Detection rules › Kusto Query Language

Google Threat Intelligence - Threat Hunting Hash

Source
upstream

'Google Threat Intelligence hash correlation.'

MITRE ATT&CK coverage

TacticTechniques
ExecutionT1059 Command and Scripting Interpreter

Event coverage

ProviderEvent IDTitle
Sysmon11FileCreate
Sysmon23FileDelete (File Delete archived)
Sysmon26FileDeleteDetected (File Delete logged)
Security-Auditing4663An attempt was made to access an object.

Stages and Predicates

Stage 1: source

_Im_FileEvent

Stage 2: where

Hash is_not_null

Stage 3: extend

Stage 4: join

Stage 5: project