cs

Hunting Queries: CrowdStrike Query Language

Find ScheduledTaskRegistered events by host

#event_simpleName=ScheduledTaskRegistered
| groupBy([aid, TaskName, TaskExecCommand, TaskAuthor], limit=max)

Find ScheduledTaskDeleted events by host

#event_simpleName=ScheduledTaskDeleted
| groupBy(aid, function=collect([TaskName, UserName]), limit=max)

Find events triggered at logon

#event_simpleName=ScheduledTaskRegistered
| parseXml(TaskXml)
| Trigger:=rename(Task.Triggers.LogonTrigger.Enabled)
| Trigger=* // Remove this line if you don't care if it's empty
| table([aid, Trigger, TaskXml], limit=1000)

Find events triggered at startup

#event_simpleName=ScheduledTaskRegistered
| parseXml(TaskXml)
| Trigger:=rename(Task.Triggers.BootTrigger.Enabled)
| Trigger=* // Remove this line if you don't care if it's empty
| table([aid, Trigger, TaskXml], limit=1000)

Find events triggered at a specific time

For info about how you can convert or translate timestamps and other time related values to alternative formats, see Time Syntax.

Find events that are scheduled

Find events triggered on an event

Find tasks scheduled by logon type

Find tasks scheduled by user ID

Find tasks scheduled by run level

Find tasks scheduled with ComHandler

Find hidden scheduled tasks


Hunting suspicious processes

Find any instances of common reconnaissance tools on a host

Find any instances where multiple recon commands were executed by the same parent process

Find any BITS transfers (can be used to transfer malicious binaries)

Find any powershell.exe downloads

Find any encoded PowerShell commands

Find a list of processes that executed from the Recycle Bin

Find a list of processes executing from User Profile file paths

Processes generally shouldn’t be executing from user spaces. These paths cover spaces that are considered to be User Paths.

Find a list of processes executing from browser file paths

Similar to the previous query, processes typically shouldn’t be running from these locations.

Find the responsible process for starting a service

Find binaries running as a service that do not originate from "System32"

Find an expected service running from an unexpected location

Find a specific service name

Find a list of services that were stopped and on which hosts

--

Last updated