Narrow Hunting Queries

These query examples yield low false positives, but may rarely produce results.

The example queries in this section are meant to be a starting point for your investigations. You may need to update the Features (filters) in each query to use indicators specific to your environment or situation.

Each of these examples is formatted with the individual Element in the query on its own separate line, in bold text. Features (filters) applied to the Element follow the Element name in regular weight text. Each example also contains a description of the goal of the hunt and the explanatory statement of what you want to find.

Find Trickbot by Module

Goal: Search for processes with Trickbot’s malicious module (core-dll.dll)

Explanatory statement: I want to find processes that use the Trickbot malicious module named core-dll.dll.

Construct this query:

Process Element THEN

Loaded modules Element -> filter for Name contains core-dll.dll

Trickbot

Find fileless malware persistence via MSHTA

Goal: Find well-hidden Kovter variants

Explanatory statement: I want to find hidden instances of the Kovter malware.

Construct this query:

Process Element -> filter for Command line contains javascript OR about

Javascript