Defender-DeviceEvents

16 events across 16 channels

Event IDTitleChannel
9007000Defender event (any)DeviceEvents
9007001PowerShell command executedPowerShellCommand
9007002AMSI script detectedAmsiScriptDetected
9007003AMSI script content capturedAmsiScriptContent
9007004CreateRemoteThread API callCreateRemoteThreadApiCall
9007005Process injection detectedProcessInjectionDetected
9007006Named pipe eventNamedPipeEvent
9007007User account added to local groupUserAccountAddedToLocalGroup
9007008User account removed from local groupUserAccountRemovedFromLocalGroup
9007009ASR audit eventAsrAuditEvent
9007010ASR — LSASS credential theft (audited)AsrLsassCredentialTheftAudited
9007011ASR — Office child process (audited)AsrOfficeChildProcessAudited
9007012Antivirus reportAntivirusReport
9007013Scheduled task createdScheduledTaskCreated
9007014Scheduled task deletedScheduledTaskDeleted
9007015Scheduled task updatedScheduledTaskUpdated

Event ID 9007000 — Defender event (any)

#
Provider
Defender-DeviceEvents
Channel
DeviceEvents

Description

Defender event (any) — DeviceEvents is a catch-all; bridges only apply per-ActionType.

Fields #

NameDescription
DeviceId
Timestamp
ActionType
AdditionalFields
InitiatingProcessFileName
InitiatingProcessCommandLine

Detection Rules #

View all rules referencing this event →

Kusto Query Language # view in reference

  • Windows host username encoded in base64 web request source medium: 'This detection will identify network requests in HTTP proxy data that contains Base64 encoded usernames from machines in the DeviceEvents table. This technique was seen usee by POLONIUM in their RunningRAT tool.'
  • Office ASR rule triggered from browser spawned office process. source medium: The attacker sends a spearphishing email to a user. The email contains a link which points to a website that eventually presents the user a download of an MS Office document. This document contains a malicious macro. The macro triggers one of the ASR rules. This detection looks for Office ASR violations triggered by an Office document opened from a browser. Note: be aware that you need to have the proper ASR rules enabled for this detection to work.
  • SUNSPOT malware hashes source medium: 'This query uses Microsoft Defender for Endpoint data to look for IoCs associated with the SUNSPOT malware shared by Crowdstrike. More details: - https://www.crowdstrike.com/blog/sunspot-malware-technical-analysis/ - https://techcommunity.microsoft.com/blog/microsoftsentinelblog/monitoring-the-software-supply-chain-with-azure-sentinel/2176463/'
Show 1 more (4 total)
  • TEARDROP memory-only dropper source high: Identifies SolarWinds TEARDROP memory-only dropper IOCs in Window's defender Exploit Guard activity References: - https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html - https://gist.github.com/olafhartong/71ffdd4cab4b6acd5cbcd1a0691ff82f

References #

Event ID 9007001 — PowerShell command executed

#
Provider
Defender-DeviceEvents
Channel
PowerShellCommand

Description

PowerShell command executed — PowerShell ScriptBlockLogging captures the same surface.

Fields #

NameDescription
DeviceId
Timestamp
AdditionalFields
InitiatingProcessFileName
InitiatingProcessCommandLine

Detection Patterns #

References #

Event ID 9007002 — AMSI script detected

Provider
Defender-DeviceEvents
Channel
AmsiScriptDetected

Description

AMSI script detected — Defender-only; no Windows-native equivalent.

Fields #

NameDescription
DeviceId
Timestamp
AdditionalFields
InitiatingProcessFileName

References #

Event ID 9007003 — AMSI script content captured

#
Provider
Defender-DeviceEvents
Channel
AmsiScriptContent

Description

AMSI script content captured — Defender-only; no Windows-native equivalent.

Fields #

NameDescription
DeviceId
Timestamp
AdditionalFields

Detection Rules #

View all rules referencing this event →

Kusto Query Language # view in reference

  • Deimos Component Execution source high: Jupyter, otherwise known as SolarMarker, is a malware family and cluster of components known for its info-stealing and backdoor capabilities that mainly proliferates through search engine optimization manipulation and malicious advertising in order to successfully encourage users to download malicious templates and documents. This malware has been popular since 2020 and currently is still active as of 2021.

References #

Event ID 9007004 — CreateRemoteThread API call

#
Provider
Defender-DeviceEvents
Channel
CreateRemoteThreadApiCall

Description

CreateRemoteThread API call

Fields #

NameDescription
DeviceId
Timestamp
ProcessId
InitiatingProcessFileName

Detection Patterns #

References #

Event ID 9007005 — Process injection detected

Provider
Defender-DeviceEvents
Channel
ProcessInjectionDetected

Description

Process injection detected — Defender-only; no Windows-native equivalent.

Fields #

NameDescription
DeviceId
Timestamp
ProcessId
InitiatingProcessFileName

References #

Event ID 9007006 — Named pipe event

#
Provider
Defender-DeviceEvents
Channel
NamedPipeEvent

Description

Named pipe event

Fields #

NameDescription
DeviceId
Timestamp
FileName
InitiatingProcessFileName

Detection Patterns #

Named Pipe

15 rules

Sigma

Florian Roth (Nextron Systems), Wojciech Lesicki
Florian Roth (Nextron Systems)
Florian Roth (Nextron Systems), Christian Burkard (Nextron Systems)
Show 3 more (6 total)
Florian Roth (Nextron Systems), blueteam0ps, elhoim

Splunk

Teoderick Contreras, Splunk
Show 3 more (6 total)
Teoderick Contreras, Splunk

References #

Event ID 9007007 — User account added to local group

#
Provider
Defender-DeviceEvents
Channel
UserAccountAddedToLocalGroup

Description

User account added to local group

Fields #

NameDescription
DeviceId
Timestamp
AccountName
AdditionalFields

Detection Patterns #

References #

Event ID 9007008 — User account removed from local group

Provider
Defender-DeviceEvents
Channel
UserAccountRemovedFromLocalGroup

Description

User account removed from local group

Fields #

NameDescription
DeviceId
Timestamp
AccountName
AdditionalFields

References #

Event ID 9007009 — ASR audit event

Provider
Defender-DeviceEvents
Channel
AsrAuditEvent

Description

ASR audit event — Defender ASR audit; loosely maps to Defender-1121 channel events.

Fields #

NameDescription
DeviceId
Timestamp
AdditionalFields
InitiatingProcessFileName

References #

Event ID 9007010 — ASR — LSASS credential theft (audited)

Provider
Defender-DeviceEvents
Channel
AsrLsassCredentialTheftAudited

Description

ASR — LSASS credential theft (audited) — Defender ASR; no native equivalent.

Fields #

NameDescription
DeviceId
Timestamp
InitiatingProcessFileName

References #

Event ID 9007011 — ASR — Office child process (audited)

Provider
Defender-DeviceEvents
Channel
AsrOfficeChildProcessAudited

Description

ASR — Office child process (audited) — Defender ASR; no native equivalent.

Fields #

NameDescription
DeviceId
Timestamp
InitiatingProcessFileName
FileName

References #

Event ID 9007012 — Antivirus report

Provider
Defender-DeviceEvents
Channel
AntivirusReport

Description

Antivirus report — Defender AV; loosely maps to Defender-1116/1117 detected/quarantined events.

Fields #

NameDescription
DeviceId
Timestamp
FileName
FolderPath
AdditionalFields

References #

Event ID 9007013 — Scheduled task created

Provider
Defender-DeviceEvents
Channel
ScheduledTaskCreated

Description

Scheduled task created

Fields #

NameDescription
DeviceId
Timestamp
AdditionalFields
InitiatingProcessFileName

References #

Event ID 9007014 — Scheduled task deleted

Provider
Defender-DeviceEvents
Channel
ScheduledTaskDeleted

Description

Scheduled task deleted

Fields #

NameDescription
DeviceId
Timestamp
AdditionalFields
InitiatingProcessFileName

References #

Event ID 9007015 — Scheduled task updated

Provider
Defender-DeviceEvents
Channel
ScheduledTaskUpdated

Description

Scheduled task updated

Fields #

NameDescription
DeviceId
Timestamp
AdditionalFields
InitiatingProcessFileName

References #