Defender-DeviceProcessEvents
4 events across 4 channels
| Event ID | Title | Channel |
|---|---|---|
| 9001000 | Process activity (any) | DeviceProcessEvents |
| 9001001 | Process created | ProcessCreated |
| 9001002 | Process opened (OpenProcess API call) | OpenProcessApiCall |
| 9001003 | Process primary token modified | ProcessPrimaryTokenModified |
Event ID 9001000 — Process activity (any)
#Description
Process activity (any)
Fields #
| Name | Description |
|---|---|
DeviceId | — |
DeviceName | — |
Timestamp | — |
ActionType | — |
FileName | — |
FolderPath | — |
SHA1 | — |
SHA256 | — |
MD5 | — |
ProcessId | — |
ProcessCommandLine | — |
AccountName | — |
AccountDomain | — |
InitiatingProcessFileName | — |
InitiatingProcessFolderPath | — |
InitiatingProcessSHA256 | — |
InitiatingProcessCommandLine | — |
InitiatingProcessAccountName | — |
InitiatingProcessAccountDomain | — |
InitiatingProcessParentFileName | — |
Detection Patterns #
Defender-DeviceProcessEvents Event ID 9001000: Process activityORSecurity-Auditing Event ID 4688: A new process has been created.ORSysmon Event ID 1: Process creation
26 rules
Kusto Query Language
Show 23 more (26 total)
Defender-DeviceProcessEvents Event ID 9001000: Process activityANDSecurity-Auditing Event ID 4688: A new process has been created.ANDSysmon Event ID 1: Process creation
14 rules
Kusto Query Language
Show 11 more (14 total)
Detection Rules #
View all rules referencing this event →
Kusto Query Language # view in reference
- SUNBURST suspicious SolarWinds child processes source medium: Identifies suspicious child processes of SolarWinds.Orion.Core.BusinessLayer.dll that may be evidence of the SUNBURST backdoor References: - https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html - https://gist.github.com/olafhartong/71ffdd4cab4b6acd5cbcd1a0691ff82f
References #
- Microsoft Defender XDR — advanced hunting reference https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-deviceprocessevents-table
Event ID 9001001 — Process created
Description
Process created
Fields #
| Name | Description |
|---|---|
DeviceId | — |
Timestamp | — |
FileName | — |
FolderPath | — |
SHA256 | — |
ProcessCommandLine | — |
AccountName | — |
InitiatingProcessFileName | — |
InitiatingProcessCommandLine | — |
References #
- Microsoft Defender XDR — advanced hunting reference https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-deviceprocessevents-table
Event ID 9001002 — Process opened (OpenProcess API call)
Description
Process opened (OpenProcess API call) — Sysmon-10 is ProcessAccess; Defender's OpenProcessApiCall is the closest equivalent.
Fields #
| Name | Description |
|---|---|
DeviceId | — |
Timestamp | — |
FileName | — |
ProcessId | — |
InitiatingProcessFileName | — |
InitiatingProcessCommandLine | — |
References #
- Microsoft Defender XDR — advanced hunting reference https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-deviceprocessevents-table
Event ID 9001003 — Process primary token modified
Description
Process primary token modified — No clean Windows-native equivalent.
Fields #
| Name | Description |
|---|---|
DeviceId | — |
Timestamp | — |
ProcessId | — |
AccountName | — |
InitiatingProcessFileName | — |
References #
- Microsoft Defender XDR — advanced hunting reference https://learn.microsoft.com/en-us/defender-xdr/advanced-hunting-deviceprocessevents-table