Detection rules › Kusto Query Language

Trusted Developer Utilities Proxy Execution

Source
upstream

This detection looks at process executions - in some cases with specific command line attributes to filter a lot of common noise.

MITRE ATT&CK coverage

TacticTechniques
Defense EvasionT1127 Trusted Developer Utilities Proxy Execution

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation
Security-Auditing4688A new process has been created.
Defender-DeviceProcessEvents9001000Process activity (any)

Stages and Predicates

Stage 1: source

DeviceProcessEvents

Stage 2: where

 macro "(Timestamp > ago(Timeframe))"

Stage 3: where

and
  not
    or
      and
        or
          InitiatingProcessFileName eq "WDExpress.exe"
          InitiatingProcessFileName eq "devenv.exe"
        InitiatingProcessFolderPath starts_with "C:\\\\Program Files (x86)\\\\Microsoft Visual Studio"
      FolderPath starts_with "C:\\\\Program Files (x86)\\\\Microsoft Visual Studio"
  or
    and
      FileName eq "ilsasm.exe"
      ProcessCommandLine match ["out", "target", "t:", "reference", "r:"]
    and
      FileName match ["vbc.exe", "csc.exe", "jsc.exe"]
      ProcessCommandLine match ["/exe", "/dll", "/pe64", "-exe", "-dll", "-pe64"]
    FileName match ["msbuild.exe", "msxsl.exe"]

Exclusions

Top-level NOT(...) conjuncts — predicates this rule actively suppresses.

StageFieldKindExcluded values
1InitiatingProcessFileNameeqWDExpress.exe
2InitiatingProcessFileNameeqdevenv.exe
3Imagestarts_withC:\\Program Files (x86)\\Microsoft Visual Studio
4Imagestarts_withC:\\Program Files (x86)\\Microsoft Visual Studio

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
FileNameeq
  • ilsasm.exe
FileNamematch
  • csc.exe
  • jsc.exe
  • msbuild.exe
  • msxsl.exe
  • vbc.exe
ProcessCommandLinematch
  • -dll
  • -exe
  • -pe64
  • /dll
  • /exe
  • /pe64
  • out
  • r:
  • reference
  • t:
  • target