Query Details
Tags:
- attack.initial_access
- attack.execution
Query:
DeviceFileEvents
| where InitiatingProcessFileName contains "rundll32.exe" | where FolderPath contains "TfsStore" /* you could change it to InitiatingProcessVersionInfoInternalFileName contains "rundll"*/
| where FileName endswith ".vbs" or FileName endswith'.ps1' or FileName endswith '.lnk' or FileName endswith '.zip' or FileName endswith'.ico' or FileName endswith '.bat'
References:
https://www.trellix.com/en-us/about/newsroom/stories/research/beyond-file-search-a-novel-method.html
https://micahbabinski.medium.com/search-ms-webdav-and-chill-99c5b23ac462
This KQL (Kusto Query Language) query is designed to identify potentially malicious file events on devices. Here's a simple summary:
DeviceFileEvents table, which logs file-related activities on devices.rundll32.exe..vbs, .ps1, .lnk, .zip, .ico, and .bat.In essence, the query is searching for file events initiated by rundll32.exe within the "TfsStore" directory, focusing on files that have extensions commonly used in attacks or scripting.

Ali Hussein
Released: September 12, 2023
Tables
Keywords
Operators