NRT Base64 Encoded Windows Process Command-lines
| Id | c3e5dbaa-a540-408c-8b36-68bdfb3df088 |
| Rulename | NRT Base64 Encoded Windows Process Command-lines |
| Description | This detection identifies instances of a base64 encoded PE file header seen in the process command line parameter. |
| Severity | Medium |
| Tactics | Execution DefenseEvasion |
| Techniques | T1059 T1027 T1140 |
| Required data connectors | SecurityEvents WindowsSecurityEvents |
| Kind | NRT |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Windows Security Events/Analytic Rules/NRT_base64_encoded_pefile.yaml |
| Version | 1.0.2 |
| Arm template | c3e5dbaa-a540-408c-8b36-68bdfb3df088.json |
SecurityEvent
| where EventID == 4688
| where isnotempty(CommandLine)
| where CommandLine contains "TVqQAAMAAAAEAAA"
| extend HostName = tostring(split(Computer, '.', 0)[0]), DnsDomain = tostring(strcat_array(array_slice(split(Computer, '.'), 1, -1), '.'))
query: |
SecurityEvent
| where EventID == 4688
| where isnotempty(CommandLine)
| where CommandLine contains "TVqQAAMAAAAEAAA"
| extend HostName = tostring(split(Computer, '.', 0)[0]), DnsDomain = tostring(strcat_array(array_slice(split(Computer, '.'), 1, -1), '.'))
name: NRT Base64 Encoded Windows Process Command-lines
entityMappings:
- fieldMappings:
- columnName: SubjectAccount
identifier: FullName
- columnName: SubjectUserName
identifier: Name
- columnName: SubjectDomainName
identifier: NTDomain
entityType: Account
- fieldMappings:
- columnName: Computer
identifier: FullName
- columnName: HostName
identifier: HostName
- columnName: DnsDomain
identifier: DnsDomain
entityType: Host
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Windows Security Events/Analytic Rules/NRT_base64_encoded_pefile.yaml
description: |
'This detection identifies instances of a base64 encoded PE file header seen in the process command line parameter.'
kind: NRT
version: 1.0.2
status: Available
severity: Medium
requiredDataConnectors:
- connectorId: SecurityEvents
dataTypes:
- SecurityEvent
- connectorId: WindowsSecurityEvents
dataTypes:
- SecurityEvent
tactics:
- Execution
- DefenseEvasion
id: c3e5dbaa-a540-408c-8b36-68bdfb3df088
relevantTechniques:
- T1059
- T1027
- T1140