HarfangLab EDR
HarfangLab EDR Pack.#
This Integration is part of theSupported versions
Supported Cortex XSOAR versions: 6.2.0 and later.
HarfangLab EDR Connector, Compatible version 2.13.7+ This integration was integrated and tested with version 2.13.7+ of Hurukai
#
Configure HarfangLab EDR in CortexParameter | Description | Required |
---|---|---|
API URL | True | |
Fetch incidents | False | |
Incident type | False | |
API Key | False | |
Incidents Fetch Interval | False | |
Fetch alerts with type | Comma-separated list of types of alerts to fetch (sigma, yara, hlai, vt, ransom, ioc, glimps, orion...). | False |
Minimum severity of alerts to fetch | True | |
Fetch alerts with status (ACTIVE, CLOSED) | False | |
Maximum number of incidents to fetch per call | Fetch maximum <max_fetch> security events and/or threats per call (leave empty if unlimited). | False |
First fetch time | Start fetching alerts and/or threats whose creation date is higher than now minus <first_fetch> days. | True |
Mirroring Direction | Choose the direction to mirror the detection: Incoming (from HarfangLab EDR to Cortex XSOAR), Outgoing (from Cortex XSOAR to HarfangLab EDR), or Incoming and Outgoing (to/from HarfangLab EDR and Cortex XSOAR). | False |
Fetch types | True | |
Close Mirrored security event or threat in the XSOAR | When selected, closes the XSOAR incident, which is mirrored from the HarfangLab EDR. | False |
Close Mirrored security event or threat in HarfangLab EDR | When selected, closes the HarfangLab EDR security event or threat in the HarfangLab EDR. | False |
Trust any certificate (not secure) | False | |
Use system proxy settings | False |
#
CommandsYou can execute these commands from the CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
fetch-incidentsAllows to retrieve incidents from the HarfangLab EDR API
#
Base Commandfetch-incidents
#
InputArgument Name | Description | Required |
---|
#
Context OutputThere is no context output for this command.
#
harfanglab-get-endpoint-infoGet endpoint information from agent_id
#
Base Commandharfanglab-get-endpoint-info
#
InputArgument Name | Description | Required |
---|---|---|
agent_id | Agent unique identifier as provided by the HarfangLab EDR Manager. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Agent | unknown | Agent information |
#
Command example!harfanglab-get-endpoint-info agent_id="0fae71cf-ebde-4533-a50c-b3c0290378db"
#
Context Example#
Human Readable Output#
Endpoint information for agent_id : 0fae71cf-ebde-4533-a50c-b3c0290378db
additional_info avg_cpu avg_memory bitness cpu_count cpu_frequency domainname driver_enabled driver_policy effective_policy_id effective_policy_revision external_ipaddress firstseen group_count hostname id installdate ipaddress ipmask isolation_policy isolation_state lastseen lastseen_error lastseen_warning machine_boottime osbuild osid osmajor osminor osproducttype ostype osversion policy producttype starttime status total_memory uninstall_status update_experimental update_status version additional_info1: null
additional_info2: null
additional_info3: null
additional_info4: null1.0 183558144.0 x64 2 3192 WORKGROUP true false e96699ef-3dd9-4718-90ef-c7e5646fd466 5 (REDACTED) 2022-06-15T06:42:50.008015Z 0 DC-01 0fae71cf-ebde-4533-a50c-b3c0290378db 2022/06/15 06:38:58 (REDACTED) (REDACTED) false true 2022-07-28T07:41:32.197641Z 2022-07-28T07:47:02.197641Z 2022-07-28T07:43:44.197641Z 2022-06-28T14:18:31Z 20348 00454-40000-00001-AA596 10 0 Windows Server 2022 Standard Evaluation windows 10.0.20348 id: e96699ef-3dd9-4718-90ef-c7e5646fd466
tenant: null
name: No psexec
description:
revision: 5
sleeptime: 60
sleepjitter: 10
telemetry_process: true
telemetry_process_limit: false
telemetry_process_limit_value: 1000
telemetry_network: true
telemetry_network_limit: false
telemetry_network_limit_value: 1000
telemetry_log: true
telemetry_log_limit: false
telemetry_log_limit_value: 1000
telemetry_remotethread: true
telemetry_remotethread_limit: false
telemetry_remotethread_limit_value: 1000
telemetry_alerts_limit: false
telemetry_alerts_limit_value: 1000
binary_download_enabled: true
loglevel: ERROR
use_sigma: true
ioc_mode: 2
hlai_mode: 1
hlai_skip_signed_ms: true
hlai_skip_signed_others: false
hlai_minimum_level: critical
hibou_mode: 0
hibou_skip_signed_ms: false
hibou_skip_signed_others: false
hibou_minimum_level: critical
yara_mode: 1
yara_skip_signed_ms: true
yara_skip_signed_others: false
use_driver: true
use_isolation: true
use_ransomguard: true
ransomguard_alert_only: false
self_protection: false
use_process_block: true
use_sigma_process_block: false
sigma_ruleset: 1
yara_ruleset: null
ioc_ruleset: nullserver 2022-06-28T14:18:47Z online 2133962752.0 0 false 0 2.15.0
#
harfanglab-endpoint-searchSearch for endpoint information from a hostname
#
Base Commandharfanglab-endpoint-search
#
InputArgument Name | Description | Required |
---|---|---|
hostname | Endpoint hostname. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Agent | unknown | Agent information. |
Harfanglab.Agent.id | string | agent id (DEPRECATED) |
Harfanglab.status | string | Status (DEPRECATED) |
#
Command example!harfanglab-endpoint-search hostname="DC-01"
#
Context Example#
Human Readable Output#
Endpoint information for Hostname : DC-01
additional_info avg_cpu avg_memory bitness cpu_count cpu_frequency domainname driver_enabled driver_policy external_ipaddress firstseen group_count hostname id installdate ipaddress ipmask isolation_policy isolation_state lastseen lastseen_error lastseen_warning machine_boottime osbuild osid osmajor osminor osproducttype ostype osversion policy producttype starttime status total_memory uninstall_status update_experimental update_status version additional_info1: null
additional_info2: null
additional_info3: null
additional_info4: null1.0 183558144.0 x64 2 3192 WORKGROUP true false (REDACTED) 2022-06-15T06:42:50.008015Z 0 DC-01 0fae71cf-ebde-4533-a50c-b3c0290378db 2022/06/15 06:38:58 (REDACTED) (REDACTED) false true 2022-07-28T07:41:32.197641Z 2022-07-28T07:47:02.197641Z 2022-07-28T07:43:44.197641Z 2022-06-28T14:18:31Z 20348 00454-40000-00001-AA596 10 0 Windows Server 2022 Standard Evaluation windows 10.0.20348 id: e96699ef-3dd9-4718-90ef-c7e5646fd466
tenant: null
name: No psexec
description:
revision: 5
sleeptime: 60
sleepjitter: 10
telemetry_process: true
telemetry_process_limit: false
telemetry_process_limit_value: 1000
telemetry_network: true
telemetry_network_limit: false
telemetry_network_limit_value: 1000
telemetry_log: true
telemetry_log_limit: false
telemetry_log_limit_value: 1000
telemetry_remotethread: true
telemetry_remotethread_limit: false
telemetry_remotethread_limit_value: 1000
telemetry_alerts_limit: false
telemetry_alerts_limit_value: 1000
binary_download_enabled: true
loglevel: ERROR
use_sigma: true
ioc_mode: 2
hlai_mode: 1
hlai_skip_signed_ms: true
hlai_skip_signed_others: false
hlai_minimum_level: critical
hibou_mode: 0
hibou_skip_signed_ms: false
hibou_skip_signed_others: false
hibou_minimum_level: critical
yara_mode: 1
yara_skip_signed_ms: true
yara_skip_signed_others: false
use_driver: true
use_isolation: true
use_ransomguard: true
ransomguard_alert_only: false
self_protection: false
use_process_block: true
use_sigma_process_block: false
sigma_ruleset: 1
yara_ruleset: null
ioc_ruleset: nullserver 2022-06-28T14:18:47Z online 2133962752.0 0 false 0 2.15.0 additional_info1: null
additional_info2: null
additional_info3: null
additional_info4: null0.6 125627596.0 x64 2 3192 WORKGROUP true false (REDACTED) 2022-06-14T22:23:08.393381Z 0 DC-01 706d4524-dc2d-4438-bfef-3b620646db7f 2022/06/14 21:56:49 (REDACTED) (REDACTED) false false 2022-06-15T06:33:46.544505Z 2022-06-15T06:39:16.544505Z 2022-06-15T06:35:58.544505Z 2022-06-14T22:00:23Z 20348 00454-40000-00001-AA081 10 0 Windows Server 2022 Standard Evaluation windows 10.0.20348 id: e96699ef-3dd9-4718-90ef-c7e5646fd466
tenant: null
name: No psexec
description:
revision: 5
sleeptime: 60
sleepjitter: 10
telemetry_process: true
telemetry_process_limit: false
telemetry_process_limit_value: 1000
telemetry_network: true
telemetry_network_limit: false
telemetry_network_limit_value: 1000
telemetry_log: true
telemetry_log_limit: false
telemetry_log_limit_value: 1000
telemetry_remotethread: true
telemetry_remotethread_limit: false
telemetry_remotethread_limit_value: 1000
telemetry_alerts_limit: false
telemetry_alerts_limit_value: 1000
binary_download_enabled: true
loglevel: ERROR
use_sigma: true
ioc_mode: 2
hlai_mode: 1
hlai_skip_signed_ms: true
hlai_skip_signed_others: false
hlai_minimum_level: critical
hibou_mode: 0
hibou_skip_signed_ms: false
hibou_skip_signed_others: false
hibou_minimum_level: critical
yara_mode: 1
yara_skip_signed_ms: true
yara_skip_signed_others: false
use_driver: true
use_isolation: true
use_ransomguard: true
ransomguard_alert_only: false
self_protection: false
use_process_block: true
use_sigma_process_block: false
sigma_ruleset: 1
yara_ruleset: null
ioc_ruleset: nullserver 2022-06-14T22:02:32Z offline 2133962752.0 0 false 0 2.15.0
#
harfanglab-api-callPerform a generic API call
#
Base Commandharfanglab-api-call
#
InputArgument Name | Description | Required |
---|---|---|
api_method | API method (GET, POST...). | Required |
api_endpoint | API endpoint (/api/version, /api/data/alert/alert/Alert/...). | Optional |
parameters | URL parameters. | Optional |
data | Posted data. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.API | unknown | API call result |
#
Command example!harfanglab-api-call api_method=GET api_endpoint=/api/version
#
Context Example#
Human Readable Output#
Results
version 2.29.7
#
harfanglab-telemetry-processesSearch processes
#
Base Commandharfanglab-telemetry-processes
#
InputArgument Name | Description | Required |
---|---|---|
hash | filehash to search (md5, sha1, sha256). | Optional |
hostname | Endpoint hostname. | Optional |
from_date | Start date (format: YYYY-MM-DDTHH:MM:SS). | Optional |
to_date | End date (format: YYYY-MM-DDTHH:MM:SS). | Optional |
limit | Maximum number of elements to fetch. Default is 100. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Telemetryprocesses.processes | unknown | Provides a list of processes |
agent.agentid | unknown | DEPRECATED |
current_directory | unknown | DEPRECATED |
hashes.sha256 | unknown | DEPRECATED |
#
Command example!harfanglab-telemetry-processes hostname="DC-01" hash=3541d189d1bd3341a72769d43bf487eaa3b20e80aa04a54550bbfa9a04360db3 limit=5
#
Context Example#
Human Readable Output#
Processes list
create date hostname process name image name commandline integrity level parent image parent commandline username signed signer sha256 2022-07-28T07:28:58.757000Z DC-01 sppsvc.exe C:\Windows\System32\sppsvc.exe C:\Windows\system32\sppsvc.exe System C:\Windows\System32\services.exe C:\Windows\system32\services.exe NT AUTHORITY\NETWORK SERVICE true Microsoft Windows 3541d189d1bd3341a72769d43bf487eaa3b20e80aa04a54550bbfa9a04360db3 2022-07-28T06:58:58.227000Z DC-01 sppsvc.exe C:\Windows\System32\sppsvc.exe C:\Windows\system32\sppsvc.exe System C:\Windows\System32\services.exe C:\Windows\system32\services.exe NT AUTHORITY\NETWORK SERVICE true Microsoft Windows 3541d189d1bd3341a72769d43bf487eaa3b20e80aa04a54550bbfa9a04360db3 2022-07-28T06:28:57.663000Z DC-01 sppsvc.exe C:\Windows\System32\sppsvc.exe C:\Windows\system32\sppsvc.exe System C:\Windows\System32\services.exe C:\Windows\system32\services.exe NT AUTHORITY\NETWORK SERVICE true Microsoft Windows 3541d189d1bd3341a72769d43bf487eaa3b20e80aa04a54550bbfa9a04360db3 2022-07-28T05:58:57.147000Z DC-01 sppsvc.exe C:\Windows\System32\sppsvc.exe C:\Windows\system32\sppsvc.exe System C:\Windows\System32\services.exe C:\Windows\system32\services.exe NT AUTHORITY\NETWORK SERVICE true Microsoft Windows 3541d189d1bd3341a72769d43bf487eaa3b20e80aa04a54550bbfa9a04360db3 2022-07-28T05:28:56.585000Z DC-01 sppsvc.exe C:\Windows\System32\sppsvc.exe C:\Windows\system32\sppsvc.exe System C:\Windows\System32\services.exe C:\Windows\system32\services.exe NT AUTHORITY\NETWORK SERVICE true Microsoft Windows 3541d189d1bd3341a72769d43bf487eaa3b20e80aa04a54550bbfa9a04360db3
#
Command example!harfanglab-telemetry-processes hostname="DC-01" limit=5
#
Context Example#
Human Readable Output#
Processes list
create date hostname process name image name commandline integrity level parent image parent commandline username signed signer sha256 2022-07-28T07:45:44.942000Z DC-01 MicrosoftEdgeUpdate.exe C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe /ua /installsource scheduler System C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs -p NT AUTHORITY\SYSTEM true Microsoft Corporation bef9dbed290af17cf3f30cc43fc0a94cdadc540f171c25df1363b2e852d0a042 2022-07-28T07:45:44.711000Z DC-01 conhost.exe C:\Windows\System32\conhost.exe \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 System C:\Program Files\HarfangLab\hurukai.exe C:\Program Files\HarfangLab\hurukai.exe {cf4a9162-2af0-0afe-8c36-45fd3dd29574} NT AUTHORITY\SYSTEM true Microsoft Windows 6b481d656414c50d8bd0bedcd615aeaf2f5f68576cb6732a9548e0da87729733 2022-07-28T07:45:44.704000Z DC-01 hurukai.exe C:\Program Files\HarfangLab\hurukai.exe C:\Program Files\HarfangLab\hurukai.exe {cf4a9162-2af0-0afe-8c36-45fd3dd29574} System C:\Program Files\HarfangLab\hurukai.exe C:\Program Files\HarfangLab\hurukai.exe NT AUTHORITY\SYSTEM true HARFANGLAB SAS 9d81d385fe2f41e8f4f96d64a37899003b54a644ba67f7197f0cdbd0b71144f0 2022-07-28T07:44:40.370000Z DC-01 conhost.exe C:\Windows\System32\conhost.exe \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 System C:\Program Files\HarfangLab\hurukai.exe C:\Program Files\HarfangLab\hurukai.exe {e273729b-d2f8-53a9-a10f-a60459dacc23} NT AUTHORITY\SYSTEM true Microsoft Windows 6b481d656414c50d8bd0bedcd615aeaf2f5f68576cb6732a9548e0da87729733 2022-07-28T07:44:40.363000Z DC-01 hurukai.exe C:\Program Files\HarfangLab\hurukai.exe C:\Program Files\HarfangLab\hurukai.exe {e273729b-d2f8-53a9-a10f-a60459dacc23} System C:\Program Files\HarfangLab\hurukai.exe C:\Program Files\HarfangLab\hurukai.exe NT AUTHORITY\SYSTEM true HARFANGLAB SAS 9d81d385fe2f41e8f4f96d64a37899003b54a644ba67f7197f0cdbd0b71144f0
#
Command example!harfanglab-telemetry-processes hash=3541d189d1bd3341a72769d43bf487eaa3b20e80aa04a54550bbfa9a04360db3 limit=5
#
Context Example#
Human Readable Output#
Processes list
create date hostname process name image name commandline integrity level parent image parent commandline username signed signer sha256 2022-07-28T07:46:16.086000Z WEBSERVER sppsvc.exe C:\Windows\System32\sppsvc.exe C:\Windows\system32\sppsvc.exe System C:\Windows\System32\services.exe C:\Windows\system32\services.exe NT AUTHORITY\NETWORK SERVICE true Microsoft Windows 3541d189d1bd3341a72769d43bf487eaa3b20e80aa04a54550bbfa9a04360db3 2022-07-28T07:29:25.127000Z WEBSERVER sppsvc.exe C:\Windows\System32\sppsvc.exe C:\Windows\system32\sppsvc.exe System C:\Windows\System32\services.exe C:\Windows\system32\services.exe NT AUTHORITY\NETWORK SERVICE true Microsoft Windows 3541d189d1bd3341a72769d43bf487eaa3b20e80aa04a54550bbfa9a04360db3 2022-07-28T07:28:58.757000Z DC-01 sppsvc.exe C:\Windows\System32\sppsvc.exe C:\Windows\system32\sppsvc.exe System C:\Windows\System32\services.exe C:\Windows\system32\services.exe NT AUTHORITY\NETWORK SERVICE true Microsoft Windows 3541d189d1bd3341a72769d43bf487eaa3b20e80aa04a54550bbfa9a04360db3 2022-07-28T06:59:24.716000Z WEBSERVER sppsvc.exe C:\Windows\System32\sppsvc.exe C:\Windows\system32\sppsvc.exe System C:\Windows\System32\services.exe C:\Windows\system32\services.exe NT AUTHORITY\NETWORK SERVICE true Microsoft Windows 3541d189d1bd3341a72769d43bf487eaa3b20e80aa04a54550bbfa9a04360db3 2022-07-28T06:58:58.227000Z DC-01 sppsvc.exe C:\Windows\System32\sppsvc.exe C:\Windows\system32\sppsvc.exe System C:\Windows\System32\services.exe C:\Windows\system32\services.exe NT AUTHORITY\NETWORK SERVICE true Microsoft Windows 3541d189d1bd3341a72769d43bf487eaa3b20e80aa04a54550bbfa9a04360db3
#
Command example!harfanglab-telemetry-processes hostname="DC-01" from_date="2022-07-22T20:26:10" to_date="2022-07-22T20:26:20" limit=5
#
Context Example#
Human Readable Output#
Processes list
create date hostname process name image name commandline integrity level parent image parent commandline username signed signer sha256 2022-07-22T20:26:19.645000Z DC-01 sppsvc.exe C:\Windows\System32\sppsvc.exe C:\Windows\system32\sppsvc.exe System C:\Windows\System32\services.exe C:\Windows\system32\services.exe NT AUTHORITY\NETWORK SERVICE true Microsoft Windows 3541d189d1bd3341a72769d43bf487eaa3b20e80aa04a54550bbfa9a04360db3
#
harfanglab-job-pipelistStart a job to get the list of pipes from a host (Windows)
#
Base Commandharfanglab-job-pipelist
#
InputArgument Name | Description | Required |
---|---|---|
agent_id | Agent unique identifier as provided by the HarfangLab EDR Manager. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Job.ID | string | id |
Harfanglab.Job.Action | string | HarfangLab job action |
#
Command example!harfanglab-job-pipelist agent_id="0fae71cf-ebde-4533-a50c-b3c0290378db"
#
Context Example#
Human Readable Output#
harfanglab-job-artifact-downloadfileStart a job to download a file from a host (Windows / Linux)
#
Base Commandharfanglab-job-artifact-downloadfile
#
InputArgument Name | Description | Required |
---|---|---|
agent_id | Agent unique identifier as provided by the HarfangLab EDR Manager. | Required |
filename | Path of the file to download. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Job.ID | string | id |
Harfanglab.Job.Action | string | HarfangLab job action |
#
Command example!harfanglab-job-artifact-downloadfile agent_id="0fae71cf-ebde-4533-a50c-b3c0290378db" filename="C:\\Program Files\\HarfangLab\\agent.ini"
#
Context Example#
Human Readable Output#
harfanglab-job-prefetchlistStart a job to get the list of prefetches from a host (Windows)
#
Base Commandharfanglab-job-prefetchlist
#
InputArgument Name | Description | Required |
---|---|---|
agent_id | Agent unique identifier as provided by the HarfangLab EDR Manager. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Job.ID | string | id |
Harfanglab.Job.Action | string | HarfangLab job action |
#
Command example!harfanglab-job-prefetchlist agent_id="0fae71cf-ebde-4533-a50c-b3c0290378db"
#
Context Example#
Human Readable Output#
harfanglab-job-runkeylistStart a job to get the list of run keys from a host (Windows)
#
Base Commandharfanglab-job-runkeylist
#
InputArgument Name | Description | Required |
---|---|---|
agent_id | Agent unique identifier as provided by the HarfangLab EDR Manager. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Job.ID | string | id |
Harfanglab.Job.Action | string | HarfangLab job action |
#
Command example!harfanglab-job-runkeylist agent_id="0fae71cf-ebde-4533-a50c-b3c0290378db"
#
Context Example#
Human Readable Output#
harfanglab-job-scheduledtasklistStart a job to get the list of scheduled tasks from a host (Windows)
#
Base Commandharfanglab-job-scheduledtasklist
#
InputArgument Name | Description | Required |
---|---|---|
agent_id | Agent unique identifier as provided by the HarfangLab EDR Manager. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Job.ID | string | id |
Harfanglab.Job.Action | string | HarfangLab job action |
#
Command example!harfanglab-job-scheduledtasklist agent_id="0fae71cf-ebde-4533-a50c-b3c0290378db"
#
Context Example#
Human Readable Output#
harfanglab-job-driverlistStart a job to get the list of drivers from a host (Windows)
#
Base Commandharfanglab-job-driverlist
#
InputArgument Name | Description | Required |
---|---|---|
agent_id | Agent unique identifier as provided by the HarfangLab EDR Manager. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Job.ID | string | id |
Harfanglab.Job.Action | string | HarfangLab job action |
#
Command example!harfanglab-job-driverlist agent_id="0fae71cf-ebde-4533-a50c-b3c0290378db"
#
Context Example#
Human Readable Output#
harfanglab-job-servicelistStart a job to get the list of services from a host (Windows)
#
Base Commandharfanglab-job-servicelist
#
InputArgument Name | Description | Required |
---|---|---|
agent_id | Agent unique identifier as provided by the HarfangLab EDR Manager. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Job.ID | string | id |
Harfanglab.Job.Action | string | HarfangLab job action |
#
Command example!harfanglab-job-servicelist agent_id="0fae71cf-ebde-4533-a50c-b3c0290378db"
#
Context Example#
Human Readable Output#
harfanglab-job-processlistStart a job to get the list of processes from a host (Windows / Linux)
#
Base Commandharfanglab-job-processlist
#
InputArgument Name | Description | Required |
---|---|---|
agent_id | Agent unique identifier as provided by the HarfangLab EDR Manager. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Job.ID | string | id |
Harfanglab.Job.Action | string | HarfangLab job action |
#
Command example!harfanglab-job-processlist agent_id="0fae71cf-ebde-4533-a50c-b3c0290378db"
#
Context Example#
Human Readable Output#
harfanglab-job-networkconnectionlistStart a job to get the list of network connections from a host (Windows / Linux)
#
Base Commandharfanglab-job-networkconnectionlist
#
InputArgument Name | Description | Required |
---|---|---|
agent_id | Agent unique identifier as provided by the HarfangLab EDR Manager. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Job.ID | string | id |
Harfanglab.Job.Action | string | HarfangLab job action |
#
Command example!harfanglab-job-networkconnectionlist agent_id="0fae71cf-ebde-4533-a50c-b3c0290378db"
#
Context Example#
Human Readable Output#
harfanglab-job-networksharelistStart a job to get the list of network shares from a host (Windows)
#
Base Commandharfanglab-job-networksharelist
#
InputArgument Name | Description | Required |
---|---|---|
agent_id | Agent unique identifier as provided by the HarfangLab EDR Manager. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Job.ID | string | id |
Harfanglab.Job.Action | string | HarfangLab job action |
#
Command example!harfanglab-job-networksharelist agent_id="0fae71cf-ebde-4533-a50c-b3c0290378db"
#
Context Example#
Human Readable Output#
harfanglab-job-sessionlistStart a job to get the list of sessions from a host (Windows)
#
Base Commandharfanglab-job-sessionlist
#
InputArgument Name | Description | Required |
---|---|---|
agent_id | Agent unique identifier as provided by the HarfangLab EDR Manager. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Job.ID | string | id |
Harfanglab.Job.Action | string | HarfangLab job action |
#
Command example!harfanglab-job-sessionlist agent_id="0fae71cf-ebde-4533-a50c-b3c0290378db"
#
Context Example#
Human Readable Output#
harfanglab-job-persistencelistStart a job to get the list of persistence items from a host (Linux)
#
Base Commandharfanglab-job-persistencelist
#
InputArgument Name | Description | Required |
---|---|---|
agent_id | Agent unique identifier as provided by the HarfangLab EDR Manager. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Job.ID | string | id |
Harfanglab.Job.Action | string | HarfangLab job action |
#
Command example!harfanglab-job-persistencelist agent_id="0fae71cf-ebde-4533-a50c-b3c0290378db"
#
Context Example#
Human Readable Output#
harfanglab-job-iocStart a job to search for IOCs on a host (Windows / Linux)
#
Base Commandharfanglab-job-ioc
#
InputArgument Name | Description | Required |
---|---|---|
agent_id | Agent unique identifier as provided by the HarfangLab EDR Manager. | Required |
filename | exact filename to search. | Optional |
filepath | exact filepath to search. | Optional |
hash | filehash to search (md5, sha1, sha256). | Optional |
search_in_path | restrict searchs for filename or filepath or filepath_regex to a given path. | Optional |
hash_filesize | size of the file associated to the 'hash' parameters (DEPRECATED, rather use the 'filesize' parameter). If known, it will speed up the search process. | Optional |
filesize | size of the file to search (can be used when searching a file from a hash or from a filename). If known, it will speed up the search process. | Optional |
registry | regex to search in registry (key or value). | Optional |
filepath_regex | search a regex on a filepath . | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Job.ID | string | id |
Harfanglab.Job.Action | string | HarfangLab job action |
#
Command example!harfanglab-job-ioc agent_id="0fae71cf-ebde-4533-a50c-b3c0290378db" filename="agent.ini"
#
Context Example#
Human Readable Output#
Command example!harfanglab-job-ioc agent_id="0fae71cf-ebde-4533-a50c-b3c0290378db" filename="agent.ini" search_in_path="C:\\Program Files"
#
Context Example#
Human Readable Output#
Command example!harfanglab-job-ioc agent_id="0fae71cf-ebde-4533-a50c-b3c0290378db" filename="agent.ini" filesize=1688
#
Context Example#
Human Readable Output#
Command example!harfanglab-job-ioc agent_id="0fae71cf-ebde-4533-a50c-b3c0290378db" filepath="C:\\windows\\system32\\calc.exe"
#
Context Example#
Human Readable Output#
Command example!harfanglab-job-ioc agent_id="0fae71cf-ebde-4533-a50c-b3c0290378db" filepath_regex="System32\\\\calc\\.exe"
#
Context Example#
Human Readable Output#
Command example!harfanglab-job-ioc agent_id="0fae71cf-ebde-4533-a50c-b3c0290378db" hash=4208893c871d2499f184e3f0f2554da89f451fa9e98d95fc9516c5ae8f2b3bbd filesize=45056
#
Context Example#
Human Readable Output#
Command example!harfanglab-job-ioc agent_id="0fae71cf-ebde-4533-a50c-b3c0290378db" registry="DLLPath"
#
Context Example#
Human Readable Output#
Command example!harfanglab-job-ioc agent_id="0fae71cf-ebde-4533-a50c-b3c0290378db" registry="hmmapi"
#
Context Example#
Human Readable Output#
harfanglab-job-startuplistStart a job to get the list of startup items from a host (Windows)
#
Base Commandharfanglab-job-startuplist
#
InputArgument Name | Description | Required |
---|---|---|
agent_id | Agent unique identifier as provided by the HarfangLab EDR Manager. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Job.ID | string | id |
Harfanglab.Job.Action | string | HarfangLab job action |
#
Command example!harfanglab-job-startuplist agent_id="0fae71cf-ebde-4533-a50c-b3c0290378db"
#
Context Example#
Human Readable Output#
harfanglab-job-wmilistStart a job to get the list of WMI items from a host (Windows)
#
Base Commandharfanglab-job-wmilist
#
InputArgument Name | Description | Required |
---|---|---|
agent_id | Agent unique identifier as provided by the HarfangLab EDR Manager. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Job.ID | string | id |
Harfanglab.Job.Action | string | HarfangLab job action |
#
Command example!harfanglab-job-wmilist agent_id="0fae71cf-ebde-4533-a50c-b3c0290378db"
#
Context Example#
Human Readable Output#
harfanglab-job-artifact-mftStart a job to download the MFT from a host (Windows)
#
Base Commandharfanglab-job-artifact-mft
#
InputArgument Name | Description | Required |
---|---|---|
agent_id | Agent unique identifier as provided by the HarfangLab EDR Manager. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Job.ID | string | id |
Harfanglab.Job.Action | string | HarfangLab job action |
#
Command example!harfanglab-job-artifact-mft agent_id="0fae71cf-ebde-4533-a50c-b3c0290378db"
#
Context Example#
Human Readable Output#
harfanglab-job-artifact-hivesStart a job to download the hives from a host (Windows)
#
Base Commandharfanglab-job-artifact-hives
#
InputArgument Name | Description | Required |
---|---|---|
agent_id | Agent unique identifier as provided by the HarfangLab EDR Manager. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Job.ID | string | id |
Harfanglab.Job.Action | string | HarfangLab job action |
#
Command example!harfanglab-job-artifact-hives agent_id="0fae71cf-ebde-4533-a50c-b3c0290378db"
#
Context Example#
Human Readable Output#
harfanglab-job-artifact-evtxStart a job to download the event logs from a host (Windows)
#
Base Commandharfanglab-job-artifact-evtx
#
InputArgument Name | Description | Required |
---|---|---|
agent_id | Agent unique identifier as provided by the HarfangLab EDR Manager. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Job.ID | string | id |
Harfanglab.Job.Action | string | HarfangLab job action |
#
Command example!harfanglab-job-artifact-evtx agent_id="0fae71cf-ebde-4533-a50c-b3c0290378db"
#
Context Example#
Human Readable Output#
harfanglab-job-artifact-logsStart a job to download Linux log files from a host (Linux)
#
Base Commandharfanglab-job-artifact-logs
#
InputArgument Name | Description | Required |
---|---|---|
agent_id | Agent unique identifier as provided by the HarfangLab EDR Manager. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Job.ID | string | id |
Harfanglab.Job.Action | string | HarfangLab job action |
#
Command example!harfanglab-job-artifact-logs agent_id="0fae71cf-ebde-4533-a50c-b3c0290378db"
#
Context Example#
Human Readable Output#
harfanglab-job-artifact-filesystemStart a job to download Linux filesystem entries from a host (Linux)
#
Base Commandharfanglab-job-artifact-filesystem
#
InputArgument Name | Description | Required |
---|---|---|
agent_id | Agent unique identifier as provided by the HarfangLab EDR Manager. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Job.ID | string | id |
Harfanglab.Job.Action | string | HarfangLab job action |
#
Command example!harfanglab-job-artifact-filesystem agent_id="0fae71cf-ebde-4533-a50c-b3c0290378db"
#
Context Example#
Human Readable Output#
harfanglab-job-artifact-allStart a job to download all artifacts from a host (Windows MFT, Hives, evt/evtx, Prefetch, USN, Linux logs and file list)
#
Base Commandharfanglab-job-artifact-all
#
InputArgument Name | Description | Required |
---|---|---|
agent_id | Agent unique identifier as provided by the HarfangLab EDR Manager. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Job.ID | string | id |
Harfanglab.Job.Action | string | HarfangLab job action |
#
Command example!harfanglab-job-artifact-all agent_id="0fae71cf-ebde-4533-a50c-b3c0290378db"
#
Context Example#
Human Readable Output#
harfanglab-job-artifact-ramdumpStart a job to get the entine RAM from a host (Windows / Linux)
#
Base Commandharfanglab-job-artifact-ramdump
#
InputArgument Name | Description | Required |
---|---|---|
agent_id | Agent unique identifier as provided by the HarfangLab EDR Manager. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Job.ID | string | id |
Harfanglab.Job.Action | string | HarfangLab job action |
#
Command example!harfanglab-job-artifact-ramdump agent_id="0fae71cf-ebde-4533-a50c-b3c0290378db"
#
Context Example#
Human Readable Output#
harfanglab-telemetry-networkSearch network connections
#
Base Commandharfanglab-telemetry-network
#
InputArgument Name | Description | Required |
---|---|---|
hostname | Endpoint hostname. | Optional |
from_date | Start date (format: YYYY-MM-DDTHH:MM:SS). | Optional |
to_date | End date (format: YYYY-MM-DDTHH:MM:SS). | Optional |
source_address | Source IP address. | Optional |
source_port | Source port. | Optional |
destination_address | Destination IP address. | Optional |
destination_port | Destination port. | Optional |
limit | Maximum number of elements to fetch. Default is 100. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Telemetrynetwork.network | unknown | Provides a list of network connections |
#
Command example!harfanglab-telemetry-network hostname="DC-01" limit=5
#
Context Example#
Human Readable Output#
Network list
create date hostname image name username source address source port destination addr destination port direction 2022-06-29T22:33:42.434000Z DC-01 C:\Windows\System32\svchost.exe NT AUTHORITY\SYSTEM (REDACTED) 50000 (REDACTED) 443 out 2022-06-29T22:24:08.088000Z DC-01 C:\Windows\System32\svchost.exe NT AUTHORITY\NETWORK SERVICE (REDACTED) 49998 (REDACTED) 80 out 2022-06-29T22:23:08.037000Z DC-01 C:\Windows\System32\svchost.exe NT AUTHORITY\SYSTEM (REDACTED) 49997 (REDACTED) 443 out 2022-06-29T22:08:07.550000Z DC-01 C:\Windows\System32\svchost.exe NT AUTHORITY\SYSTEM (REDACTED) 49996 (REDACTED) 443 out 2022-06-29T22:04:42.848000Z DC-01 C:\Windows\System32\svchost.exe NT AUTHORITY\NETWORK SERVICE (REDACTED) 49995 (REDACTED) 80 out
#
Command example!harfanglab-telemetry-network destination_address="(REDACTED)" limit=5
#
Context Example#
Human Readable Output#
Network list
create date hostname image name username source address source port destination addr destination port direction 2022-07-27T14:59:56.114000Z WORKSTATION-1879 C:\Windows\System32\svchost.exe NT AUTHORITY\NETWORK SERVICE (REDACTED) 62787 (REDACTED) 80 out 2022-07-27T14:58:43.590000Z WORKSTATION-3752 C:\Windows\System32\svchost.exe NT AUTHORITY\NETWORK SERVICE (REDACTED) 64593 (REDACTED) 80 out 2022-07-27T14:49:54.374000Z WORKSTATION-6852 C:\Windows\System32\svchost.exe NT AUTHORITY\NETWORK SERVICE (REDACTED) 61571 (REDACTED) 80 out 2022-07-27T14:49:14.813000Z WORKSTATION-4321 C:\Windows\System32\svchost.exe NT AUTHORITY\NETWORK SERVICE (REDACTED) 61605 (REDACTED) 80 out 2022-07-27T07:59:49.780000Z WORKSTATION-1879 C:\Windows\System32\svchost.exe NT AUTHORITY\NETWORK SERVICE (REDACTED) 62472 (REDACTED) 80 out
#
Command example!harfanglab-telemetry-network destination_address="(REDACTED)" from_date="2022-07-21T12:34:05" to_date="2022-07-21T12:34:15" limit=5
#
Context Example#
Human Readable Output#
Network list
create date hostname image name username source address source port destination addr destination port direction 2022-07-21T12:34:09.265000Z WORKSTATION-4812 C:\Windows\System32\svchost.exe NT AUTHORITY\NETWORK SERVICE (REDACTED) 50363 (REDACTED) 80 out
#
harfanglab-telemetry-eventlogSearch event logs
#
Base Commandharfanglab-telemetry-eventlog
#
InputArgument Name | Description | Required |
---|---|---|
hostname | Endpoint hostname. | Optional |
event_id | Event id. | Optional |
from_date | Start date (format: YYYY-MM-DDTHH:MM:SS). | Optional |
to_date | End date (format: YYYY-MM-DDTHH:MM:SS). | Optional |
limit | Maximum number of elements to fetch. Default is 100. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Telemetryeventlog.eventlog | unknown | Provides a list of event logs |
#
Command example!harfanglab-telemetry-eventlog hostname="DC-01" limit=5
#
Context Example#
Human Readable Output#
Event Log list
create date hostname event id source name log name keywords event data level 2022-07-28T07:29:29.327000Z DC-01 7036 Service Control Manager System Classic param1: Software Protection
param2: stopped
Binary: 7300700070007300760063002F0031000000Information 2022-07-28T07:29:29.311000Z DC-01 16384 Microsoft-Windows-Security-SPP Application Classic param1: 2022-11-12T06:42:29Z
param2: RulesEngineInformation 2022-07-28T07:28:58.905000Z DC-01 16394 Microsoft-Windows-Security-SPP Application Classic Information 2022-07-28T07:28:58.795000Z DC-01 7036 Service Control Manager System Classic param1: Software Protection
param2: running
Binary: 7300700070007300760063002F0034000000Information 2022-07-28T07:26:50.139000Z DC-01 7036 Service Control Manager System Classic param1: Windows Modules Installer
param2: stopped
Binary: 540072007500730074006500640049006E007300740061006C006C00650072002F0031000000Information
#
Command example!harfanglab-telemetry-eventlog hostname="DC-01" event_id=4624 limit=5
#
Context Example#
Human Readable Output#
Event Log list
create date hostname event id source name log name keywords event data level 2022-07-28T07:24:48.105000Z DC-01 4624 Microsoft-Windows-Security-Auditing Security Audit Success SubjectUserSid: S-1-5-18
SubjectUserName: DC-01$
SubjectDomainName: WORKGROUP
SubjectLogonId: 0x3e7
TargetUserSid: S-1-5-18
TargetUserName: SYSTEM
TargetDomainName: NT AUTHORITY
TargetLogonId: 0x3e7
LogonType: 5
LogonProcessName: Advapi
AuthenticationPackageName: Negotiate
WorkstationName: -
LogonGuid: {00000000-0000-0000-0000-000000000000}
TransmittedServices: -
LmPackageName: -
KeyLength: 0
ProcessId: 0x278
ProcessName: C:\Windows\System32\services.exe
IpAddress: -
IpPort: -
ImpersonationLevel: %%1833
RestrictedAdminMode: -
TargetOutboundUserName: -
TargetOutboundDomainName: -
VirtualAccount: %%1843
TargetLinkedLogonId: 0x0
ElevatedToken: %%1842Information 2022-07-28T06:34:06.425000Z DC-01 4624 Microsoft-Windows-Security-Auditing Security Audit Success SubjectUserSid: S-1-5-18
SubjectUserName: DC-01$
SubjectDomainName: WORKGROUP
SubjectLogonId: 0x3e7
TargetUserSid: S-1-5-18
TargetUserName: SYSTEM
TargetDomainName: NT AUTHORITY
TargetLogonId: 0x3e7
LogonType: 5
LogonProcessName: Advapi
AuthenticationPackageName: Negotiate
WorkstationName: -
LogonGuid: {00000000-0000-0000-0000-000000000000}
TransmittedServices: -
LmPackageName: -
KeyLength: 0
ProcessId: 0x278
ProcessName: C:\Windows\System32\services.exe
IpAddress: -
IpPort: -
ImpersonationLevel: %%1833
RestrictedAdminMode: -
TargetOutboundUserName: -
TargetOutboundDomainName: -
VirtualAccount: %%1843
TargetLinkedLogonId: 0x0
ElevatedToken: %%1842Information 2022-07-28T06:24:48.107000Z DC-01 4624 Microsoft-Windows-Security-Auditing Security Audit Success SubjectUserSid: S-1-5-18
SubjectUserName: DC-01$
SubjectDomainName: WORKGROUP
SubjectLogonId: 0x3e7
TargetUserSid: S-1-5-18
TargetUserName: SYSTEM
TargetDomainName: NT AUTHORITY
TargetLogonId: 0x3e7
LogonType: 5
LogonProcessName: Advapi
AuthenticationPackageName: Negotiate
WorkstationName: -
LogonGuid: {00000000-0000-0000-0000-000000000000}
TransmittedServices: -
LmPackageName: -
KeyLength: 0
ProcessId: 0x278
ProcessName: C:\Windows\System32\services.exe
IpAddress: -
IpPort: -
ImpersonationLevel: %%1833
RestrictedAdminMode: -
TargetOutboundUserName: -
TargetOutboundDomainName: -
VirtualAccount: %%1843
TargetLinkedLogonId: 0x0
ElevatedToken: %%1842Information 2022-07-28T05:24:47.496000Z DC-01 4624 Microsoft-Windows-Security-Auditing Security Audit Success SubjectUserSid: S-1-5-18
SubjectUserName: DC-01$
SubjectDomainName: WORKGROUP
SubjectLogonId: 0x3e7
TargetUserSid: S-1-5-18
TargetUserName: SYSTEM
TargetDomainName: NT AUTHORITY
TargetLogonId: 0x3e7
LogonType: 5
LogonProcessName: Advapi
AuthenticationPackageName: Negotiate
WorkstationName: -
LogonGuid: {00000000-0000-0000-0000-000000000000}
TransmittedServices: -
LmPackageName: -
KeyLength: 0
ProcessId: 0x278
ProcessName: C:\Windows\System32\services.exe
IpAddress: -
IpPort: -
ImpersonationLevel: %%1833
RestrictedAdminMode: -
TargetOutboundUserName: -
TargetOutboundDomainName: -
VirtualAccount: %%1843
TargetLinkedLogonId: 0x0
ElevatedToken: %%1842Information 2022-07-28T04:24:46.833000Z DC-01 4624 Microsoft-Windows-Security-Auditing Security Audit Success SubjectUserSid: S-1-5-18
SubjectUserName: DC-01$
SubjectDomainName: WORKGROUP
SubjectLogonId: 0x3e7
TargetUserSid: S-1-5-18
TargetUserName: SYSTEM
TargetDomainName: NT AUTHORITY
TargetLogonId: 0x3e7
LogonType: 5
LogonProcessName: Advapi
AuthenticationPackageName: Negotiate
WorkstationName: -
LogonGuid: {00000000-0000-0000-0000-000000000000}
TransmittedServices: -
LmPackageName: -
KeyLength: 0
ProcessId: 0x278
ProcessName: C:\Windows\System32\services.exe
IpAddress: -
IpPort: -
ImpersonationLevel: %%1833
RestrictedAdminMode: -
TargetOutboundUserName: -
TargetOutboundDomainName: -
VirtualAccount: %%1843
TargetLinkedLogonId: 0x0
ElevatedToken: %%1842Information
#
Command example!harfanglab-telemetry-eventlog event_id=4624 from_date="2022-07-21T21:25:34" to_date="2022-07-23T21:25:34" limit=5
#
Context Example#
Human Readable Output#
Event Log list
create date hostname event id source name log name keywords event data level 2022-07-23T21:25:18.159000Z WORKSTATION-1234 4624 Microsoft-Windows-Security-Auditing Security Audit Success SubjectUserSid: S-1-5-18
SubjectUserName: WORKSTATION-123$
SubjectDomainName: WORKGROUP
SubjectLogonId: 0x3e7
TargetUserSid: S-1-5-18
TargetUserName: SYSTEM
TargetDomainName: NT AUTHORITY
TargetLogonId: 0x3e7
LogonType: 5
LogonProcessName: Advapi
AuthenticationPackageName: Negotiate
WorkstationName: -
LogonGuid: {00000000-0000-0000-0000-000000000000}
TransmittedServices: -
LmPackageName: -
KeyLength: 0
ProcessId: 0x280
ProcessName: C:\Windows\System32\services.exe
IpAddress: -
IpPort: -
ImpersonationLevel: %%1833
RestrictedAdminMode: -
TargetOutboundUserName: -
TargetOutboundDomainName: -
VirtualAccount: %%1843
TargetLinkedLogonId: 0x0
ElevatedToken: %%1842Information 2022-07-23T21:25:10.765000Z WEBSERVER 4624 Microsoft-Windows-Security-Auditing Security Audit Success SubjectUserSid: S-1-5-18
SubjectUserName: WEBSERVER$
SubjectDomainName: WORKGROUP
SubjectLogonId: 0x3e7
TargetUserSid: S-1-5-18
TargetUserName: SYSTEM
TargetDomainName: NT AUTHORITY
TargetLogonId: 0x3e7
LogonType: 5
LogonProcessName: Advapi
AuthenticationPackageName: Negotiate
WorkstationName: -
LogonGuid: {00000000-0000-0000-0000-000000000000}
TransmittedServices: -
LmPackageName: -
KeyLength: 0
ProcessId: 0x27c
ProcessName: C:\Windows\System32\services.exe
IpAddress: -
IpPort: -
ImpersonationLevel: %%1833
RestrictedAdminMode: -
TargetOutboundUserName: -
TargetOutboundDomainName: -
VirtualAccount: %%1843
TargetLinkedLogonId: 0x0
ElevatedToken: %%1842Information 2022-07-23T21:23:53.410000Z DC-01 4624 Microsoft-Windows-Security-Auditing Security Audit Success SubjectUserSid: S-1-5-18
SubjectUserName: DC-01$
SubjectDomainName: WORKGROUP
SubjectLogonId: 0x3e7
TargetUserSid: S-1-5-18
TargetUserName: SYSTEM
TargetDomainName: NT AUTHORITY
TargetLogonId: 0x3e7
LogonType: 5
LogonProcessName: Advapi
AuthenticationPackageName: Negotiate
WorkstationName: -
LogonGuid: {00000000-0000-0000-0000-000000000000}
TransmittedServices: -
LmPackageName: -
KeyLength: 0
ProcessId: 0x278
ProcessName: C:\Windows\System32\services.exe
IpAddress: -
IpPort: -
ImpersonationLevel: %%1833
RestrictedAdminMode: -
TargetOutboundUserName: -
TargetOutboundDomainName: -
VirtualAccount: %%1843
TargetLinkedLogonId: 0x0
ElevatedToken: %%1842Information 2022-07-23T21:18:55.338000Z WORKSTATION-8501 4624 Microsoft-Windows-Security-Auditing Security Audit Success SubjectUserSid: S-1-5-18
SubjectUserName: WORKSTATION-850$
SubjectDomainName: WORKGROUP
SubjectLogonId: 0x3e7
TargetUserSid: S-1-5-18
TargetUserName: SYSTEM
TargetDomainName: NT AUTHORITY
TargetLogonId: 0x3e7
LogonType: 5
LogonProcessName: Advapi
AuthenticationPackageName: Negotiate
WorkstationName: -
LogonGuid: {00000000-0000-0000-0000-000000000000}
TransmittedServices: -
LmPackageName: -
KeyLength: 0
ProcessId: 0x27c
ProcessName: C:\Windows\System32\services.exe
IpAddress: -
IpPort: -
ImpersonationLevel: %%1833
RestrictedAdminMode: -
TargetOutboundUserName: -
TargetOutboundDomainName: -
VirtualAccount: %%1843
TargetLinkedLogonId: 0x0
ElevatedToken: %%1842Information 2022-07-23T21:18:53.324000Z WORKSTATION-8501 4624 Microsoft-Windows-Security-Auditing Security Audit Success SubjectUserSid: S-1-5-18
SubjectUserName: WORKSTATION-850$
SubjectDomainName: WORKGROUP
SubjectLogonId: 0x3e7
TargetUserSid: S-1-5-18
TargetUserName: SYSTEM
TargetDomainName: NT AUTHORITY
TargetLogonId: 0x3e7
LogonType: 5
LogonProcessName: Advapi
AuthenticationPackageName: Negotiate
WorkstationName: -
LogonGuid: {00000000-0000-0000-0000-000000000000}
TransmittedServices: -
LmPackageName: -
KeyLength: 0
ProcessId: 0x27c
ProcessName: C:\Windows\System32\services.exe
IpAddress: -
IpPort: -
ImpersonationLevel: %%1833
RestrictedAdminMode: -
TargetOutboundUserName: -
TargetOutboundDomainName: -
VirtualAccount: %%1843
TargetLinkedLogonId: 0x0
ElevatedToken: %%1842Information
#
harfanglab-telemetry-binarySearch for binaries
#
Base Commandharfanglab-telemetry-binary
#
InputArgument Name | Description | Required |
---|---|---|
from_date | Start date (format: YYYY-MM-DDTHH:MM:SS). | Optional |
to_date | End date (format: YYYY-MM-DDTHH:MM:SS). | Optional |
hash | filehash to search (md5, sha1, sha256). | Optional |
limit | Maximum number of elements to fetch. Default is 100. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Telemetrybinary.binary | unknown | Provides a list of binaries with associated download links. |
#
Command example!harfanglab-telemetry-binary hash=2577fb22e98a4585bedcccfe7fbb48a8b2e0b5ea4c41408247cba86e89ea2eb5
#
Context Example#
Human Readable Output#
Binary list
name path size sha256 download link hurukai /opt/hurukai/hurukai 5882824 2577fb22e98a4585bedcccfe7fbb48a8b2e0b5ea4c41408247cba86e89ea2eb5 https://my_edr_stack:8443/api/data/telemetry/Binary/download/2577fb22e98a4585bedcccfe7fbb48a8b2e0b5ea4c41408247cba86e89ea2eb5/?hl_expiring_key=0123456789abcdef
#
harfanglab-telemetry-dnsSearch DNS resolutions
#
Base Commandharfanglab-telemetry-dns
#
InputArgument Name | Description | Required |
---|---|---|
hostname | Endpoint hostname. | Optional |
requested_name | Requested domain name. | Optional |
query_type | DNS type (A, AAAA, TXT...). | Optional |
from_date | Start date (format: YYYY-MM-DDTHH:MM:SS). | Optional |
to_date | End date (format: YYYY-MM-DDTHH:MM:SS). | Optional |
limit | Maximum number of elements to fetch. Default is 100. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.TelemetryDNS.resolutions | unknown | Provides a list of DNS resolutions |
#
Command example!harfanglab-telemetry-dns requested_name=download.windowsupdate.com hostname=webserver
#
Context Example#
Human Readable Output#
harfanglab-telemetry-authentication-windowsSearch Windows authentication telemetry
#
Base Commandharfanglab-telemetry-authentication-windows
#
InputArgument Name | Description | Required |
---|---|---|
hostname | Endpoint hostname. | Optional |
source_address | Source IP address. | Optional |
success | Whether authentication succeeded or not. | Optional |
source_username | Source username. | Optional |
target_username | Target username. | Optional |
logon_title | Logon title. | Optional |
from_date | Start date (format: YYYY-MM-DDTHH:MM:SS). | Optional |
to_date | End date (format: YYYY-MM-DDTHH:MM:SS). | Optional |
limit | Maximum number of elements to fetch. Default is 100. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.TelemetryWindowsAuthentications.authentications | unknown | Provides a list of Windows authentications |
#
Command example!harfanglab-telemetry-authentication-windows limit=5 target_username=vagrant
#
Context Example#
Human Readable Output#
harfanglab-telemetry-authentication-linuxSearch Linux authentication telemetry
#
Base Commandharfanglab-telemetry-authentication-linux
#
InputArgument Name | Description | Required |
---|---|---|
hostname | Endpoint hostname. | Optional |
source_address | Source IP address. | Optional |
success | Whether authentication succeeded or not. | Optional |
source_username | Source username. | Optional |
target_username | Target username. | Optional |
from_date | Start date (format: YYYY-MM-DDTHH:MM:SS). | Optional |
to_date | End date (format: YYYY-MM-DDTHH:MM:SS). | Optional |
limit | Maximum number of elements to fetch. Default is 100. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.TelemetryLinuxAuthentications.authentications | unknown | Provides a list of Linux authentications |
#
harfanglab-telemetry-authentication-macosSearch Macos authentication telemetry
#
Base Commandharfanglab-telemetry-authentication-macos
#
InputArgument Name | Description | Required |
---|---|---|
hostname | Endpoint hostname. | Optional |
source_address | Source IP address. | Optional |
success | Whether authentication succeeded or not. | Optional |
source_username | Source username. | Optional |
target_username | Target username. | Optional |
from_date | Start date (format: YYYY-MM-DDTHH:MM:SS). | Optional |
to_date | End date (format: YYYY-MM-DDTHH:MM:SS). | Optional |
limit | Maximum number of elements to fetch. Default is 100. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.TelemetryMacosAuthentications.authentications | unknown | Provides a list of Macos authentications |
#
harfanglab-telemetry-authentication-usersGet the top N users who successfully authenticated on the host
#
Base Commandharfanglab-telemetry-authentication-users
#
InputArgument Name | Description | Required |
---|---|---|
hostname | Endpoint hostname. | Required |
from_date | Start date (format: YYYY-MM-DDTHH:MM:SS). | Optional |
to_date | End date (format: YYYY-MM-DDTHH:MM:SS). | Optional |
limit | Fetch only the top N users who successfully authenticated on the host. Default is 3. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Authentications.Users | unknown | Provides a list of users who successfully authenticated on the host with interactive logon (sorted per decreasing occurrence) |
#
Command example!harfanglab-telemetry-authentication-users hostname=CL-Ep2-Win11 limit=4
#
Context Example#
Human Readable Output#
Top None authentications
Username Authentication attempts CL-EP2-WIN11\hladmin 4 hladmin 2
#
harfanglab-telemetry-process-graphGet a process graph
#
Base Commandharfanglab-telemetry-process-graph
#
InputArgument Name | Description | Required |
---|---|---|
process_uuid | Process UUID. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.ProcessGraph | unknown | Process Graph |
#
Command example!harfanglab-telemetry-process-graph process_uuid=37d378de-b558-4597-e820-009fa44c4c03
#
Context Example#
Human Readable Output#
harfanglab-job-infoGet job status information
#
Base Commandharfanglab-job-info
#
InputArgument Name | Description | Required |
---|---|---|
ids | Coma-separated list of job ids. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Job.Info | unknown | Job Status |
#
Command example!harfanglab-job-info ids="ba28f05f-e3c8-4eec-ab6a-01d639c14f2e,70b2cd7b-8a57-4a6c-aa7e-e392676fa7ac"
#
Context Example#
Human Readable Output#
Jobs Info
ID Status Creation date ba28f05f-e3c8-4eec-ab6a-01d639c14f2e finished 2022-07-19 19:47:00 70b2cd7b-8a57-4a6c-aa7e-e392676fa7ac finished 2022-07-07 13:39:02
#
harfanglab-result-pipelistGet a hostname's list of pipes from job results
#
Base Commandharfanglab-result-pipelist
#
InputArgument Name | Description | Required |
---|---|---|
job_id | Job id as returned by the job submission commands. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Pipe.data | unknown | Provides a list of named pipes |
#
Command example!harfanglab-result-pipelist job_id="f6cba4b2-e4a1-41b7-bdc0-0dcb6815d3ad"
#
Context Example#
Human Readable Output#
Pipe List
name atsvc Ctx_WinStation_API_service epmapper eventlog hlab-1560-f60834ea319cb1cf InitShutdown lsass LSM_API_service ntsvcs PIPE_EVENTROOT\CIMV2SCM EVENT PROVIDER scerpc SessEnvPublicRpc spoolss srvsvc TermSrv_API_service trkwks VBoxTrayIPC-vagrant W32TIME_ALT Winsock2\CatalogChangeListener-1f8-0 Winsock2\CatalogChangeListener-278-0 Winsock2\CatalogChangeListener-284-0 Winsock2\CatalogChangeListener-2c4-0 Winsock2\CatalogChangeListener-2f0-0 Winsock2\CatalogChangeListener-35c-0 Winsock2\CatalogChangeListener-414-0 Winsock2\CatalogChangeListener-528-0 wkssvc
#
harfanglab-result-prefetchlistGet a hostname's list of prefetches from job results
#
Base Commandharfanglab-result-prefetchlist
#
InputArgument Name | Description | Required |
---|---|---|
job_id | Job id as returned by the job submission commands. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Prefetch.data | unknown | Provides a list of prefetch files |
#
Command example!harfanglab-result-prefetchlist job_id="16834054-574b-4dc4-8981-9e6bb93e4529"
#
Context Example#
Human Readable Output#
Prefetch ListNo entries.
#
harfanglab-result-runkeylistGet a hostname's list of run keys from job results
#
Base Commandharfanglab-result-runkeylist
#
InputArgument Name | Description | Required |
---|---|---|
job_id | Job id as returned by the job submission commands. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.RunKey.data | unknown | Provides a list of Run Keys |
#
Command example!harfanglab-result-runkeylist job_id="704cac37-57df-4b70-8227-4a770b724108"
#
Context Example#
Human Readable Output#
RunKey List
name fullpath signed md5 SecurityHealth C:\Windows\system32\SecurityHealthSystray.exe true 37eea8b4d205b2300e79a9e96f2f7a46 VBoxTray C:\Windows\system32\VBoxTray.exe true 3c21ed6871650bc8635729b9abbb6f21
#
harfanglab-result-scheduledtasklistGet a hostname's list of scheduled tasks from job results
#
Base Commandharfanglab-result-scheduledtasklist
#
InputArgument Name | Description | Required |
---|---|---|
job_id | Job id as returned by the job submission commands. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.ScheduledTask.data | unknown | Provides a list of scheduled tasks |
#
Command example!harfanglab-result-scheduledtasklist job_id="f22b531a-b078-44fc-8d23-d06725548934"
#
Context Example#
Human Readable Output#
Scheduled Task List
name fullpath signed md5 .NET Framework NGEN v4.0.30319 C:\Windows\System32\mscoree.dll true 7ddb05ec3be80b951478e594294c0361 .NET Framework NGEN v4.0.30319 64 C:\Windows\System32\mscoree.dll true 7ddb05ec3be80b951478e594294c0361 .NET Framework NGEN v4.0.30319 64 Critical C:\Windows\System32\mscoree.dll true 7ddb05ec3be80b951478e594294c0361 .NET Framework NGEN v4.0.30319 Critical C:\Windows\System32\mscoree.dll true 7ddb05ec3be80b951478e594294c0361 Account Cleanup C:\Windows\system32\rundll32.exe true f5b2d37bed0d2b15957736c23b9f547f AD RMS Rights Policy Template Management (Automated) C:\Windows\system32\msdrm.dll true a4bffcd7b94bd687b3084bc6c7483a2c AD RMS Rights Policy Template Management (Manual) C:\Windows\system32\msdrm.dll true a4bffcd7b94bd687b3084bc6c7483a2c AikCertEnrollTask C:\Windows\system32\ngctasks.dll true 41fe9b51f30b9ff1a8fe4d724d6c7940 AnalyzeSystem C:\Windows\System32\energytask.dll true 6b5151a0c751cbf6f01994ab1eb6cde8 appuriverifierdaily C:\Windows\system32\apphostregistrationverifier.exe true 54b1076b71917ed737760b4feba9eeae appuriverifierinstall C:\Windows\system32\apphostregistrationverifier.exe true 54b1076b71917ed737760b4feba9eeae Automatic-Device-Join C:\Windows\system32\dsregcmd.exe true f4c8c7def69c3fcaf375db9a7710fd35 Background Synchronization C:\Windows\System32\cscui.dll true 14eef80c58f9c7bffdbc5cb4867d5824 BfeOnServiceStartTypeChange C:\Windows\system32\rundll32.exe true f5b2d37bed0d2b15957736c23b9f547f BgTaskRegistrationMaintenanceTask false BitLocker Encrypt All Drives C:\Windows\System32\edptask.dll true 45ed986a4271a0f5d9a27161af5a76ee BitLocker MDM policy Refresh C:\Windows\System32\edptask.dll true 45ed986a4271a0f5d9a27161af5a76ee CacheTask C:\Windows\system32\wininet.dll true 7f361d95066553e70da7a5329a429254 Calibration Loader C:\Windows\System32\mscms.dll true 77f81e7a53a7192fefebd9db113709d5 CleanupOldPerfLogs C:\Windows\system32\cscript.exe true 60ddaf328f6469c00a3fa14aaafed361 CleanupTemporaryState C:\Windows\system32\rundll32.exe true f5b2d37bed0d2b15957736c23b9f547f Collection C:\Windows\system32\cmd.exe true e7a6b1f51efb405287a8048cfa4690f4 Configuration C:\Windows\system32\cmd.exe true e7a6b1f51efb405287a8048cfa4690f4 Consolidator C:\Windows\system32\wsqmcons.exe true 0d229f8045fb12b584143ac82cbd1dcd CreateObjectTask C:\Windows\system32\shell32.dll true 49cf1d96abbacab759a043253677219f CreateObjectTask C:\Windows\System32\CloudExperienceHostBroker.exe true 8b4432582d6c68e5296e7f8cc8a3b8bc CryptoPolicyTask C:\Windows\system32\ngctasks.dll true 41fe9b51f30b9ff1a8fe4d724d6c7940 Data Integrity Check And Scan C:\Windows\System32\discan.dll true db01ce5db38cdc5f30537c129afc577c Data Integrity Scan C:\Windows\System32\discan.dll true db01ce5db38cdc5f30537c129afc577c Data Integrity Scan for Crash Recovery C:\Windows\System32\discan.dll true db01ce5db38cdc5f30537c129afc577c Device C:\Windows\system32\devicecensus.exe true 2a33b4af5c4a152eed1c53bd39e99534 Device Install Group Policy C:\Windows\System32\pnppolicy.dll true c9b1ab4b3f3f77e6513ce26b50215bc4 Device Install Reboot Required C:\Windows\System32\pnpui.dll true 303788cfdf6ca3f929badd3be92ed879 Device User C:\Windows\system32\devicecensus.exe true 2a33b4af5c4a152eed1c53bd39e99534 Device-Sync C:\Windows\System32\dsregtask.dll true f64089d434bb3fb387f51d7525c56ea4 Diagnostics C:\Windows\system32\disksnapshot.exe true 5536352f520d36eb7079647214ac9fa0 DirectXDatabaseUpdater C:\Windows\system32\directxdatabaseupdater.exe true 26e02368365619d57d7a32cc37de35e1 DsSvcCleanup C:\Windows\system32\dstokenclean.exe true 8c9493c2c59e6a7f667ea3355620ce48 DXGIAdapterCache C:\Windows\system32\dxgiadaptercache.exe true fbcff8772630726ef5f00f26a3bcb437 EDP App Launch Task C:\Windows\System32\edptask.dll true 45ed986a4271a0f5d9a27161af5a76ee EDP Auth Task C:\Windows\System32\edptask.dll true 45ed986a4271a0f5d9a27161af5a76ee EDP Inaccessible Credentials Task C:\Windows\System32\edptask.dll true 45ed986a4271a0f5d9a27161af5a76ee EDP Policy Manager C:\Windows\System32\AppLockerCsp.dll true 20b0cc726f9d3fcf3b659f6a132e1e00 ExploitGuard MDM policy Refresh C:\Windows\System32\MitigationConfiguration.dll true 0a9e147ff4d7f8212f0de006c52d865b ForceSynchronizeTime C:\Windows\system32\TimeSyncTask.dll true c42636381538cbf55ac6ad954519f1f0 GatherNetworkInfo C:\Windows\system32\gathernetworkinfo.vbs true da4d4261a43de7e851a9378ed0668eb9 HiveUploadTask false IndexerAutomaticMaintenance C:\Windows\System32\srchadmin.dll true 945162746b51b6082425edac70cd3774 Installation C:\Windows\System32\LanguageComponentsInstaller.dll true 742c212ba7f256577168aeee2b00fb7c Interactive C:\Windows\system32\wdc.dll true 7939c5b180bd8153f670f8231a401c75 KeyPreGenTask C:\Windows\system32\ngctasks.dll true 41fe9b51f30b9ff1a8fe4d724d6c7940 License Validation C:\Windows\system32\clipup.exe true 2220d1075b5e7e90ba4f4f8a0e701e45 LocalUserSyncDataAvailable C:\Windows\System32\InputCloudStore.dll true 13208dbfbbcfbad9cd0e6ab59f72bdec LoginCheck C:\Windows\system32\sc.exe true 6fb10cd439b40d92935f8f6a0c99670a Logon Synchronization C:\Windows\System32\cscui.dll true 14eef80c58f9c7bffdbc5cb4867d5824 LPRemove C:\Windows\system32\lpremove.exe true 2140dccdd4dab65241c309df02ce09a2 MaintenanceTasks C:\Windows\system32\rundll32.exe true f5b2d37bed0d2b15957736c23b9f547f MapsToastTask C:\Windows\System32\mapstoasttask.dll true 24c2e7e8b529023ee167dd68164cced7 MapsUpdateTask C:\Windows\System32\mapsupdatetask.dll true 984960ba9e02bb161f0315f37eb9bde2 Metadata Refresh C:\Windows\System32\DeviceSetupManagerAPI.dll true bb7755132e04b89f006522fa69ed8f38 Microsoft Compatibility Appraiser C:\Windows\system32\compattelrunner.exe true 003339d6b38472f62b5da9c5d31f24ea Microsoft-Windows-DiskDiagnosticDataCollector C:\Windows\system32\rundll32.exe true f5b2d37bed0d2b15957736c23b9f547f Microsoft-Windows-DiskDiagnosticResolver C:\Windows\system32\dfdwiz.exe true be2d2340e25e4a5700381c8097af152b MicrosoftEdgeUpdateTaskMachineCore1d867a83717e5b7 c:\program files (x86)\microsoft\edgeupdate\microsoftedgeupdate.exe true 8661fbb97161096be503cd295aa46409 MicrosoftEdgeUpdateTaskMachineUA c:\program files (x86)\microsoft\edgeupdate\microsoftedgeupdate.exe true 8661fbb97161096be503cd295aa46409 MobilityManager C:\Windows\system32\rasmbmgr.dll true c657bc27aae838fc3a295d51ac20a953 MouseSyncDataAvailable C:\Windows\System32\InputCloudStore.dll true 13208dbfbbcfbad9cd0e6ab59f72bdec MsCtfMonitor C:\Windows\system32\MsCtfMonitor.dll true f545384f0b0ca857197904a6092b3f16 Notifications C:\Windows\system32\locationnotificationwindows.exe true a259819d5f8de86ff28546f4ded16f35 OobeDiscovery C:\Windows\System32\MBMediaManager.dll true c1ce23565a9cadef865aedd6c041a2c4 PcaPatchDbTask C:\Windows\system32\rundll32.exe true f5b2d37bed0d2b15957736c23b9f547f PenSyncDataAvailable C:\Windows\System32\InputCloudStore.dll true 13208dbfbbcfbad9cd0e6ab59f72bdec PerformRemediation false PolicyConverter C:\Windows\system32\appidpolicyconverter.exe true 69a6bef4903650d20c12cbeff41367b0 Pre-staged app cleanup C:\Windows\system32\rundll32.exe true f5b2d37bed0d2b15957736c23b9f547f ProactiveScan C:\Windows\System32\pstask.dll true 796fb59bbf6e037b8a0c7646e6ea7a9e ProcessMemoryDiagnosticEvents C:\Windows\System32\MemoryDiagnostic.dll true 8354fde902ba277b46c92175466438ef ProgramDataUpdater C:\Windows\system32\compattelrunner.exe true 003339d6b38472f62b5da9c5d31f24ea Property Definition Sync C:\Windows\System32\srmclient.dll true b2037c5822de4fc8107d952b55d7f107 Proxy C:\Windows\system32\rundll32.exe true f5b2d37bed0d2b15957736c23b9f547f QueueReporting C:\Windows\system32\wermgr.exe true ada54642a633e778222008de627b5db5 ReconcileFeatures C:\Windows\System32\fcon.dll true 3f6291e0a27897796b7f91d6402578e3 Recovery-Check C:\Windows\system32\dsregcmd.exe true f4c8c7def69c3fcaf375db9a7710fd35 RefreshCache C:\Windows\System32\wosc.dll true feed4b9d117a6a512d93ca4e2c060419 RegIdleBackup C:\Windows\System32\regidle.dll true f4608228b68515fe0ea440e1865f77c6 Registration C:\Windows\system32\sc.exe true 6fb10cd439b40d92935f8f6a0c99670a Report policies C:\Windows\system32\usoclient.exe true e4fd0a267e8d740f62e3ddf99917cbcc ResolutionHost C:\Windows\System32\wdi.dll true 90bec7af03968f67bca4a1da50b042db RunFullMemoryDiagnostic C:\Windows\System32\MemoryDiagnostic.dll true 8354fde902ba277b46c92175466438ef ScanForUpdates C:\Windows\System32\InstallServiceTasks.dll true 855ebaa8373521bd3d39f282d36a2ba3 ScanForUpdatesAsUser C:\Windows\System32\InstallServiceTasks.dll true 855ebaa8373521bd3d39f282d36a2ba3 Schedule Maintenance Work C:\Windows\system32\usoclient.exe true e4fd0a267e8d740f62e3ddf99917cbcc Schedule Scan C:\Windows\system32\usoclient.exe true e4fd0a267e8d740f62e3ddf99917cbcc Schedule Scan Static Task C:\Windows\system32\usoclient.exe true e4fd0a267e8d740f62e3ddf99917cbcc Schedule Wake To Work C:\Windows\system32\usoclient.exe true e4fd0a267e8d740f62e3ddf99917cbcc Schedule Work C:\Windows\system32\usoclient.exe true e4fd0a267e8d740f62e3ddf99917cbcc Scheduled C:\Windows\System32\sdiagschd.dll true c7ceb5a1f22da23b718712cb252df58a Scheduled Start c:\windows\system32\sc.exe true 6fb10cd439b40d92935f8f6a0c99670a ScheduledDefrag C:\Windows\system32\defrag.exe true 2e190d98b46b93e62f68841216addd31 SDN Diagnostics Task C:\Windows\system32\sdndiagnosticstask.exe true f56edf564602897934978c3a27ffa65b Secure-Boot-Update C:\Windows\system32\TpmTasks.dll true e10d2a03386c5056b0453f37b5ed5a66 Server Initial Configuration Task C:\Windows\system32\srvinitconfig.exe true 4273af0631f9c5d86bef8fb1687320b0 Server Manager Performance Monitor C:\Windows\system32\rundll32.exe true f5b2d37bed0d2b15957736c23b9f547f ServerManager C:\Windows\system32\servermanagerlauncher.exe true 548f7e09b5824e7c66a5e3174f8abe38 SetupCleanupTask C:\Windows\system32\oobe\SetupCleanupTask.dll true 6f06af96d37e95e4361943ad96152db4 SilentCleanup C:\Windows\system32\cleanmgr.exe true 1a52c127fd0638bc2724765969c60b18 SmartRetry C:\Windows\System32\InstallServiceTasks.dll true 855ebaa8373521bd3d39f282d36a2ba3 SpaceAgentTask C:\Windows\system32\spaceagent.exe true 0468be9a2369f777c26944e5a55aa357 SpaceManagerTask C:\Windows\system32\spaceman.exe true fede04bb5054ee911cd363c2c5e9eae4 SpeechModelDownloadTask C:\Windows\system32\speech_onecore\common\speechmodeldownload.exe true 0198cb2290a8ba095c79494c70fdd24d Sqm-Tasks C:\Windows\system32\TpmTasks.dll true e10d2a03386c5056b0453f37b5ed5a66 StartComponentCleanup false StartupAppTask C:\Windows\system32\rundll32.exe true f5b2d37bed0d2b15957736c23b9f547f Storage Tiers Management Initialization C:\Windows\System32\TieringEngineService.exe true a86dc1b6dc847669ef04a290fe53dd00 Storage Tiers Optimization C:\Windows\system32\defrag.exe true 2e190d98b46b93e62f68841216addd31 StorageCardEncryption Task C:\Windows\System32\edptask.dll true 45ed986a4271a0f5d9a27161af5a76ee StorageSense C:\Windows\system32\StorageUsage.dll true 03cc10ff04282f400550980f7db446e3 SvcRestartTask C:\Windows\System32\sppcext.dll true 9caaf31c430fb739eb183b8465e57527 SvcRestartTaskLogon C:\Windows\System32\sppcext.dll true 9caaf31c430fb739eb183b8465e57527 SvcRestartTaskNetwork C:\Windows\System32\sppcext.dll true 9caaf31c430fb739eb183b8465e57527 Synchronize Language Settings C:\Windows\System32\CoreGlobConfig.dll true 12d3ccc0bb2e767fbfb939d9f67f292a SynchronizeTime C:\Windows\system32\sc.exe true 6fb10cd439b40d92935f8f6a0c99670a SynchronizeTimeZone C:\Windows\system32\tzsync.exe true 5f35acc7c00591d50552ef7bbf02c99a SyspartRepair C:\Windows\system32\bcdboot.exe true 5db087d20a396ca780e453a6aefcbac4 Sysprep Generalize Drivers C:\Windows\system32\drvinst.exe true 99d71c1a835ade7bbe8914e1c99abc62 SystemSoundsService C:\Windows\System32\PlaySndSrv.dll true 9e29f169c3709059eec0927218fc012e SystemTask C:\Windows\system32\dimsjob.dll true 051ec97c93e31707f84f334af2b130d7 TempSignedLicenseExchange C:\Windows\System32\TempSignedLicenseExchangeTask.dll true 4ec2e7dd80dc186e27d8ff7c75f39d22 TouchpadSyncDataAvailable C:\Windows\System32\InputCloudStore.dll true 13208dbfbbcfbad9cd0e6ab59f72bdec Tpm-HASCertRetr C:\Windows\system32\TpmTasks.dll true e10d2a03386c5056b0453f37b5ed5a66 Tpm-Maintenance C:\Windows\system32\TpmTasks.dll true e10d2a03386c5056b0453f37b5ed5a66 Uninstallation C:\Windows\System32\LanguageComponentsInstaller.dll true 742c212ba7f256577168aeee2b00fb7c UninstallDeviceTask C:\Windows\SYSTEM32\bthudtask.exe true 8b5a37ab9140906cd4d0eba1af316fd5 UpdateLibrary C:\Program Files\windows media player\wmpnscfg.exe true ec604a0d8a27976ab136a489d9b6aa76 UpdateUserPictureTask C:\Windows\System32\Windows.UI.Immersive.dll true 9317b7ddf5e59f1baf3f5b8c4024e39d UPnPHostConfig C:\Windows\SYSTEM32\sc.exe true 6fb10cd439b40d92935f8f6a0c99670a UsageDataFlushing C:\Windows\System32\fcon.dll true 3f6291e0a27897796b7f91d6402578e3 UsageDataReporting C:\Windows\System32\fcon.dll true 3f6291e0a27897796b7f91d6402578e3 UsbCeip C:\Windows\System32\usbceip.dll true 8a4a3dfe0a2ef540717ce4812934691a UserTask C:\Windows\system32\dimsjob.dll true 051ec97c93e31707f84f334af2b130d7 UserTask-Roam C:\Windows\system32\dimsjob.dll true 051ec97c93e31707f84f334af2b130d7 USO_UxBroker C:\Windows\system32\musnotification.exe true 409ec93d1e08911f7e4ac299adc3d9b4 UUS Failover Task false VerifiedPublisherCertStoreCheck C:\Windows\system32\appidcertstorecheck.exe true 1af4f5e1fb76259d44d5f205e983ab38 VerifyWinRE C:\Windows\System32\ReAgentTask.dll true 235c3d1680f80ed563d02bc5a1f79844 WakeUpAndContinueUpdates C:\Windows\System32\InstallServiceTasks.dll true 855ebaa8373521bd3d39f282d36a2ba3 WakeUpAndScanForUpdates C:\Windows\System32\InstallServiceTasks.dll true 855ebaa8373521bd3d39f282d36a2ba3 Windows Defender Cache Maintenance c:\programdata\microsoft\windows defender\platform\4.18.2205.7-0\mpcmdrun.exe true d79162b9fb1e6f6916d21af592f15d8c Windows Defender Cleanup c:\programdata\microsoft\windows defender\platform\4.18.2205.7-0\mpcmdrun.exe true d79162b9fb1e6f6916d21af592f15d8c Windows Defender Scheduled Scan c:\programdata\microsoft\windows defender\platform\4.18.2205.7-0\mpcmdrun.exe true d79162b9fb1e6f6916d21af592f15d8c Windows Defender Verification c:\programdata\microsoft\windows defender\platform\4.18.2205.7-0\mpcmdrun.exe true d79162b9fb1e6f6916d21af592f15d8c WindowsActionDialog C:\Windows\system32\windowsactiondialog.exe true 9187a7c2fc4ad2a8ea9962885b79ecee WinSAT C:\Windows\system32\WinSATAPI.dll true d07b133ea6ab62ddb0b095fd3c621c0f
#
harfanglab-result-driverlistGet a hostname's loaded drivers from job results
#
Base Commandharfanglab-result-driverlist
#
InputArgument Name | Description | Required |
---|---|---|
job_id | Job id as returned by the job submission commands. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Driver.data | unknown | Provides a list of loaded drivers |
#
Command example!harfanglab-result-driverlist job_id="d93fdb8c-2877-4625-a6a4-7d8642f7a02b"
#
Context Example#
Human Readable Output#
Driver List
fullpath signed md5 C:\Windows\system32\ntoskrnl.exe true 10936de9161009cdf20e17450dcfff58 C:\Windows\system32\kd.dll true f5b674dcfe06dfa32e5fb9517694bd77 C:\Windows\system32\bootvid.dll true daff4f9258fbcc0d4abfb9a371f88394 C:\Windows\system32\mcupdate_genuineintel.dll true 16835b10a6ed1e1765cb98e7f1bffcf5 C:\Windows\system32\pshed.dll true cc711005573cbc5609fe47601ea154c1 C:\Windows\system32\drivers\clfs.sys true e1276c5405944c290a27c9c5544e8318 C:\Windows\system32\hal.dll true 62cfc8986445a2b985ec45c804f592ab C:\Windows\system32\drivers\tm.sys true 37ea0b86cdad032f9f8a08ae11b22e1c C:\Windows\system32\drivers\fltmgr.sys true a5da65b212ef41444f5c663bd0bc733e C:\Windows\system32\drivers\cmimcext.sys true 1aca7b86dbe10d1394ae5988ec47980d C:\Windows\system32\drivers\clipsp.sys true f65ed58b117b336f4d9b3ce34f19e1bd C:\Windows\system32\drivers\werkernel.sys true 3e21a039ebcce4e00fbbdd36580101ca C:\Windows\system32\drivers\msrpc.sys true 20cbe52b050fa5438428158323e4b0c2 C:\Windows\system32\drivers\ksecdd.sys true 9dacc16c05894f8db0b93fb60fcc2341 C:\Windows\system32\drivers\ntosext.sys true 6a9dabe311bcd5604eb0797d27d4e172 C:\Windows\system32\drivers\cng.sys true 395e313507ca049e185ea3f6356fefdb C:\Windows\system32\drivers\wdf01000.sys true 252710b80261fc7a470765da230f4582 C:\Windows\system32\ci.dll true c8e44390ab50e3468999dade07dbbda5 C:\Windows\system32\driverstore\filerepository\prm.inf_amd64_5a6e1bc540be827c\prm.sys true 12b48cb3274927c57bf770dea9476011 C:\Windows\system32\drivers\acpiex.sys true 0c2a19fce98cd5279174f70ecde10173 C:\Windows\system32\drivers\wpprecorder.sys true 47daa15532c855eeb6adb76949b920b8 C:\Windows\system32\drivers\acpi.sys true 128242662d8f677e8d243dffe4c30acf C:\Windows\system32\drivers\wdfldr.sys true ca1fcc04b07ee6d8e77c67d1cc875db4 C:\Windows\system32\drivers\mssecflt.sys true e4c24f3d6d7968a7f98df30644fbf4c5 C:\Windows\system32\drivers\sgrmagent.sys true e81fdb11bb9dc3b743d07402ab0d6850 C:\Windows\system32\drivers\windowstrustedrtproxy.sys true 0b728612a0aec70533a641fbec23d01a C:\Windows\system32\drivers\ndis.sys true 020222b426ce45d4081826902f1496d2 C:\Windows\system32\drivers\intelpep.sys true 4217aa0ec9a2fa258de03b098d83bc71 C:\Windows\system32\drivers\windowstrustedrt.sys true 74240ace203c61bd4f4b6081654884c0 C:\Windows\system32\drivers\intelpmt.sys true 698ad8b52eaaaeeb7a5cad5c28db5af5 C:\Windows\system32\drivers\wmilib.sys true 4a6b76cd34c968938c97a2e344d024a7 C:\Windows\system32\drivers\pcw.sys true 5f0c91ebcc8fd380306628283d0ad28d C:\Windows\system32\drivers\netio.sys true 989cbf82a9e67583104ab6ede987d531 C:\Windows\system32\drivers\msisadrv.sys true af9787af0870c3349336c641a9deb816 C:\Windows\system32\drivers\vdrvroot.sys true 504a71b5d24a6975a1d771c44ccf86fd C:\Windows\system32\drivers\cea.sys true 69a9e9d542f71928a2cd4b504779c3ec C:\Windows\system32\drivers\partmgr.sys true f68d2066b9f1a4fdb95613770c55c338 C:\Windows\system32\drivers\spaceport.sys true 7d38fe01b3309a01119b19b1a807673b C:\Windows\system32\drivers\pci.sys true 62e81f2f53126ec6e5149667de967897 C:\Windows\system32\drivers\pdc.sys true 5b34708a130a4aba61fabb66d3153aad C:\Windows\system32\drivers\mountmgr.sys true 531d3c5a7749a2c912ea6a0e5cb67c75 C:\Windows\system32\drivers\ataport.sys true 17fa3eb00ff97f25819f8f8e1c6085ab C:\Windows\system32\drivers\volmgr.sys true 0bc9e7b4865ed2227cccc05f1dbc6f52 C:\Windows\system32\drivers\pciidex.sys true bdca300aebaa8acf7d1d44d59d2afd6d C:\Windows\system32\drivers\storahci.sys true ed739b05ba3210ea45b0ad74e4df167b C:\Windows\system32\drivers\volmgrx.sys true f7da6b4c3238121c132213e30b7651b2 C:\Windows\system32\drivers\intelide.sys true 32f91cbd0b66b168082c0472e22c8c89 C:\Windows\system32\drivers\atapi.sys true 6db20deaa154aee9122d8aee5541f5c7 C:\Windows\system32\drivers\storport.sys true 284bffa1e8be61a158c6a5fd674f3515 C:\Windows\system32\drivers\ehstorclass.sys true 5a27edc058ead20f9b71c440a6f5c764 C:\Windows\system32\drivers\wd\wdfilter.sys true 98e9a26bbd42e644bf797710f9f65dce C:\Windows\system32\drivers\wof.sys true 06ea9914a709a459075122981df85d37 C:\Windows\system32\drivers\ntfs.sys true dd4cee5428499ccd02013ce6a591b600 C:\Windows\system32\drivers\ksecpkg.sys true ad9063eeb2a5179acd11bb1754023c30 C:\Windows\system32\drivers\vboxguest.sys true 873c8107cc6f4a8339b66eeb9fa2d2e1 C:\Windows\system32\drivers\fs_rec.sys true b778af9c823c027d4e3f2de30eeccc60 C:\Windows\system32\drivers\tcpip.sys true 8a13f21e7fb8f78a3d01bb952f691242 C:\Windows\system32\drivers\fwpkclnt.sys true 2edef18a931f8346a504ae1383473cf1 C:\Windows\system32\drivers\wfplwfs.sys true 2aad68e852436e0a7363377c91e0302d C:\Windows\system32\drivers\cdrom.sys true f8598f378ec752af85fa3f642a870906 C:\Windows\system32\drivers\classpnp.sys true 1314a382832de7861a0f7dfaad4f88be C:\Windows\system32\drivers\disk.sys true ba90cfc0d444bb5468fd050073ea5386 C:\Windows\system32\drivers\volume.sys true 05fac0dd1370c68530f0a72caf64a27b C:\Windows\system32\drivers\volsnap.sys true 8e0d28114d41d67b95c71d5cd17e86c0 C:\Windows\system32\drivers\crashdmp.sys true 75c7c14ea63bc131708c08d3569054ee C:\Windows\system32\drivers\mup.sys true 265830023853939fcbf87ba954f3146a C:\Windows\system32\drivers\watchdog.sys true 1d763e1c86f2f275af87c426164460a9 C:\Windows\system32\drivers\filecrypt.sys true 087265c07e4364fd44d213b7b3fd57b3 C:\Windows\system32\drivers\null.sys true 85ab11a2f4fb94b9fb6a2d889d83fcac C:\Windows\system32\drivers\dxgkrnl.sys true 2e247733503fa28483e871dba19519b9 C:\Windows\system32\drivers\tbs.sys true 4bba2bddbd2a8982d195e12d6ea9e246 C:\Windows\system32\driverstore\filerepository\basicdisplay.inf_amd64_7e9cb61920ccc040\basicdisplay.sys true 9e94d724c1dc4cca719be07eb1020dee C:\Windows\system32\drivers\msfs.sys true 82560bdaf351cd8917f01b5d7a1c03a4 C:\Windows\system32\drivers\tdi.sys true 49999ea1cdb93b73daea66e5a173d065 C:\Windows\system32\driverstore\filerepository\basicrender.inf_amd64_1c03174c7c755975\basicrender.sys true 5e1ea96e7fd6ac5d1ba7c56e4b33e100 C:\Windows\system32\drivers\npfs.sys true 3f4f4c10e7b81bc4b2d5c4c7e2c268a0 C:\Windows\system32\drivers\afd.sys true d5e687f3cb3f33b2554037332c7ffd26 C:\Windows\system32\drivers\cimfs.sys true c77761c2f092d133329ffa7e5756c216 C:\Windows\system32\drivers\tdx.sys true 7fd3d3e74c586e48b1fe6a26d9041a5a C:\Windows\system32\drivers\netbt.sys true 3937adb725a18a0dac7ae7c1e0efd2e4 C:\Windows\system32\drivers\afunix.sys true 6904a360dcc3b90a798cde109f25ebb4 C:\Windows\system32\drivers\ndiscap.sys true 5c5dab38e24c46cc9e2ac793541780ed C:\Windows\system32\drivers\npsvctrig.sys true e6d73640ffe28611bebcf1af11ef18dc C:\Windows\system32\drivers\pacer.sys true 39b1cf32f9c62caa14516259823d0291 C:\Windows\system32\drivers\vboxsf.sys true 9c5fa56ec9fa228e31484df1e41364d3 C:\Windows\system32\drivers\mssmbios.sys true 530d7c0b3e2fc916fb0da8fc8d4b6ef6 C:\Windows\system32\drivers\netbios.sys true 9085e8233201b963ce447dc645670670 C:\Windows\system32\drivers\rdbss.sys true 2e7eb447308f9c60e98a0c0c99ba4c78 C:\Windows\system32\drivers\nsiproxy.sys true 3a66f37dde3f8338cbd639b0106e38ca C:\Windows\system32\drivers\bam.sys true 41f732bba9521ceb0c834d2b3fbb5090 C:\Windows\system32\drivers\i8042prt.sys true 8bc4c8d32cea74b3c27a77330ba1ff28 C:\Windows\system32\drivers\dfsc.sys true 7317e6235f0f1b1e6fa5a6d2cf9ba724 C:\Windows\system32\drivers\fastfat.sys true f145863ca528a8975a72b8cdf3ec20e8 C:\Windows\system32\drivers\ahcache.sys true bfb562fd6102dc1729425c4c3cd450e5 C:\Windows\system32\driverstore\filerepository\compositebus.inf_amd64_130dea07a2ae55eb\compositebus.sys true 564ac50963890f9b3ab0052c249dbc21 C:\Windows\system32\drivers\kdnic.sys true d8ac3b58add59eeb8674787347795806 C:\Windows\system32\drivers\kbdclass.sys true 27947916ad55bfdb88c6f2e00ac4d90b C:\Windows\system32\drivers\vboxmouse.sys true 0b922b41369b9779a4e71d68efc02275 C:\Windows\system32\driverstore\filerepository\umbus.inf_amd64_f529037a77b144c5\umbus.sys true 65aa6b0661c1eedbe80667b39bebc784 C:\Windows\system32\drivers\mouclass.sys true 0c34c0630a233c0f62fcdd4d13af0d47 C:\Windows\system32\drivers\cmbatt.sys true bff879e5bb87092532be8229528c2100 C:\Windows\system32\drivers\ndisvirtualbus.sys true a686524719ece3235adae3e30214a2db C:\Windows\system32\drivers\battc.sys true 503867acfd527cf7a315bdcb6f1062c5 C:\Windows\system32\drivers\vboxwddm.sys true 66ed4d8224cfe448ba9dad324b564f35 C:\Windows\system32\drivers\e1g6032e.sys true cced99682127e8582e5f716ece775ef8 C:\Windows\system32\drivers\intelppm.sys true 786f77d638ff941977956898ebcb758e false C:\Windows\system32\driverstore\filerepository\swenum.inf_amd64_a8eddc34aa14df5f\swenum.sys true 0d8210a54c87102db6f0406b1c265a9c C:\Windows\system32\drivers\ks.sys true 7114a4394561a321bcd145be2e3737d5 false C:\Windows\system32\win32kfull.sys true 40de0513a189152f1c21a63d657e2804 C:\Windows\system32\win32kbase.sys true a6869afa4c477af83f232c32a5daa9e7 C:\Windows\system32\win32k.sys true 436e4df36ac1549d2eb3f8eac53df074 C:\Windows\system32\drivers\rdpbus.sys true d1edd6604ed1a6e2bc45134c307d3e82 C:\Windows\system32\drivers\hidparse.sys true d9a8063a2c30bd2f4815d973d9711d22 C:\Windows\system32\drivers\monitor.sys true b8f452f5baa586406a190c647c1443e4 C:\Windows\system32\drivers\wcifs.sys true f6eac3ea92f216a48495ea0fe645dcbf C:\Windows\system32\drivers\storqosflt.sys true 966997d2b3ebe8ea30ec42101dbe5768 C:\Windows\system32\drivers\dxgmms2.sys true 98ce225ae17a6d67ae1e5d2869fdf7f7 C:\Windows\system32\cdd.dll true 1c12e169adb6dc8b3cedc0a09bd1188f C:\Windows\system32\drivers\cldflt.sys true ce5e59e0b763ec8495c9a623519d55ee C:\Windows\system32\drivers\rdpvideominiport.sys true 26fa006e8dc780d58158f58cf11fe3a3 C:\Windows\system32\drivers\mrxsmb.sys true b0186ea7f1979d9f02da0ae11542d39d C:\Windows\system32\drivers\msquic.sys true afb57e498cd26284e9603353fb9104ad C:\Windows\system32\drivers\mslldp.sys true d69790cc30e3717431067b1a43a679f1 C:\Windows\system32\drivers\bowser.sys true 1349bea208c0f48534cfde0e8a64c3a4 C:\Windows\system32\drivers\lltdio.sys true 38c53c38731190ba73b39cbd3befe14a C:\Windows\system32\drivers\bindflt.sys true 103737c5c139bfa688ea52c3f1fdf8cc C:\Windows\system32\drivers\rdpdr.sys true e63147974f4fc014742c5471c7bc516d C:\Windows\system32\drivers\http.sys true 0db27d34c898a592dcf7e4a5eeacc2be C:\Windows\system32\drivers\srvnet.sys true fdfcf9c6d6bec82925b2e52926acbbb2 C:\Windows\system32\drivers\mrxsmb20.sys true 40f91604967e771021b89a54ddb74131 C:\Windows\system32\drivers\peauth.sys true e8789b5f24aa80994be1e2b27992af7c C:\Windows\system32\drivers\srv2.sys true ccfe129cbdea8b8c6051d11c6c694230 C:\Windows\system32\drivers\rspndr.sys true e66e50a0a3344a377838ef8b965a7f88 C:\Windows\system32\drivers\mpsdrv.sys true fb4d94870b1f42d93feb8a85b590fd4a c:\programdata\microsoft\windows defender\definition updates{265c6876-acfd-4597-b853-b3e54112bc77}\mpksldrv.sys true 6f2f14025a606b924e77ad29aa68d231 C:\Windows\system32\drivers\hlprotect.sys true 44480d8a012a7249bc390cbcdb687fee C:\Windows\system32\drivers\tcpipreg.sys true 6a7338ae6e83bf75f2057b7b1242f81b C:\Windows\system32\drivers\condrv.sys true 122c522158f2499cee46e1d2e2b59787 C:\Windows\system32\drivers\mmcss.sys true a10c637165ab63671f5ea554109d008c C:\Windows\system32\drivers\terminpt.sys true a073581102fca9e17a1a4a5a40542d5c
#
harfanglab-result-servicelistGet a hostname's list of services from job results
#
Base Commandharfanglab-result-servicelist
#
InputArgument Name | Description | Required |
---|---|---|
job_id | Job id as returned by the job submission commands. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Service.data | unknown | Provides a list of services |
#
Command example!harfanglab-result-servicelist job_id="bde92340-27da-4009-b310-5b7fa6e4fcb9"
#
Context Example#
Human Readable Output#
Scheduled Task List
name fullpath signed md5 1394ohci C:\Windows\System32\drivers\1394ohci.sys true 809badbedd63ae4481fd65b8b20e8c0b 1394ohci C:\Windows\System32\drivers\1394ohci.sys true 809badbedd63ae4481fd65b8b20e8c0b 3ware C:\Windows\System32\drivers\3ware.sys true 0652580a777f9d77aa409d8595cec672 3ware C:\Windows\System32\drivers\3ware.sys true 0652580a777f9d77aa409d8595cec672 ACPI C:\Windows\System32\drivers\ACPI.sys true 128242662d8f677e8d243dffe4c30acf ACPI C:\Windows\System32\drivers\ACPI.sys true 128242662d8f677e8d243dffe4c30acf AcpiDev C:\Windows\System32\drivers\AcpiDev.sys true ac827e39be44984a28abc64b44b47445 AcpiDev C:\Windows\System32\drivers\AcpiDev.sys true ac827e39be44984a28abc64b44b47445 acpiex C:\Windows\System32\Drivers\acpiex.sys true 0c2a19fce98cd5279174f70ecde10173 acpiex C:\Windows\System32\Drivers\acpiex.sys true 0c2a19fce98cd5279174f70ecde10173
#
harfanglab-result-processlistGet a hostname's list of processes from job results
#
Base Commandharfanglab-result-processlist
#
InputArgument Name | Description | Required |
---|---|---|
job_id | Job id as returned by the job submission commands. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Process.data | unknown | Provides a list of processes |
#
Command example!harfanglab-result-processlist job_id="db793a9d-6d86-4fbf-8ee5-8836f04e14ff"
#
Context Example#
Human Readable Output#
Process List
name session username integrity pid ppid cmdline fullpath signed md5 AggregatorHost.exe 0 NT AUTHORITY\SYSTEM System 2588 1428 AggregatorHost.exe C:\Windows\System32\AggregatorHost.exe true 391ed483154f77cfdad1e2e0f9ce2001 conhost.exe 0 NT AUTHORITY\SYSTEM System 4812 4800 \??\C:\Windows\system32\conhost.exe 0x4 C:\Windows\System32\conhost.exe true b03d74d481d9d64047625bec2d64a0ce csrss.exe 0 NT AUTHORITY\SYSTEM Unknown 436 428 %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16 C:\Windows\System32\csrss.exe true a6c9ee45bff7c5e696b07ec41af84541 csrss.exe 1 NT AUTHORITY\SYSTEM Unknown 512 496 %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16 C:\Windows\System32\csrss.exe true a6c9ee45bff7c5e696b07ec41af84541 csrss.exe 3 NT AUTHORITY\SYSTEM Unknown 4648 3972 %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16 C:\Windows\System32\csrss.exe true a6c9ee45bff7c5e696b07ec41af84541 ctfmon.exe 1 DC-01\vagrant High 3220 772 ctfmon.exe C:\Windows\System32\ctfmon.exe true 91e5e0722b281024e60d5768ab948794 dllhost.exe 1 DC-01\vagrant High 268 752 C:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F} C:\Windows\System32\dllhost.exe true 61b7ccf84d2b4251bd263e75cd103f89 dwm.exe 1 Window Manager\DWM-1 System 948 588 dwm.exe C:\Windows\System32\dwm.exe true 66f552d20dcf3377279c20a119e0e72f dwm.exe 3 Window Manager\DWM-3 System 4740 1592 dwm.exe C:\Windows\System32\dwm.exe true 66f552d20dcf3377279c20a119e0e72f explorer.exe 1 DC-01\vagrant High 616 3940 C:\Windows\Explorer.EXE C:\Windows\explorer.exe true 7761d5917fa1adc297a5ce0cf1e242eb fontdrvhost.exe 1 Font Driver Host\UMFD-1 Low 776 588 fontdrvhost.exe C:\Windows\System32\fontdrvhost.exe true dd24bac3913d47f9b35a8718aeed3cbe fontdrvhost.exe 0 Font Driver Host\UMFD-0 Low 780 504 fontdrvhost.exe C:\Windows\System32\fontdrvhost.exe true dd24bac3913d47f9b35a8718aeed3cbe fontdrvhost.exe 3 Font Driver Host\UMFD-3 Low 1580 1592 fontdrvhost.exe C:\Windows\System32\fontdrvhost.exe true dd24bac3913d47f9b35a8718aeed3cbe hurukai.exe 0 NT AUTHORITY\SYSTEM System 4800 1560 C:\Program Files\HarfangLab\hurukai.exe {1c38b8b3-2cb1-1ea6-5f44-6c2c93ab812c} C:\Program Files\HarfangLab\hurukai.exe true 05049f1cadb8af2b6893e1ead33351c9 hurukai.exe 0 NT AUTHORITY\SYSTEM System 1560 632 C:\Program Files\HarfangLab\hurukai.exe C:\Program Files\HarfangLab\hurukai.exe true 05049f1cadb8af2b6893e1ead33351c9 LogonUI.exe 1 NT AUTHORITY\SYSTEM System 4368 588 LogonUI.exe /flags:0x0 /state0:0xa14bc855 /state1:0x41c64e6d C:\Windows\System32\LogonUI.exe true 6cd47ca4515b2f81b5ca1e6ca9a323cc LogonUI.exe 3 NT AUTHORITY\SYSTEM System 2968 1592 LogonUI.exe /flags:0x2 /state0:0xa14fa855 /state1:0x41c64e6d C:\Windows\System32\LogonUI.exe true 6cd47ca4515b2f81b5ca1e6ca9a323cc lsass.exe 0 NT AUTHORITY\SYSTEM System 644 504 C:\Windows\system32\lsass.exe C:\Windows\System32\lsass.exe true 6da2fcc580c720c16612057e83f47f04 msdtc.exe 0 NT AUTHORITY\NETWORK SERVICE System 3516 632 C:\Windows\System32\msdtc.exe C:\Windows\System32\msdtc.exe true bd7be47340ba4888b9b47ad323ff51d3 MsMpEng.exe 0 NT AUTHORITY\SYSTEM Unknown 2104 632 C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2205.7-0\MsMpEng.exe C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2205.7-0\MsMpEng.exe true a7dca32f82ec2569865f447416a7cf1a rdpclip.exe 1 DC-01\vagrant High 4888 392 rdpclip C:\Windows\System32\rdpclip.exe true ab8027b4bc3a3cd5b25070b08274fbed regedit.exe 1 DC-01\vagrant High 4160 616 C:\Windows\regedit.exe C:\Windows\regedit.exe true fea68fb10d62cbadf484dc1d2f44ed11 Registry 0 NT AUTHORITY\SYSTEM Unknown 100 4 false RuntimeBroker.exe 1 DC-01\vagrant High 1280 752 C:\Windows\System32\RuntimeBroker.exe -Embedding C:\Windows\System32\RuntimeBroker.exe true 1541969ef9db9aae4e89b749d427cdea RuntimeBroker.exe 1 DC-01\vagrant High 2712 752 C:\Windows\System32\RuntimeBroker.exe -Embedding C:\Windows\System32\RuntimeBroker.exe true 1541969ef9db9aae4e89b749d427cdea RuntimeBroker.exe 1 DC-01\vagrant High 3288 752 C:\Windows\System32\RuntimeBroker.exe -Embedding C:\Windows\System32\RuntimeBroker.exe true 1541969ef9db9aae4e89b749d427cdea SearchApp.exe 1 DC-01\vagrant Low 2548 752 C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe true efde01e2986731e39c1c2e0f5a1dbd06 services.exe 0 NT AUTHORITY\SYSTEM Unknown 632 504 C:\Windows\system32\services.exe C:\Windows\System32\services.exe true 042c0e965c5db03dbf911e4c6a319ce8 sihost.exe 1 DC-01\vagrant High 1272 1320 sihost.exe C:\Windows\System32\sihost.exe true 45cfb07366fe59573369e66029b12cea smss.exe 0 NT AUTHORITY\SYSTEM Unknown 340 4 \SystemRoot\System32\smss.exe C:\Windows\System32\smss.exe true 44962fd12f0d29b0713bb5e14653194a spoolsv.exe 0 NT AUTHORITY\SYSTEM System 1044 632 C:\Windows\System32\spoolsv.exe C:\Windows\System32\spoolsv.exe true 55bb3facc6ef795f6f1d8cc656bcb779 sshd.exe 0 NT AUTHORITY\SYSTEM System 1520 632 C:\Program Files\OpenSSH-Win64\sshd.exe C:\Program Files\OpenSSH-Win64\sshd.exe true 331ba0e529810ef718dd3efbd1242302 StartMenuExperienceHost.exe 1 DC-01\vagrant Low 3664 752 C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe true c6b9db31748cf4bf854639dd55d6f45b svchost.exe 0 NT AUTHORITY\NETWORK SERVICE System 392 632 C:\Windows\System32\svchost.exe -k termsvcs C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 svchost.exe 0 NT AUTHORITY\LOCAL SERVICE System 516 632 C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 svchost.exe 1 DC-01\vagrant High 600 632 C:\Windows\system32\svchost.exe -k UnistackSvcGroup C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 svchost.exe 0 NT AUTHORITY\LOCAL SERVICE System 708 632 C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 svchost.exe 0 NT AUTHORITY\SYSTEM System 1320 632 C:\Windows\system32\svchost.exe -k netsvcs -p C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 svchost.exe 0 NT AUTHORITY\SYSTEM System 752 632 C:\Windows\system32\svchost.exe -k DcomLaunch -p C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 svchost.exe 0 NT AUTHORITY\SYSTEM System 772 632 C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 svchost.exe 0 NT AUTHORITY\NETWORK SERVICE System 860 632 C:\Windows\system32\svchost.exe -k RPCSS -p C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 svchost.exe 0 NT AUTHORITY\SYSTEM Unknown 3976 632 C:\Windows\system32\svchost.exe -k wusvcs -p C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 svchost.exe 1 DC-01\vagrant High 4052 632 C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 svchost.exe 0 NT AUTHORITY\SYSTEM System 1428 632 C:\Windows\System32\svchost.exe -k utcsvc -p C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 svchost.exe 0 NT AUTHORITY\LOCAL SERVICE System 1140 632 C:\Windows\system32\svchost.exe -k LocalService -p C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 svchost.exe 0 NT AUTHORITY\NETWORK SERVICE System 1436 632 C:\Windows\System32\svchost.exe -k NetworkService -p C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 svchost.exe 0 NT AUTHORITY\SYSTEM System 1496 632 C:\Windows\system32\svchost.exe -k netsvcs C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 svchost.exe 0 NT AUTHORITY\LOCAL SERVICE System 1608 632 C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 svchost.exe 0 NT AUTHORITY\LOCAL SERVICE System 1676 632 C:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 svchost.exe 0 NT AUTHORITY\SYSTEM System 2060 632 C:\Windows\System32\svchost.exe -k smbsvcs C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 svchost.exe 0 NT AUTHORITY\LOCAL SERVICE System 2088 632 C:\Windows\system32\svchost.exe -k LocalService C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 svchost.exe 0 NT AUTHORITY\SYSTEM System 2208 632 C:\Windows\system32\svchost.exe -k appmodel -p C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 svchost.exe 0 NT AUTHORITY\NETWORK SERVICE System 2720 632 C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 System 0 NT AUTHORITY\SYSTEM System 4 0 false System Idle Process 0 NT AUTHORITY\SYSTEM System 0 0 false taskhostw.exe 1 DC-01\vagrant High 1708 1320 taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E} C:\Windows\System32\taskhostw.exe true 5487316514f4ada7e6e0bd9eaa2256e7 TextInputHost.exe 1 DC-01\vagrant Low 1864 752 C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe -ServerName:InputApp.AppXjd5de1g66v206tj52m9d0dtpppx4cgpn.mca C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe true 44028011959b9998f95be738a3389efb VBoxService.exe 0 NT AUTHORITY\SYSTEM System 1352 632 C:\Windows\System32\VBoxService.exe C:\Windows\System32\VBoxService.exe true 5ac35aca951acd0732752095bbc366be VBoxTray.exe 1 DC-01\vagrant High 4240 616 C:\Windows\System32\VBoxTray.exe C:\Windows\System32\VBoxTray.exe true 3c21ed6871650bc8635729b9abbb6f21 wininit.exe 0 NT AUTHORITY\SYSTEM Unknown 504 428 wininit.exe C:\Windows\System32\wininit.exe true e7bbde1ff6b1c3c883771e145fb6c396 winlogon.exe 1 NT AUTHORITY\SYSTEM System 588 496 winlogon.exe C:\Windows\System32\winlogon.exe true aef3170240ef485d6bff04ac9d210906 winlogon.exe 3 NT AUTHORITY\SYSTEM System 1592 3972 winlogon.exe C:\Windows\System32\winlogon.exe true aef3170240ef485d6bff04ac9d210906 wlms.exe 0 NT AUTHORITY\SYSTEM System 2140 632 C:\Windows\system32\wlms\wlms.exe C:\Windows\System32\wlms\wlms.exe true e723cfc8e88f9eb378f1043aaf3df92e
#
harfanglab-result-networkconnectionlistGet a hostname's network connections from job results
#
Base Commandharfanglab-result-networkconnectionlist
#
InputArgument Name | Description | Required |
---|---|---|
job_id | Job id as returned by the job submission commands. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.NetworkConnection.data | unknown | Provides a list of active network connections |
#
Command example!harfanglab-result-networkconnectionlist job_id="da31761f-003d-4abb-ab42-3d1737d75e7c"
#
Context Example#
Human Readable Output#
Network Connection List
state protocol version src_addr src_port dst_addr dst_port fullpath signed md5 ESTABLISHED TCP IPv4 (REDACTED) 55267 (REDACTED) 443 C:\Program Files\HarfangLab\hurukai.exe true 05049f1cadb8af2b6893e1ead33351c9 LISTEN TCP IPv6 :: 49664 C:\Windows\System32\lsass.exe true 6da2fcc580c720c16612057e83f47f04 LISTEN TCP IPv4 (REDACTED) 49664 C:\Windows\System32\lsass.exe true 6da2fcc580c720c16612057e83f47f04 LISTEN TCP IPv4 (REDACTED) 49669 C:\Windows\System32\services.exe true 042c0e965c5db03dbf911e4c6a319ce8 LISTEN TCP IPv6 :: 49669 C:\Windows\System32\services.exe true 042c0e965c5db03dbf911e4c6a319ce8 LISTEN TCP IPv4 (REDACTED) 49668 C:\Windows\System32\spoolsv.exe true 55bb3facc6ef795f6f1d8cc656bcb779 LISTEN TCP IPv6 :: 49668 C:\Windows\System32\spoolsv.exe true 55bb3facc6ef795f6f1d8cc656bcb779 LISTEN TCP IPv4 (REDACTED) 22 C:\Program Files\OpenSSH-Win64\sshd.exe true 331ba0e529810ef718dd3efbd1242302 LISTEN TCP IPv6 :: 22 C:\Program Files\OpenSSH-Win64\sshd.exe true 331ba0e529810ef718dd3efbd1242302 LISTEN TCP IPv4 (REDACTED) 3389 C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 LISTEN TCP IPv6 :: 3389 C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 NONE UDP IPv6 :: 3389 C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 NONE UDP IPv4 (REDACTED) 3389 C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 LISTEN TCP IPv6 :: 135 C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 LISTEN TCP IPv4 (REDACTED) 135 C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 NONE UDP IPv4 (REDACTED) 52239 C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 LISTEN TCP IPv6 :: 49667 C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 LISTEN TCP IPv4 (REDACTED) 49667 C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 LISTEN TCP IPv4 (REDACTED) 49666 C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 LISTEN TCP IPv6 :: 49666 C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 NONE UDP IPv4 (REDACTED) 5355 C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 NONE UDP IPv6 :: 5355 C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 NONE UDP IPv4 (REDACTED) 5353 C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 NONE UDP IPv6 :: 5353 C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 NONE UDP IPv6 :: 64686 C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 NONE UDP IPv4 (REDACTED) 64686 C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 NONE UDP IPv4 (REDACTED) 123 C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 NONE UDP IPv6 :: 123 C:\Windows\System32\svchost.exe true dc32aba4669eafb22fcacd5ec836a107 LISTEN TCP IPv4 (REDACTED) 139 false LISTEN TCP IPv4 (REDACTED) 47001 false LISTEN TCP IPv6 :: 47001 false NONE UDP IPv4 (REDACTED) 138 false LISTEN TCP IPv4 (REDACTED) 139 false NONE UDP IPv4 (REDACTED) 138 false LISTEN TCP IPv6 :: 445 false LISTEN TCP IPv4 (REDACTED) 5985 false LISTEN TCP IPv6 :: 5985 false NONE UDP IPv4 (REDACTED) 137 false LISTEN TCP IPv4 (REDACTED) 445 false NONE UDP IPv4 (REDACTED) 137 false LISTEN TCP IPv4 (REDACTED) 49665 C:\Windows\System32\wininit.exe true e7bbde1ff6b1c3c883771e145fb6c396 LISTEN TCP IPv6 :: 49665 C:\Windows\System32\wininit.exe true e7bbde1ff6b1c3c883771e145fb6c396
#
harfanglab-result-networksharelistGet a hostname's network shares from job results
#
Base Commandharfanglab-result-networksharelist
#
InputArgument Name | Description | Required |
---|---|---|
job_id | Job id as returned by the job submission commands. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.NetworkShare.data | unknown | Provides a list of network shares |
#
Command example!harfanglab-result-networksharelist job_id="3ec3821f-278b-4cf1-8fb8-11f4a1c431d5"
#
Context Example#
Human Readable Output#
Network Share List
Name Caption Description Path Status Share type val Share type Hostname ADMIN$ Remote Admin Remote Admin C:\Windows OK 2147483648 Disk Drive Admin DC-01 C$ Default share Default share C:\ OK 2147483648 Disk Drive Admin DC-01 IPC$ Remote IPC Remote IPC OK 2147483651 IPC Admin DC-01
#
harfanglab-result-sessionlistGet a hostname's sessions from job results
#
Base Commandharfanglab-result-sessionlist
#
InputArgument Name | Description | Required |
---|---|---|
job_id | Job id as returned by the job submission commands. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Session.data | unknown | Provides a list of active sessions |
#
Command example!harfanglab-result-sessionlist job_id="01819f9a-44f5-42b6-9e1a-4efc3fadd48d"
#
Context Example#
Human Readable Output#
Session List
Logon Id Authentication package Logon type Logon type str Session start time Hostname 999 NTLM 0 System 2022-06-28T14:18:30.944000Z DC-01 997 Negotiate 5 Service 2022-06-28T14:18:31.992000Z DC-01 356056507 NTLM 2 Interactive 2022-07-22T16:08:46.373000Z DC-01 272595 NTLM 3 Network 2022-06-28T14:19:19.447000Z DC-01 996 Negotiate 5 Service 2022-06-28T14:18:31.507000Z DC-01 232421 NTLM 3 Network 2022-06-28T14:18:54.600000Z DC-01 121005166 NTLM 3 Network 2022-07-06T19:36:41.698000Z DC-01 370611950 Negotiate 2 Interactive 2022-07-23T06:15:19.172000Z DC-01 370621180 Negotiate 2 Interactive 2022-07-23T06:15:19.391000Z DC-01 188264 NTLM 3 Network 2022-06-28T14:18:44.527000Z DC-01 24600 Negotiate 2 Interactive 2022-06-28T14:18:31.273000Z DC-01 24615 Negotiate 2 Interactive 2022-06-28T14:18:31.273000Z DC-01 42936 Negotiate 2 Interactive 2022-06-28T14:18:31.789000Z DC-01
#
harfanglab-result-persistencelistGet a hostname's persistence items from job results
#
Base Commandharfanglab-result-persistencelist
#
InputArgument Name | Description | Required |
---|---|---|
job_id | Job id as returned by the job submission commands. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Persistence.data | unknown | Provides a list of persistence means |
#
Command example!harfanglab-result-persistencelist job_id="8ee99c61-9c0e-4cfb-89ea-4aba01cbf1ed"
#
Context Example#
Human Readable Output#
Linux persistence listNo entries.
#
harfanglab-result-iocGet the list of items matching IOCs searched in an IOC job
#
Base Commandharfanglab-result-ioc
#
InputArgument Name | Description | Required |
---|---|---|
job_id | Job id as returned by the job submission commands. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.IOC.data | unknown | Provides a list of matching elements |
#
Command example!harfanglab-result-ioc job_id="1680a62a-7a9c-456d-ae89-75788daa94e8"
#
Context Example#
Human Readable Output#
IOC Found List
type search_value fullpath signed md5 filename agent.ini C:\Program Files\HarfangLab\agent.ini false f43c1ddce185d649e61deb4f3dfcf7c8
#
harfanglab-result-startuplistGet a hostname's startup items from job results
#
Base Commandharfanglab-result-startuplist
#
InputArgument Name | Description | Required |
---|---|---|
job_id | Job id as returned by the job submission commands. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Startup.data | unknown | Provides a list of startup files |
#
Command example!harfanglab-result-startuplist job_id="f1fac880-ade0-44c3-837f-486517565909"
#
Context Example#
Human Readable Output#
Startup ListNo entries.
#
harfanglab-result-wmilistGet a hostname's WMI items from job results
#
Base Commandharfanglab-result-wmilist
#
InputArgument Name | Description | Required |
---|---|---|
job_id | Job id as returned by the job submission commands. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Wmi.data | unknown | Provides a list of WMI items |
#
Command example!harfanglab-result-wmilist job_id="5219bfca-4a8b-4913-813f-446d88e28d99"
#
Context Example#
Human Readable Output#
WMI ListNo entries.
#
harfanglab-result-artifact-mftGet a hostname's MFT from job results
#
Base Commandharfanglab-result-artifact-mft
#
InputArgument Name | Description | Required |
---|---|---|
job_id | Job id as returned by the job submission commands. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Artifact.MFT | unknown | Provides a link to download the raw MFT |
#
Command example!harfanglab-result-artifact-mft job_id="10fae902-ddb0-48b8-bbd9-aa94e92f9222"
#
Context Example#
Human Readable Output#
MFT download list
hostname msg size download link DC-01 got 0 hives, 1 mft, 0 USN, 0 prefetch, 0 logs files 206045184 https://my_edr_stack:8443/api/data/investigation/artefact/Artefact/uDV4NIIB3S3Gj-GSVFRk/download/?hl_expiring_key=0123456789abcdef
#
harfanglab-result-artifact-hivesGet a hostname's hives from job results
#
Base Commandharfanglab-result-artifact-hives
#
InputArgument Name | Description | Required |
---|---|---|
job_id | Job id as returned by the job submission commands. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Artifact.HIVES | unknown | Provides a link to download the raw hives |
#
Command example!harfanglab-result-artifact-hives job_id="8a0b77e2-6c55-4bfb-89c5-377c2a3b6bf4"
#
Context Example#
Human Readable Output#
HIVES download list
hostname msg size download link DC-01 got 11 hives, 0 mft, 0 USN, 0 prefetch, 0 logs files 91324416 https://my_edr_stack:8443/api/data/investigation/artefact/Artefact/jDV2NIIB3S3Gj-GSkVSP/download/?hl_expiring_key=0123456789abcdef
#
harfanglab-result-artifact-evtxGet a hostname's log files from job results
#
Base Commandharfanglab-result-artifact-evtx
#
InputArgument Name | Description | Required |
---|---|---|
job_id | Job id as returned by the job submission commands. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Artifact.EVTX | unknown | Provides a link to download the evt/evtx files |
#
Command example!harfanglab-result-artifact-evtx job_id="43f4c7bf-ed15-4b1b-8b14-d71f48ad9077"
#
Context Example#
Human Readable Output#
EVTX download list
hostname msg size download link DC-01 got 0 hives, 0 mft, 0 USN, 0 prefetch, 133 logs files 400969728 https://my_edr_stack:8443/api/data/investigation/artefact/Artefact/SjV0NIIB3S3Gj-GS8FQF/download/?hl_expiring_key=0123456789abcdef
#
harfanglab-result-artifact-logsGet a hostname's log files from job results
#
Base Commandharfanglab-result-artifact-logs
#
InputArgument Name | Description | Required |
---|---|---|
job_id | Job id as returned by the job submission commands. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Artifact.LOGS | unknown | Provides a link to download the log files |
#
Command example!harfanglab-result-artifact-logs job_id="eb957909-57cb-4f20-ad76-dc47aab5496f"
#
Context Example#
Human Readable Output#
LOGS download list
hostname msg size download link DC-01 got 0 hives, 0 mft, 0 USN, 0 prefetch, 0 logs files, 0 linux filesystem parse 0 https://my_edr_stack:8443/api/data/investigation/artefact/Artefact/mzV3NIIB3S3Gj-GSMlSI/download/?hl_expiring_key=0123456789abcdef
#
harfanglab-result-artifact-filesystemGet a hostname's filesystem entries from job results
#
Base Commandharfanglab-result-artifact-filesystem
#
InputArgument Name | Description | Required |
---|---|---|
job_id | Job id as returned by the job submission commands. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Artifact.FS | unknown | Provides a link to download the CSV file with filesystem entries |
#
Command example!harfanglab-result-artifact-filesystem job_id="210b72f7-7ee5-4e89-b3fb-8106e7a57bf7"
#
Context Example#
Human Readable Output#
FS download list
hostname msg size download link DC-01 got 0 hives, 0 mft, 0 USN, 0 prefetch, 0 logs files, 0 linux filesystem parse 0 https://my_edr_stack:8443/api/data/investigation/artefact/Artefact/ajV1NIIB3S3Gj-GShlQa/download/?hl_expiring_key=0123456789abcdef
#
harfanglab-result-artifact-allGet all artifacts from a hostname from job results
#
Base Commandharfanglab-result-artifact-all
#
InputArgument Name | Description | Required |
---|---|---|
job_id | Job id as returned by the job submission commands. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Artifact.ALL | unknown | Provides a link to download an archive with all raw artifacts |
#
Command example!harfanglab-result-artifact-all job_id="affe8871-c838-4c17-b5cb-fa30b6aeacfc"
#
Context Example#
Human Readable Output#
ALL download list
hostname msg size download link DC-01 got 11 hives, 1 mft, 1 USN, 0 prefetch, 133 logs files 734616576 https://my_edr_stack:8443/api/data/investigation/artefact/Artefact/HDVyNIIB3S3Gj-GSsFTu/download/?hl_expiring_key=0123456789abcdef
#
harfanglab-result-artifact-downloadfileGet a hostname's file from job results
#
Base Commandharfanglab-result-artifact-downloadfile
#
InputArgument Name | Description | Required |
---|---|---|
job_id | Job id as returned by the job submission commands. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.DownloadFile.data | unknown | Provides a link to download the file |
#
Command example!harfanglab-result-artifact-downloadfile job_id="aa83c9e9-91de-4f6f-b2f3-f01c936c4ee6"
#
Context Example#
Human Readable Output#
file download list
hostname msg size download link DC-01 1 file(s) downloaded 1688 https://my_edr_stack:8443/api/data/investigation/artefact/Artefact/MTVzNIIB3S3Gj-GSxFQ5/download/?hl_expiring_key=0123456789abcdef
#
harfanglab-result-artifact-ramdumpGet a hostname's RAM dump from job results
#
Base Commandharfanglab-result-artifact-ramdump
#
InputArgument Name | Description | Required |
---|---|---|
job_id | Job id as returned by the job submission commands. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Ramdump.data | unknown | Provides a link to download the raw RAM dump |
#
Command example!harfanglab-result-artifact-ramdump job_id="539456d8-872c-4e60-a28b-210ffcd4c7c4"
#
Context Example#
Human Readable Output#
Ramdump list
hostname msg size download link DC-01 1 file(s) downloaded 1080819582 https://my_edr_stack:8443/api/data/investigation/artefact/Artefact/_TV7NIIB3S3Gj-GSBVTv/download/?hl_expiring_key=0123456789abcdef
#
harfanglab-hunt-search-hashCommand used to search a hash IOC in database
#
Base Commandharfanglab-hunt-search-hash
#
InputArgument Name | Description | Required |
---|---|---|
hash | filehash to search (md5, sha1, sha256). | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Hash | unknown | Provides statistics associated to currently running processes and previously executed processes associated to hash |
#
Command example!harfanglab-hunt-search-hash hash=2198a7b58bccb758036b969ddae6cc2ece07565e2659a7c541a313a0492231a3
#
Context Example#
Human Readable Output#
Hash search results
curr_running hash prev_runned 0 2198a7b58bccb758036b969ddae6cc2ece07565e2659a7c541a313a0492231a3 8994
#
harfanglab-hunt-search-running-process-hashCommand used to search running process associated with Hash
#
Base Commandharfanglab-hunt-search-running-process-hash
#
InputArgument Name | Description | Required |
---|---|---|
hash | filehash to search (sha256). | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.HuntRunningProcessSearch.data | unknown | List of all systems where processes associated to hash are running |
#
Command example!harfanglab-hunt-search-running-process-hash hash=2198a7b58bccb758036b969ddae6cc2ece07565e2659a7c541a313a0492231a3
#
Context Example#
Human Readable Output#
War room overviewNo entries.
#
harfanglab-hunt-search-runned-process-hashCommand used to search runned process associated with Hash
#
Base Commandharfanglab-hunt-search-runned-process-hash
#
InputArgument Name | Description | Required |
---|---|---|
hash | filehash to search (sha256). | Required |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.HuntRunnedProcessSearch.data | unknown | List of all systems where processes associated to hash have been previously running |
#
Command example!harfanglab-hunt-search-runned-process-hash hash=2198a7b58bccb758036b969ddae6cc2ece07565e2659a7c541a313a0492231a3
#
Context Example#
Human Readable Output#
War room overview
Hostname Domain Username OS Binary Path Create timestamp WORKSTATION-4812 WORKGROUP NT AUTHORITY\LOCAL SERVICE Windows 10 Enterprise Evaluation 10.0.19041 C:\Windows\System32\wbem\WmiPrvSE.exe 2019-10-16T23:45:21Z WORKSTATION-4812 WORKGROUP NT AUTHORITY\NETWORK SERVICE Windows 10 Enterprise Evaluation 10.0.19041 C:\Windows\System32\wbem\WmiPrvSE.exe 2019-10-16T23:45:21Z WORKSTATION-1234 WORKGROUP NT AUTHORITY\LOCAL SERVICE Windows 10 Enterprise Evaluation 10.0.19041 C:\Windows\System32\wbem\WmiPrvSE.exe 2019-10-16T23:45:21Z WORKSTATION-1234 WORKGROUP NT AUTHORITY\NETWORK SERVICE Windows 10 Enterprise Evaluation 10.0.19041 C:\Windows\System32\wbem\WmiPrvSE.exe 2019-10-16T23:45:21Z WORKSTATION-8501 WORKGROUP NT AUTHORITY\LOCAL SERVICE Windows 10 Enterprise Evaluation 10.0.19041 C:\Windows\System32\wbem\WmiPrvSE.exe 2019-10-16T23:45:21Z WORKSTATION-8501 WORKGROUP NT AUTHORITY\NETWORK SERVICE Windows 10 Enterprise Evaluation 10.0.19041 C:\Windows\System32\wbem\WmiPrvSE.exe 2019-10-16T23:45:21Z WORKSTATION-6852 WORKGROUP NT AUTHORITY\LOCAL SERVICE Windows 10 Enterprise Evaluation 10.0.19041 C:\Windows\System32\wbem\WmiPrvSE.exe 2019-10-16T23:45:21Z WORKSTATION-6852 WORKGROUP NT AUTHORITY\NETWORK SERVICE Windows 10 Enterprise Evaluation 10.0.19041 C:\Windows\System32\wbem\WmiPrvSE.exe 2019-10-16T23:45:21Z WORKSTATION-3752 WORKGROUP NT AUTHORITY\LOCAL SERVICE Windows 10 Enterprise Evaluation 10.0.19041 C:\Windows\System32\wbem\WmiPrvSE.exe 2019-10-16T23:45:21Z WORKSTATION-3752 WORKGROUP NT AUTHORITY\NETWORK SERVICE Windows 10 Enterprise Evaluation 10.0.19041 C:\Windows\System32\wbem\WmiPrvSE.exe 2019-10-16T23:45:21Z
#
harfanglab-isolate-endpointCommand used to isolate an endpoint from the network while remaining connected to the EDR manager
#
Base Commandharfanglab-isolate-endpoint
#
InputArgument Name | Description | Required |
---|---|---|
agent_id | Agent unique identifier as provided by the HarfangLab EDR Manager. | Required |
#
Context OutputThere is no context output for this command.
#
Command example!harfanglab-isolate-endpoint agent_id="0fae71cf-ebde-4533-a50c-b3c0290378db"
#
Human Readable Output#
harfanglab-deisolate-endpointCommand used to deisolate an endpoint and reconnect it to the network
#
Base Commandharfanglab-deisolate-endpoint
#
InputArgument Name | Description | Required |
---|---|---|
agent_id | Agent unique identifier as provided by the HarfangLab EDR Manager. | Required |
#
Context OutputThere is no context output for this command.
#
Command example!harfanglab-deisolate-endpoint agent_id="0fae71cf-ebde-4533-a50c-b3c0290378db"
#
Human Readable Output#
harfanglab-change-security-event-statusCommand used to change the status of a security event
#
Base Commandharfanglab-change-security-event-status
#
InputArgument Name | Description | Required |
---|---|---|
security_event_id | Security event id. | Required |
status | New status of the security event id (New, Investigating, False Positive, Closed). | Required |
#
Context OutputThere is no context output for this command.
#
Command example!harfanglab-change-security-event-status security_event_id="QCzd2IEB3S3Gj-GS6z9S" status=Investigating
#
Human Readable Output#
harfanglab-assign-policy-to-agentAssign a policy to an agent
#
Base Commandharfanglab-assign-policy-to-agent
#
InputArgument Name | Description | Required |
---|---|---|
agentid | Agent identifier. | Required |
policy | Policy name. | Required |
#
Context OutputThere is no context output for this command.
#
Command example!harfanglab-assign-policy-to-agent agentid=0fae71cf-ebde-4533-a50c-b3c0290378db policy="No psexec"
#
Human Readable Output#
harfanglab-add-ioc-to-sourceAdd an IOC to a Threat Intelligence source
#
Base Commandharfanglab-add-ioc-to-source
#
InputArgument Name | Description | Required |
---|---|---|
ioc_value | IOC value. | Required |
ioc_type | IOC type (hash, filename, filepath). | Required |
ioc_comment | Comment associated to IOC. | Optional |
ioc_status | IOC status (stable, testing). | Required |
source_name | IOC Source Name. | Required |
#
Context OutputThere is no context output for this command.
#
Command example!harfanglab-add-ioc-to-source ioc_value=0004ffbd9a1a1acd44f4859c39a49639babe515434ca34bec603598b50211bab ioc_type=hash ioc_status=stable source_name="Industrial Spy"
#
Human Readable Output#
harfanglab-delete-ioc-from-sourceDelete an IOC from a Threat Intelligence source
#
Base Commandharfanglab-delete-ioc-from-source
#
InputArgument Name | Description | Required |
---|---|---|
ioc_value | IOC value. | Required |
source_name | IOC Source Name. | Required |
#
Context OutputThere is no context output for this command.
#
Command example!harfanglab-delete-ioc-from-source ioc_value=0004ffbd9a1a1acd44f4859c39a49639babe515434ca34bec603598b50211bab source_name="Industrial Spy"
#
Human Readable Output#
harfanglab-whitelist-addAdd a whitelist
#
Base Commandharfanglab-whitelist-add
#
InputArgument Name | Description | Required |
---|---|---|
comment | Comment associated to the whitelist. | Optional |
target | Detection engine associated to the whitelist (all, sigma, yara, hlai, vt, ransom, orion, glimps, cape, driver). | Optional |
sigma_rule_id | UUID of the targeted sigma rule (for sigma whitelist). | Optional |
field | Field used for checking the criterion. | Optional |
case_insensitive | Whether checking must be case sensitive or not. | Optional |
operator | Operator used for the criterion (eq, contains, regex). | Optional |
value | Value used for the criterion. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Whitelists | unknown | Whitelists |
#
Command example!harfanglab-whitelist-add target=all field=process.hashes.sha256 operator=eq value=dcaabeb77b7e02eb31269f1ee0dcbb30e92233c2a26ba22a3be02fcf01bd2514 comment="Example of whitelist for all detection engines" case_insensitive=true
#
Context Example#
Human Readable Output#
harfanglab-whitelist-add-criterionAdd a criterion to an existing whitelist
#
Base Commandharfanglab-whitelist-add-criterion
#
InputArgument Name | Description | Required |
---|---|---|
id | Whitelist id. | Optional |
field | Field used for checking the criterion. | Optional |
case_insensitive | Whether checking must be case sensitive or not. | Optional |
operator | Operator used for the criterion (eq, contains, regex). | Optional |
value | Value used for the criterion. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Whitelists | unknown | Whitelists |
#
Command example!harfanglab-whitelist-add-criterion id=2518 field=process.commandline operator=contains value=cmd.exe
#
Context Example#
Human Readable Output#
harfanglab-whitelist-searchSearch whitelists from a keyword
#
Base Commandharfanglab-whitelist-search
#
InputArgument Name | Description | Required |
---|---|---|
keyword | Keyword to search whitelist. | Optional |
provided_by_hlab | Boolean indicating whether to search in whitelists provided by HarfangLab or not. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Whitelists | unknown | Whitelists |
#
Command example!harfanglab-whitelist-search keyword=cmd.exe
#
Context Example#
Human Readable Output#
harfanglab-whitelist-deleteDelete a whitelist
#
Base Commandharfanglab-whitelist-delete
#
InputArgument Name | Description | Required |
---|---|---|
id | Whitelist identifier. | Optional |
#
Context OutputThere is no context output for this command.
#
Command example!harfanglab-whitelist-delete id=2518
#
Human Readable OutputNone
#
harfanglab-endpoint-searchSearch for endpoint information from a hostname
#
Base Commandharfanglab-endpoint-search
#
InputArgument Name | Description | Required |
---|---|---|
hostname | Endpoint hostname. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
Harfanglab.Agent | unknown | Agent information |
Harfanglab.Agent.id | string | agent id (DEPRECATED) |
Harfanglab.status | string | Status (DEPRECATED) |