Query Details
// KQL to detect new chromium browser extension installation on MDE endpoints by Emerald Sleet (APT43) // https://www.linkedin.com/posts/activity-7212205082002513922-WGt4/ // Emerald Sleet (APT43) deploying faked google translate extension to exfiltrate user email, password and cookie data. Targeting users in the U.S., Europe, and South Korea. // KQL to detect new chromium browser extension installation on MDE endpoints. DeviceFileEvents | where ActionType == "FileCreated" | where FolderPath contains "Webstore Downloads" and FileName endswith ".crx" | extend ExtensionId = extract(@"(?i)Downloads[\\/]|Webstore Downloads[\\/](.+?)_\d+\.crx", 1, FolderPath)
This KQL (Kusto Query Language) query is designed to detect the installation of new Chromium browser extensions on Microsoft Defender for Endpoint (MDE) devices. Specifically, it aims to identify when a new extension file (with a ".crx" extension) is created in the "Webstore Downloads" folder. This is relevant for detecting malicious activities, such as the deployment of a fake Google Translate extension by the threat group Emerald Sleet (APT43), which targets users in the U.S., Europe, and South Korea to steal email, password, and cookie data.
Here's a simplified breakdown of the query:
DeviceFileEvents table, which logs file-related activities on devices.ActionType == "FileCreated").In summary, this query helps in identifying new Chromium browser extensions being installed, which could potentially be malicious, by monitoring specific file creation events on MDE endpoints.

Steven Lim
Released: August 2, 2024
Tables
Keywords
Operators