Data Theft Queries

Hunt for malicious behavior occurring in the data theft stage of a cyber attack.

The example queries in this section are meant to be a starting point for your investigations. You may need to update the Features (filters) in each query to use indicators specific to your environment or situation.

Each of these examples is formatted with the individual Element in the query on its own separate line, in bold text. Features (filters) applied to the Element follow the Element name in regular weight text. Each example also contains a description of the goal of the hunt and the explanatory statement of what you want to find.

High data transfer by injected process

Goal: Search for process with a high data transmission rate and that have a detected injected process.

Explanatory statement: I want to find processes that are transmitting a lot of data and are being injected into by a process that has been detected as an injecting process.

Construct this query:

Process Element -> filter for High Data Transmitted is True AND filter for Detected injected process is True

High Data Transfer

Find Java-based malware attempting remote access

Goal: Find Java-based malware that is attempting to retrieve credentials and perform key-logging.

Explanatory statement: I want to find Java-based malware that is trying to find credential information and log keystrokes.

Construct this query:

Registry entry Element -> Filter for JavaScript value is True

Hunting for Java Malware