Query Details

Security Event Sdeletedeployedvia GP Oandrunrecursively

Query

let query_frequency = 1h;
let query_lookback = 1h;
let query_period = query_frequency + query_lookback;
let join_timespan_step = 5m;
SecurityEvent
| where TimeGenerated > ago(query_frequency)
| where EventID == 4688
| where CommandLine has "sdelete" or Process =~ "sdelete.exe"
//| where CommandLine has_all ("-s", "-r") // Recursively
| extend bin_TimeGenerated = bin(TimeGenerated, join_timespan_step)
| join hint.strategy=shuffle kind=inner (
    SecurityEvent
    | where TimeGenerated > ago(query_period)
    | where EventID == 4688 //and Process has "svchost.exe"
    | where CommandLine has_any ("-k GPSvcGroup", "-s gpsvc")
    | extend bin_TimeGenerated = bin(TimeGenerated, join_timespan_step)
    | project bin_TimeGenerated, Computer, NewProcessName, NewProcessId, ParentCommandLine = CommandLine, ParentParentProcessName = ParentProcessName
    | mv-expand bin_TimeGenerated = range(bin_TimeGenerated, bin_TimeGenerated + query_lookback, join_timespan_step) to typeof(datetime)
    ) on Computer, bin_TimeGenerated, $left.ParentProcessName == $right.NewProcessName, $left.ProcessId == $right.NewProcessId
| project
    TimeGenerated,
    Computer,
    Account,
    AccountType,
    Activity,
    CommandLine,
    NewProcessName,
    NewProcessId,
    ParentCommandLine,
    ParentProcessName,
    ParentProcessId = ProcessId,
    ParentParentProcessName,
    TokenElevationType,
    SubjectLogonId

Explanation

This query is looking for security events related to the execution of a specific command ("sdelete" or "sdelete.exe"). It joins these events with other security events that occurred within a specific time period. The query then projects various properties of the events, such as the time generated, computer name, account information, activity, command line, process information, and token elevation type.

Details

Jose Sebastián Canós profile picture

Jose Sebastián Canós

Released: April 25, 2023

Tables

SecurityEvent

Keywords

SecurityEvent,TimeGenerated,EventID,CommandLine,Process,sdelete,bin_TimeGenerated,join_timespan_step,Computer,NewProcessName,NewProcessId,ParentCommandLine,ParentProcessName,ProcessId,TokenElevationType,SubjectLogonId

Operators

where|==hasor=~extendbinjoinhint.strategykindagoandprojectmv-expandrangetotypeof

Actions