiles, FileHashes, and IntiatingProcesses. This query can be used in both Defender For Endpoint and Sentinel.

Details

Bert-Jan Pals profile picture

Bert-Jan Pals

Released: March 8, 2023

Tables

DeviceEvents

Keywords

DeviceEvents,Timestamp,ago,ActionType,AsrRansomwareBlocked,AsrRansomwareAudited,summarize,arg_max,TotalEvents,TriggeredFiles,FileName,FileHashes,SHA1,IntiatingProcesses,DeviceName,AccountName,AccountDomain,project,TimeGenerated

Operators

where>agohas_anysummarizearg_maxcountmake_setbyproject

Actions