Defender-DeviceProcessEvents

4 events across 4 channels

Event IDTitleChannel
9001000Process activity (any)DeviceProcessEvents
9001001Process createdProcessCreated
9001002Process opened (OpenProcess API call)OpenProcessApiCall
9001003Process primary token modifiedProcessPrimaryTokenModified

Event ID 9001000 — Process activity (any)

#
Provider
Defender-DeviceProcessEvents
Channel
DeviceProcessEvents

Description

Process activity (any)

Fields #

NameDescription
DeviceId
DeviceName
Timestamp
ActionType
FileName
FolderPath
SHA1
SHA256
MD5
ProcessId
ProcessCommandLine
AccountName
AccountDomain
InitiatingProcessFileName
InitiatingProcessFolderPath
InitiatingProcessSHA256
InitiatingProcessCommandLine
InitiatingProcessAccountName
InitiatingProcessAccountDomain
InitiatingProcessParentFileName

Detection Patterns #

26 rules

Detection Rules #

View all rules referencing this event →

Kusto Query Language # view in reference

  • SUNBURST suspicious SolarWinds child processes source medium: Identifies suspicious child processes of SolarWinds.Orion.Core.BusinessLayer.dll that may be evidence of the SUNBURST backdoor References: - https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html - https://gist.github.com/olafhartong/71ffdd4cab4b6acd5cbcd1a0691ff82f

References #

Event ID 9001001 — Process created

Provider
Defender-DeviceProcessEvents
Channel
ProcessCreated

Description

Process created

Fields #

NameDescription
DeviceId
Timestamp
FileName
FolderPath
SHA256
ProcessCommandLine
AccountName
InitiatingProcessFileName
InitiatingProcessCommandLine

References #

Event ID 9001002 — Process opened (OpenProcess API call)

Provider
Defender-DeviceProcessEvents
Channel
OpenProcessApiCall

Description

Process opened (OpenProcess API call) — Sysmon-10 is ProcessAccess; Defender's OpenProcessApiCall is the closest equivalent.

Fields #

NameDescription
DeviceId
Timestamp
FileName
ProcessId
InitiatingProcessFileName
InitiatingProcessCommandLine

References #

Event ID 9001003 — Process primary token modified

Provider
Defender-DeviceProcessEvents
Channel
ProcessPrimaryTokenModified

Description

Process primary token modified — No clean Windows-native equivalent.

Fields #

NameDescription
DeviceId
Timestamp
ProcessId
AccountName
InitiatingProcessFileName

References #