Query Details

KQL To Detect New Chromium Browser Extension Installation On MDE Endpoints By Emerald Sleet APT43

Query

// KQL to detect new chromium browser extension installation on MDE endpoints by Emerald Sleet (APT43)
// https://www.linkedin.com/posts/activity-7212205082002513922-WGt4/

// Emerald Sleet (APT43) deploying faked google translate extension to exfiltrate user email, password and cookie data. Targeting users in the U.S., Europe, and South Korea.

// KQL to detect new chromium browser extension installation on MDE endpoints.

DeviceFileEvents
| where ActionType == "FileCreated"
| where FolderPath contains "Webstore Downloads" and FileName endswith ".crx"
| extend ExtensionId = extract(@"(?i)Downloads[\\/]|Webstore Downloads[\\/](.+?)_\d+\.crx", 1, FolderPath)

Explanation

This KQL (Kusto Query Language) query is designed to detect the installation of new Chromium browser extensions on Microsoft Defender for Endpoint (MDE) devices. Specifically, it aims to identify when a new extension file (with a ".crx" extension) is created in the "Webstore Downloads" folder. This is relevant for detecting malicious activities, such as the deployment of a fake Google Translate extension by the threat group Emerald Sleet (APT43), which targets users in the U.S., Europe, and South Korea to steal email, password, and cookie data.

Here's a simplified breakdown of the query:

  1. Source Table: The query looks at the DeviceFileEvents table, which logs file-related activities on devices.
  2. Filter by Action: It filters the events to only include those where a file was created (ActionType == "FileCreated").
  3. Filter by Folder and File Type: It further narrows down the results to files created in the "Webstore Downloads" folder and with a ".crx" extension (which are Chromium extension files).
  4. Extract Extension ID: It extracts the extension ID from the file path for further analysis.

In summary, this query helps in identifying new Chromium browser extensions being installed, which could potentially be malicious, by monitoring specific file creation events on MDE endpoints.

Details

Steven Lim profile picture

Steven Lim

Released: August 2, 2024

Tables

DeviceFileEvents

Keywords

DeviceFileEvents

Operators

==containsendswithextendextract

Actions