Defender-DeviceEvents › Event 9007000

Event ID 9007000 — Defender event (any)

Provider
Defender-DeviceEvents
Channel
DeviceEvents

Description

Defender event (any) — DeviceEvents is a catch-all; bridges only apply per-ActionType.

Fields #

NameDescription
DeviceId
Timestamp
ActionType
AdditionalFields
InitiatingProcessFileName
InitiatingProcessCommandLine

Detection Rules #

View all rules referencing this event →

Kusto Query Language # view in reference

  • Windows host username encoded in base64 web request source medium: 'This detection will identify network requests in HTTP proxy data that contains Base64 encoded usernames from machines in the DeviceEvents table. This technique was seen usee by POLONIUM in their RunningRAT tool.'
  • Office ASR rule triggered from browser spawned office process. source medium: The attacker sends a spearphishing email to a user. The email contains a link which points to a website that eventually presents the user a download of an MS Office document. This document contains a malicious macro. The macro triggers one of the ASR rules. This detection looks for Office ASR violations triggered by an Office document opened from a browser. Note: be aware that you need to have the proper ASR rules enabled for this detection to work.
  • SUNSPOT malware hashes source medium: 'This query uses Microsoft Defender for Endpoint data to look for IoCs associated with the SUNSPOT malware shared by Crowdstrike. More details: - https://www.crowdstrike.com/blog/sunspot-malware-technical-analysis/ - https://techcommunity.microsoft.com/blog/microsoftsentinelblog/monitoring-the-software-supply-chain-with-azure-sentinel/2176463/'
Show 1 more (4 total)
  • TEARDROP memory-only dropper source high: Identifies SolarWinds TEARDROP memory-only dropper IOCs in Window's defender Exploit Guard activity References: - https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html - https://gist.github.com/olafhartong/71ffdd4cab4b6acd5cbcd1a0691ff82f

References #