Microsoft Sentinel Analytic Rules
cloudbrothers.infoAzure Sentinel RepoToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage

Quokka - Malicious Results Detected

Back
Id97ad71ed-e4c0-4f7a-b1a2-683108bece4f
RulenameQuokka - Malicious Results Detected
DescriptionDetects if there are any malicious results in the app events coming from organization devices.
SeverityMedium
TacticsInitialAccess
Execution
Persistence
PrivilegeEscalation
DefenseEvasion
CredentialAccess
Discovery
Collection
CommandAndControl
Impact
TechniquesT1406
T1409
T1414
T1417
T1418
T1422
T1424
T1429
T1430
T1471
T1474
T1481
T1509
T1512
T1513
T1516
T1517
T1532
T1541
T1544
T1582
T1616
T1617
T1623
T1624
T1625
T1627
T1628
T1629
T1630
T1631
T1633
T1634
T1635
T1636
T1638
T1640
T1641
T1642
T1643
Required data connectorsQscoutAppEventsCCFDefinition
KindScheduled
Query frequency1h
Query period1h
Trigger threshold0
Trigger operatorgt
Source Urihttps://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Quokka/Analytic Rules/MaliciousResultsDetection.yaml
Version1.0.0
Arm template97ad71ed-e4c0-4f7a-b1a2-683108bece4f.json
Deploy To Azure
let timeRange = 1h;
let appEventsWithMaliciousResults = QscoutAppEvents_CL
| extend AccountCustomEntity = tostring(org_id)
| where TimeGenerated >= ago(timeRange)
| where result_type == 'maliciousness'
| where isnotempty(results.entries);
appEventsWithMaliciousResults
| mv-expand entry = results.entries
| project
    TimeGenerated,
    AccountCustomEntity,
    app_id,
    mdm_source,
    mdm_device_id,
    package,
    platform,
    version,
    rule_id = tostring(entry.ruleId),
    desription = tostring(entry.description),
    threat_level = toint(entry.threatLevel),
    threat_types = tostring(entry.threatTypes)
tactics:
- InitialAccess
- Execution
- Persistence
- PrivilegeEscalation
- DefenseEvasion
- CredentialAccess
- Discovery
- Collection
- CommandAndControl
- Impact
query: |
  let timeRange = 1h;
  let appEventsWithMaliciousResults = QscoutAppEvents_CL
  | extend AccountCustomEntity = tostring(org_id)
  | where TimeGenerated >= ago(timeRange)
  | where result_type == 'maliciousness'
  | where isnotempty(results.entries);
  appEventsWithMaliciousResults
  | mv-expand entry = results.entries
  | project
      TimeGenerated,
      AccountCustomEntity,
      app_id,
      mdm_source,
      mdm_device_id,
      package,
      platform,
      version,
      rule_id = tostring(entry.ruleId),
      desription = tostring(entry.description),
      threat_level = toint(entry.threatLevel),
      threat_types = tostring(entry.threatTypes)  
requiredDataConnectors:
- dataTypes:
  - QscoutAppEvents_CL
  connectorId: QscoutAppEventsCCFDefinition
name: Quokka - Malicious Results Detected
kind: Scheduled
queryPeriod: 1h
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Quokka/Analytic Rules/MaliciousResultsDetection.yaml
triggerThreshold: 0
description: |
    'Detects if there are any malicious results in the app events coming from organization devices.'
version: 1.0.0
status: Available
queryFrequency: 1h
severity: Medium
entityMappings:
- entityType: Account
  fieldMappings:
  - identifier: Name
    columnName: AccountCustomEntity
triggerOperator: gt
id: 97ad71ed-e4c0-4f7a-b1a2-683108bece4f
relevantTechniques:
- T1406
- T1409
- T1414
- T1417
- T1418
- T1422
- T1424
- T1429
- T1430
- T1471
- T1474
- T1481
- T1509
- T1512
- T1513
- T1516
- T1517
- T1532
- T1541
- T1544
- T1582
- T1616
- T1617
- T1623
- T1624
- T1625
- T1627
- T1628
- T1629
- T1630
- T1631
- T1633
- T1634
- T1635
- T1636
- T1638
- T1640
- T1641
- T1642
- T1643