Query Details
# CVE-2024-37085 Suspicious Creation Of ESX Admins Group through SecurityEvent ### Description The following query will help detect any creation or modification to a windows domain group with the name "ESX Admins" which would potentially indicate exploitation attempt of CVE-2024-37085. ### References - https://www.microsoft.com/en-us/security/blog/2024/07/29/ransomware-operators-exploit-esxi-hypervisor-vulnerability-for-mass-encryption/ - https://github.com/SigmaHQ/sigma/blob/master/rules-emerging-threats/2024/Exploits/CVE-2024-37085/win_security_exploit_cve_2024_37085_esxi_admins_group.yml ### Microsoft Sentinel ``` SecurityEvent | where tostring(EventID) has_any (dynamic(["4727", "4728", "4737"])) | where TargetUserName contains @"esx admins" | project TimeGenerated, EventID, SubjectDomainName, SubjectUserName, TargetDomainName, TargetUserName ``` ### MITRE ATT&CK Mapping - Tactic: Persistence - Technique ID: T1136.002 - [Create Account: Domain Account](https://attack.mitre.org/techniques/T1136/002/) ### Source ### Versioning | Version | Date | Comments | | ------------- |---------------| ----------------------------------| | 1.0 | 30/07/2024 | Initial publish |
This query is designed to detect any suspicious creation or modification of a Windows domain group named "ESX Admins." Such activity could indicate an attempt to exploit the vulnerability CVE-2024-37085.
SecurityEvent logs.4727, 4728, 4737), which are associated with group creation and modification activities.TargetUserName (the name of the group being created or modified) contains "esx admins".The query helps security teams identify potential exploitation attempts of the CVE-2024-37085 vulnerability by monitoring for the creation or modification of a specific domain group, "ESX Admins," which could be a target for attackers.

Michalis Michalos
Released: July 30, 2024
Tables
Keywords
Operators