cs
Hunting Queries: CrowdStrike Query Language
Find ScheduledTaskRegistered events by host
#event_simpleName=ScheduledTaskRegistered
| groupBy([aid, TaskName, TaskExecCommand, TaskAuthor], limit=max)Find ScheduledTaskDeleted events by host
#event_simpleName=ScheduledTaskDeleted
| groupBy(aid, function=collect([TaskName, UserName]), limit=max)Find events triggered at logon
#event_simpleName=ScheduledTaskRegistered
| parseXml(TaskXml)
| Trigger:=rename(Task.Triggers.LogonTrigger.Enabled)
| Trigger=* // Remove this line if you don't care if it's empty
| table([aid, Trigger, TaskXml], limit=1000)Find events triggered at startup
#event_simpleName=ScheduledTaskRegistered
| parseXml(TaskXml)
| Trigger:=rename(Task.Triggers.BootTrigger.Enabled)
| Trigger=* // Remove this line if you don't care if it's empty
| table([aid, Trigger, TaskXml], limit=1000)Find events triggered at a specific time
For info about how you can convert or translate timestamps and other time related values to alternative formats, see Time Syntax.
Find events that are scheduled
Find events triggered on an event
Find tasks scheduled by logon type
Find tasks scheduled by user ID
Find tasks scheduled by run level
Find tasks scheduled with ComHandler
Find hidden scheduled tasks
Hunting suspicious processes
Find any instances of common reconnaissance tools on a host
Find any instances where multiple recon commands were executed by the same parent process
Find any BITS transfers (can be used to transfer malicious binaries)
Find any powershell.exe downloads
Find any encoded PowerShell commands
Find a list of processes that executed from the Recycle Bin
Find a list of processes executing from User Profile file paths
Processes generally shouldn’t be executing from user spaces. These paths cover spaces that are considered to be User Paths.
Find a list of processes executing from browser file paths
Similar to the previous query, processes typically shouldn’t be running from these locations.
Find the responsible process for starting a service
Find binaries running as a service that do not originate from "System32"
Find an expected service running from an unexpected location
Find a specific service name
Find a list of services that were stopped and on which hosts
--
Last updated