Query Details
Tags:
Query:
DeviceNetworkEvents
| where RemoteUrl has_any ("letsencrypt.org", "sslforfree.com", "zerossl.com", "freessl.org")
| where InitiatingProcessFolderPath !startswith @"c:\program files" | where InitiatingProcessParentFileName != @"SenseIR.exe" and InitiatingProcessVersionInfoProductName != @"Windows ACME Simple (WACS)" and InitiatingProcessVersionInfoCompanyName != @"Wouter Tinus and many others"
References:
This query is designed to filter and identify suspicious network events related to certain SSL certificate providers. Here's a simple summary:
DeviceNetworkEvents, which logs network activities on devices.RemoteUrl (the URL accessed) contains any of the following domains: "letsencrypt.org", "sslforfree.com", "zerossl.com", or "freessl.org".In essence, this query aims to find network events involving specific SSL certificate providers, but only if they are initiated by processes that are not typically associated with legitimate SSL certificate operations.

Ali Hussein
Released: September 30, 2023
Tables
Keywords
Operators