Detection rules › Kusto Query Language

Unusual identity creation using exchange powershell

Author
Microsoft Security Research
Source
upstream

' The query below identifies creation of unusual identity by the Europium actor to mimic Microsoft Exchange Health Manager Service account using Exchange PowerShell commands Reference: https://www.microsoft.com/security/blog/2022/09/08/microsoft-investigates-iranian-attacks-against-the-albanian-government/'

MITRE ATT&CK coverage

TacticTechniques
PersistenceT1136 Create Account

Event coverage

ProviderEvent IDTitle
Security-Auditing4688A new process has been created.

Stages and Predicates

Stage 1: source

<union>

Stage 2: union

union of 2 branches

Stage 3: extend

Stage 4: extend