CYFIRMA - Medium severity File Hash Indicators with Monitor Action Rule
| Id | 5347c581-eb36-4bf5-a7e5-be1fb2d617f5 |
| Rulename | CYFIRMA - Medium severity File Hash Indicators with Monitor Action Rule |
| Description | “This query retrieves file hash indicators marked for Monitoring, with no assigned role, from the CyfirmaIndicators_CL table. It extracts MD5, SHA1, and SHA256 hashes and includes threat metadata for use in preventive security controls such as EDRs, threat intel platforms.” |
| Severity | Medium |
| Tactics | Execution InitialAccess DefenseEvasion Impact |
| Techniques | T1204 T1566 T1027 T1486 T1566.001 |
| Required data connectors | CyfirmaCyberIntelligenceDC |
| Kind | Scheduled |
| Query frequency | 5m |
| Query period | 5m |
| Trigger threshold | 0 |
| Trigger operator | GreaterThan |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyfirma Cyber Intelligence/Analytic Rules/FileHashIndicatorsMonitorMediumSeverityRule.yaml |
| Version | 1.0.1 |
| Arm template | 5347c581-eb36-4bf5-a7e5-be1fb2d617f5.json |
// File Hash Indicators with Monitor Action
let timeFrame = 5m;
CyfirmaIndicators_CL
| where (ConfidenceScore < 80 and ConfidenceScore >= 50)
and TimeGenerated between (ago(timeFrame) .. now())
and pattern contains 'file:hashes' and RecommendedActions has 'Monitor' and (isempty(Roles) or not(Roles has_any ('Malware', 'Trojan')))
| extend MD5 = extract(@"file:hashes\.md5\s*=\s*'([a-fA-F0-9]{32})'", 1, pattern)
| extend SHA1 = extract(@"file:hashes\.'SHA-1'\s*=\s*'([a-fA-F0-9]{40})'", 1, pattern)
| extend SHA256 = extract(@"file:hashes\.'SHA-256'\s*=\s*'([a-fA-F0-9]{64})'", 1, pattern)
| extend
Algo_MD5='MD5',
Algo_SHA1= 'SHA1',
Algo_SHA256='SHA256',
ProviderName = 'CYFIRMA',
ProductName = 'DeCYFIR/DeTCT'
| project
MD5,
SHA1,
SHA256,
Algo_MD5,
Algo_SHA1,
Algo_SHA256,
ThreatActors,
Sources,
RecommendedActions,
Roles,
Country,
name,
Description,
ConfidenceScore,
SecurityVendors,
IndicatorID,
created,
modified,
valid_from,
Tags,
ThreatType,
TimeGenerated,
ProductName,
ProviderName
queryPeriod: 5m
query: |
// File Hash Indicators with Monitor Action
let timeFrame = 5m;
CyfirmaIndicators_CL
| where (ConfidenceScore < 80 and ConfidenceScore >= 50)
and TimeGenerated between (ago(timeFrame) .. now())
and pattern contains 'file:hashes' and RecommendedActions has 'Monitor' and (isempty(Roles) or not(Roles has_any ('Malware', 'Trojan')))
| extend MD5 = extract(@"file:hashes\.md5\s*=\s*'([a-fA-F0-9]{32})'", 1, pattern)
| extend SHA1 = extract(@"file:hashes\.'SHA-1'\s*=\s*'([a-fA-F0-9]{40})'", 1, pattern)
| extend SHA256 = extract(@"file:hashes\.'SHA-256'\s*=\s*'([a-fA-F0-9]{64})'", 1, pattern)
| extend
Algo_MD5='MD5',
Algo_SHA1= 'SHA1',
Algo_SHA256='SHA256',
ProviderName = 'CYFIRMA',
ProductName = 'DeCYFIR/DeTCT'
| project
MD5,
SHA1,
SHA256,
Algo_MD5,
Algo_SHA1,
Algo_SHA256,
ThreatActors,
Sources,
RecommendedActions,
Roles,
Country,
name,
Description,
ConfidenceScore,
SecurityVendors,
IndicatorID,
created,
modified,
valid_from,
Tags,
ThreatType,
TimeGenerated,
ProductName,
ProviderName
enabled: false
name: CYFIRMA - Medium severity File Hash Indicators with Monitor Action Rule
entityMappings:
- fieldMappings:
- columnName: Algo_MD5
identifier: Algorithm
- columnName: MD5
identifier: Value
entityType: FileHash
- fieldMappings:
- columnName: Algo_SHA1
identifier: Algorithm
- columnName: SHA1
identifier: Value
entityType: FileHash
- fieldMappings:
- columnName: Algo_SHA256
identifier: Algorithm
- columnName: SHA256
identifier: Value
entityType: FileHash
incidentConfiguration:
groupingConfiguration:
lookbackDuration: PT5H
reopenClosedIncident: false
matchingMethod: AllEntities
enabled: false
createIncident: true
suppressionDuration: 5m
suppressionEnabled: true
alertDetailsOverride:
alertDisplayNameFormat: 'High-Confidence File Hash Indicators with Monitor Action - {{name}} '
alertDescriptionFormat: '{{Description}} - {{name}} '
alertDynamicProperties:
- value: ProductName
alertProperty: ProductName
- value: ProviderName
alertProperty: ProviderName
description: |
"This query retrieves file hash indicators marked for Monitoring, with no assigned role, from the CyfirmaIndicators_CL table.
It extracts MD5, SHA1, and SHA256 hashes and includes threat metadata for use in preventive security controls such as EDRs, threat intel platforms."
kind: Scheduled
version: 1.0.1
eventGroupingSettings:
aggregationKind: AlertPerResult
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Cyfirma Cyber Intelligence/Analytic Rules/FileHashIndicatorsMonitorMediumSeverityRule.yaml
queryFrequency: 5m
severity: Medium
requiredDataConnectors:
- connectorId: CyfirmaCyberIntelligenceDC
dataTypes:
- CyfirmaIndicators_CL
triggerOperator: GreaterThan
triggerThreshold: 0
customDetails:
SecurityVendors: SecurityVendors
ValidFrom: valid_from
ThreatType: ThreatType
TimeGenerated: TimeGenerated
Roles: Roles
Tags: Tags
Description: Description
Modified: modified
IndicatorID: IndicatorID
Created: created
ThreatActors: ThreatActors
RecommendedActions: RecommendedActions
ConfidenceScore: ConfidenceScore
Sources: Sources
Country: Country
tactics:
- Execution
- InitialAccess
- DefenseEvasion
- Impact
id: 5347c581-eb36-4bf5-a7e5-be1fb2d617f5
relevantTechniques:
- T1204
- T1566
- T1027
- T1486
- T1566.001