Detection rules › Kusto Query Language

Windows host username encoded in base64 web request

Author
Thomas McElroy
Source
upstream

'This detection will identify network requests in HTTP proxy data that contains Base64 encoded usernames from machines in the DeviceEvents table. This technique was seen usee by POLONIUM in their RunningRAT tool.'

MITRE ATT&CK coverage

TacticTechniques
Command & ControlT1071.001 Application Layer Protocol: Web Protocols
ExfiltrationT1041 Exfiltration Over C2 Channel

Event coverage

ProviderEvent IDTitle
Defender-DeviceEvents9007000Defender event (any)

Stages and Predicates

Stage 1: source

DeviceEvents

Stage 2: where

 macro "(TimeGenerated > ago(accountLookback))"

Stage 3: summarize

Stage 4: where

InitiatingProcessAccountName is_not_null

Stage 5: extend

Stage 6: join

Stage 7: project