cs
Hunting Queries: CrowdStrike Query Language
#event_simpleName=ScheduledTaskRegistered
| groupBy([aid, TaskName, TaskExecCommand, TaskAuthor], limit=max)Find ScheduledTaskDeleted events by host
#event_simpleName=ScheduledTaskDeleted
| groupBy(aid, function=collect([TaskName, UserName]), limit=max)Find events triggered at logon
#event_simpleName=ScheduledTaskRegistered
| parseXml(TaskXml)
| Trigger:=rename(Task.Triggers.LogonTrigger.Enabled)
| Trigger=* // Remove this line if you don't care if it's empty
| table([aid, Trigger, TaskXml], limit=1000)Find events triggered at startup
#event_simpleName=ScheduledTaskRegistered
| parseXml(TaskXml)
| Trigger:=rename(Task.Triggers.BootTrigger.Enabled)
| Trigger=* // Remove this line if you don't care if it's empty
| table([aid, Trigger, TaskXml], limit=1000)Find events triggered at a specific time
Find events that are scheduled
Find events triggered on an event
Find tasks scheduled by logon type
Find tasks scheduled by user ID
Find tasks scheduled by run level
Find tasks scheduled with ComHandler
Find hidden scheduled tasks
Hunting suspicious processes
Find any instances where multiple recon commands were executed by the same parent process
Find any BITS transfers (can be used to transfer malicious binaries)
Find any powershell.exe downloads
Find any encoded PowerShell commands
Find a list of processes that executed from the Recycle Bin
Find a list of processes executing from User Profile file paths
Find a list of processes executing from browser file paths
Find the responsible process for starting a service
Find binaries running as a service that do not originate from "System32"
Find an expected service running from an unexpected location
Find a specific service name
Find a list of services that were stopped and on which hosts
Last updated