Query Details
//This query detects activity from Hanada group malware impersonating Crowdstrike updates
//Looks for attempts to identify installed antiviruses and create specific files/folders
DeviceProcessEvents
| where ProcessCommandLine has_any("avastui.exe","avgui.exe","bdservicehost.exe","nswscsvc.exe","sophoshealth.exe","Carroll Carroll","champion.pif",@"564784\L","locatedflattrendsoperating") This query is designed to identify suspicious activity on devices that might be linked to malware from the Hanada group, which is known for pretending to be updates from Crowdstrike, a cybersecurity company. Specifically, the query looks for processes that are trying to detect installed antivirus software or create certain files or folders. It does this by searching for specific keywords or file names in the command line of processes running on the device. If any of these keywords are found, it suggests that there might be malicious activity related to the Hanada group's malware.

Jay Kerai
Released: November 10, 2024
Tables
Keywords
Operators