Query Details
// MDE KQL to detect UAC bypass of Fickle Stealer // https://www.linkedin.com/posts/activity-7209814018230738945-6413/ // The article discusses “Fickle Stealer,” a new malware that uses the Rust programming language to steal sensitive information from Windows users. It is distributed through various methods, including VBA and PowerShell scripts, making it a versatile and dangerous threat. // KQL to detect UAC bypass of Fickle Stealer DeviceFileEvents | where Timestamp > ago(1h) | where ActionType == "FileCreated" | where FileName == "WmiMgmt.msc" | where FolderPath contains "\Windows\System32\en-US"
This KQL (Kusto Query Language) query is designed to detect a specific type of malicious activity related to the "Fickle Stealer" malware, which is known for stealing sensitive information from Windows users. The query focuses on identifying attempts to bypass User Account Control (UAC) by monitoring file creation events.
Here's a simple summary of what the query does:
DeviceFileEvents, which logs file-related activities on devices.Timestamp > ago(1h)).ActionType == "FileCreated").WmiMgmt.msc (FileName == "WmiMgmt.msc").\Windows\System32\en-US directory (FolderPath contains "\Windows\System32\en-US").In essence, this query helps detect if the "Fickle Stealer" malware is attempting to bypass UAC by creating a specific file in a critical system directory within the last hour.

Steven Lim
Released: August 2, 2024
Tables
Keywords
Operators