Falcon Queries

chevron-rightSuspiciousDnsRequesthashtag
eventtype=eam (ProcessRollup2 OR SyntheticProcessRollup2) earliest=-1h@h |regex FileName!=""chrome.exe|iexplore.exe|MicrosoftEdgeCP.exe|firefox.exe"" |regex DomainName!=""csync.loopme.me""
|rex field=CommandLine ""(?[^\\]+)$"" |stats count values(SHA256HashData) by TargetProcessId_decimal ComputerName timestamp FileName CommandLine |fields - count
|join TargetProcessId_decimal [search event_simpleName=SuspiciousDnsRequest |rename ContextProcessId_decimal as TargetProcessId_decimal |dedup TargetProcessId_decimal |stats count values(SHA256HashData) by TargetProcessId_decimal DomainName |fields - count] |dedup DomainName
chevron-rightShow me a list of processes that executed from the Recycle Bin for a specific AIDhashtag
ImageFileName=$Recycle.Bin event_simpleName=""ProcessRollup2"" earliest=-1h@h |regex FileName!=""chrome.exe|iexplore.exe|MicrosoftEdgeCP.exe|firefox.exe"" |stats values(name) values(SHA256HashData) values(ComputerName) values(ImageFileName) count by aid
chevron-rightShow me any BITS transfers (can be used to transfer malicious binaries)hashtag
event_simpleName=""ProcessRollup2"" FileName=bitsadmin.exe (CommandLine=/Transfer OR CommandLine=/Addfile) earliest=-1h@h |dedup CommandLine |stats count by _time aid ComputerName UserName ImageFileName CommandLine TargetFileName SHA256HashData |sort -_time
chevron-rightShow me any encoded PowerShell commandshashtag
event_simpleName=""ProcessRollup2"" FileName=powershell.exe (CommandLine=-enc OR CommandLine=encoded) UserName!=SPAMMYUSER earliest=-24h@h |regex CommandLine!=""(?i)Office.ValidateResult.scratch|SPAMMMY_POWERSHEL_ENC*"" |rex field=CommandLine ""(?[^\\]+)$"" |stats values(UserName) values(CommandLine) values(ComputerName) count by CommandLineTrim |sort -count
chevron-rightShow me a list of processes executing from User Profile file pathshashtag
event_simpleName=""ProcessRollup2"" ComputerName=* earliest=-24h@h
 |regex CommandLine=""\\\\users\\\\"" 
 |regex CommandLine!=""(?i)SPAMMY.exe|SPAMMY.exe|SPAMMY.exe"" 
 |rex field=CommandLine ""(?<CommandLineTrim>[^\\\\]+)$"" 
 |stats dc(UserName) values(SHA256HashData) values(CommandLineTrim) dc(ComputerName) count by FileName
 |sort -count 
 |where count <10
chevron-rightShow me the responsible process for starting a servicehashtag
event_simpleName=ServiceStarted ComputerName=* earliest=-7d@h
 |dedup CommandLine
 |rex field=CommandLine ""(?<CommandLineTrim>[^\\\\]+)$"" 
 
 |stats values(ComputerName) values(UserName) values(CommandLineTrim) count by FileName 
 |sort -count
chevron-rightShow me all CreateService events with non internal remote connectionshashtag
chevron-rightShow me non-System32 binaries running as a hosted servicehashtag
chevron-rightShow me a list of web servers or database processes running under a Local System accounthashtag
chevron-rightShow me user accounts created with logonhashtag
chevron-rightShow me the responsible process for the UserAccountCreated eventhashtag
chevron-rightShow me all Firewall Set Rule eventshashtag
chevron-rightShow me all FirewallChangeOption events (with human-readable profile description)hashtag
chevron-rightShow me a list of outbound network traffic on non-standard ports and the process info attached to themhashtag
chevron-rightShow me a list of low-volume domain name requestshashtag
chevron-rightShow all Remote Desktop Protocol (RDP) connections observed on a specific hosthashtag
chevron-rightHunting Suspicious Registry Changeshashtag
chevron-rightSysInternals Usehashtag
chevron-rightNWL_CMD run with Echo and & Parameters-v3hashtag
chevron-rightNWL_Administrator Enumerationhashtag
chevron-rightNWL_Wscript Runs Obfuscated JShashtag
chevron-rightNWL_Changes to Known DLLs registryhashtag
chevron-rightNWL_T1121 - Regsvcs/Regasm - Making Network Connectionshashtag
chevron-rightNWL_CMD or PS Invoke-Expression with Env Variablehashtag
chevron-rightNWL_WannaCryhashtag
chevron-rightOff Shore Non Standard Portshashtag
chevron-rightRegkey stuffhashtag
chevron-rightReview all events for ComputerNamehashtag
chevron-rightAid and/or UserName>userinfo for tickethashtag
chevron-rightWindows_Patch_Status (BlueKeepStatus)hashtag
chevron-rightShow processes and connected domain nameshashtag
chevron-rightNWL_Potential Post Exploithashtag
chevron-rightNWL_Potential Post Exploit Tools Elevatedhashtag
chevron-rightExecution of Renamed Executableshashtag
chevron-rightLOLBAS (add to ID:86 or 87)hashtag

chevron-rightSuspicious PowerShell Process, Spawned from Explorer, with Network Connectionshashtag
chevron-rightPowershell Downloadshashtag
chevron-rightMAC: Detecting Word Macroshashtag
chevron-rightMAC: Investigating a Word macrohashtag
chevron-rightMAC: Rare launch agents: list and count launch agentshashtag
chevron-rightMAC: Removing the quarantine attributehashtag
chevron-rightMAC: Very busy process treeshashtag
chevron-rightMAC: Processes running from tmp dirshashtag
chevron-rightMAC: Processes running from /Library/Scriptshashtag
chevron-rightMAC: Copies from tmp dirs to Usershashtag
chevron-rightMAC: Chown commands run on hidden user dirshashtag
chevron-rightMAC: Chmod commands run on hidden user dirs 2hashtag
chevron-rightMAC: Long running processes with few network connections (i.e. stealthy C2)hashtag
chevron-rightMAC: Process tree that contains both sh and launchctlhashtag
chevron-rightMAC: Process trees with lots of shellshashtag
chevron-rightMAC: Unusual number of recon commands for the environment for 1 hosthashtag
chevron-rightMAC: Rare processes associated with security_authtrampolinehashtag
chevron-rightMAC: Rare processes associated with security_authtrampoline events queryhashtag
chevron-rightMAC: Rare processes associated with security_authtrampoline Why isn’t the first query enough?hashtag
chevron-rightMAC: Rare self-deleting processeshashtag
chevron-rightMAC: Was a process orphaned?hashtag
chevron-rightMAC: Find orphaned processes for 1 host v1hashtag
chevron-rightRDP inbound Splunkhashtag
chevron-rightenc powershell advancedhashtag
chevron-rightDST_DNS>Processhashtag
chevron-rightDump what you have access to ( indexes and lookup tables and the size of the index tables )hashtag
chevron-rightSearch process tree tree view treeview by ContextProcessId_decimalhashtag
chevron-rightCS:MAC>Apple dump all non 192 Apple Inc MAC Address split IP addresshashtag
chevron-rightTreeId_decimal tree id process tree sort of ...( this is more of a deep search when there are to many hits for normal DomainName/FileName Search his search requires a “event time” (earliest) ,aid and a “the last number on the URL bar of an alert tree view” (TreeId_decimal) but it’s tricky with stuff like ‘explore.exe’ or ‘excel.exe’ that has been running for hours if not DAYS I had to add 3hrs to pickup an alert CommandLine and domainhashtag
chevron-rightsearch -N days + 24hrs so -3d would be 24hrs after 3 days ago... good for checking day by day -1 -2 -3 -4 -5 -6 -7 is a week etc..hashtag
chevron-rightfilter out fields regex good for != string1|string2hashtag
chevron-rightSearching in Bashhashtag
chevron-rightCreate data for Splunk search testinghashtag
chevron-rightExpand IP addresses and count class C addresseshashtag
chevron-rightFind bad searches slow searches optimize searcheshashtag
chevron-rightGet all Asset infohashtag
chevron-rightHunting Urlshashtag
chevron-rightGet count of Cisco AnyConnect VPN IP'shashtag
chevron-rightExtract usernames from windows and *nix FilePath and CommandLine with given aid or ComputerNamehashtag
chevron-rightSearch for remote access servers runninghashtag
chevron-rightFind Chrome Remote Desktop Hits Via DNShashtag
chevron-rightCount of local admin users loginshashtag
chevron-rightCreate base64 lookup / macro to encode / decode base64hashtag
chevron-rightHTA fileshashtag
chevron-rightCity,State of possible Wireless Hot Spot usage (WIP old need more wireless network ranges)hashtag
chevron-rightTake the first 10 hits on a search and look for intresting fields after and beforehashtag
chevron-rightShow me Running Processes with MD5 or SHA256 Hash from all machineshashtag
chevron-rightShow me Running Processes with MD5 or SHA256 Hash from all machineshashtag
chevron-rightShow me Running Processes with MD5 or SHA256 Hash from all machineshashtag
chevron-rightGet Injected Processes from all machineshashtag
chevron-rightGet Injected Processes from all machineshashtag
chevron-rightShow me AutoRun Program Details from all machineshashtag
chevron-rightShow me Running Processes With Parent containing "mutex" from all machineshashtag
chevron-rightGet Run Keys Contains ‘VIRUSNAME’ from all Machines (ex: win32.maze.exe)hashtag
chevron-rightShow me PSexec Event Consumers from all machineshashtag
chevron-rightShow me DLL Load Order Hijacking from all machineshashtag
chevron-rightShow me Running Processes with MD5 or SHA256 Hash from all machineshashtag
chevron-rightShow me Running Processes with MD5 or SHA256 Hash from all machineshashtag
chevron-rightShow me Running Processes with MD5 or SHA256 Hash from all machineshashtag
chevron-rightGet Injected Processes from all machineshashtag
chevron-rightGet Injected Processes from all machineshashtag
chevron-rightShow me AutoRun Program Details from all machineshashtag
chevron-rightShow me Running Processes With Parent containing "mutex" from all machineshashtag
chevron-rightGet Run Keys Contains ‘VIRUSNAME’ from all Machines (ex: win32.maze.exe)hashtag
chevron-rightShow me PSexec Event Consumers from all machineshashtag
chevron-rightShow me DLL Load Order Hijacking from all machineshashtag

Last updated