Skip to main content

MDE - Host Advanced Hunting For Powershell Executions

This Playbook is part of the Microsoft Defender for Endpoint Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.5.0 and later.

This playbook is part of the 'Malware Investigation And Response' pack. For more information, refer to https://xsoar.pan.dev/docs/reference/packs/malware-investigation-and-response. This playbook uses the Microsoft Defender For Endpoint Advanced Hunting feature to hunt for host PowerShell executions.

Dependencies#

This playbook uses the following sub-playbooks, integrations, and scripts.

Sub-playbooks#

  • Command-Line Analysis

Integrations#

  • MicrosoftDefenderAdvancedThreatProtection

Scripts#

This playbook does not use any scripts.

Commands#

  • microsoft-atp-advanced-hunting-process-details
  • microsoft-atp-advanced-hunting-network-connections
  • microsoft-atp-get-file-related-machines
  • setIncident

Playbook Inputs#


NameDescriptionDefault ValueRequired
DeviceNameA comma-separated list of host names to hunt.incident.hostnamesOptional
FileNameA comma-separated list of file names to hunt.incident.filenamesOptional
DeviceIDA comma-separated list of device IDs to hunt.incident.agentsidOptional
FileMd5A comma-separated list of file MD5 hashes to hunt.incident.filemd5Optional
FileSha256A comma-separated list of file SHA256 hashes to hunt.incident.filesha256Optional
FileSha1A comma-separated list of file SHA1 hashes to hunt.incident.filesha1Optional

Playbook Outputs#


PathDescriptionType
MicrosoftATP.HuntProcessDetails.ResultThe query results for Process Details.unknown
MicrosoftATP.HuntProcessDetails.Result.parent_processThe query results for parent_process query_purposeThe query results.unknown
MicrosoftATP.HuntProcessDetails.Result.grandparent_processThe query results for grandparent_process query_purpose.unknown
MicrosoftATP.HuntProcessDetails.Result.process_detailsThe query results for process_details query_purpose.unknown
MicrosoftATP.HuntProcessDetails.Result.beaconing_evidenceThe query results for beaconing_evidence query_purpose.unknown
MicrosoftATP.HuntProcessDetails.Result.powershell_execution_unsigned_filesThe query results for powershell_execution_unsigned_files query_purpose.unknown
MicrosoftATP.HuntProcessDetails.Result.process_excecution_powershellThe query results for process_excecution_powershell query_purpose.unknown
MicrosoftATP.FileMachine.MachinesThe Query results for getting a collection of machines with a given file SHA1 hash.unknown
MicrosoftATP.FileMachine.Machines.IDThe machine ID.unknown
MicrosoftATP.FileMachine.Machines.ComputerDNSNameThe machine DNS name.unknown
MicrosoftATP.FileMachine.Machines.FirstSeenThe first date and time the machine was observed by Microsoft Defender ATP.unknown
MicrosoftATP.FileMachine.Machines.LastSeenThe last date and time the machine was observed by Microsoft Defender ATP.unknown
MicrosoftATP.FileMachine.Machines.OSPlatformThe operating system platform.unknown
MicrosoftATP.FileMachine.Machines.OSVersionThe operating system version.unknown
MicrosoftATP.FileMachine.Machines.OSBuildOperating system build number.unknown
MicrosoftATP.FileMachine.Machines.LastIPAddressThe last IP on the machine.unknown
MicrosoftATP.FileMachine.Machines.LastExternalIPAddressThe last machine IP to access the internet.unknown
MicrosoftATP.FileMachine.Machines.HelathStatusThe machine health status.unknown
MicrosoftATP.FileMachine.Machines.RBACGroupIDThe machine RBAC group ID.unknown
MicrosoftATP.FileMachine.Machines.RBACGroupNameThe machine RBAC group name.unknown
MicrosoftATP.FileMachine.Machines.RiskScoreThe machine risk score.unknown
MicrosoftATP.FileMachine.Machines.ExposureLevelThe machine exposure score.unknown
MicrosoftATP.FileMachine.Machines.IsAADJoinedTrue if machine is AAD joined, False otherwise.unknown
MicrosoftATP.FileMachine.Machines.AADDeviceIDThe AAD Device ID.unknown
MicrosoftATP.FileMachine.Machines.MachineTagsSet of machine tags.unknown
MicrosoftATP.MachineResults for device information.unknown
MicrosoftATP.Machine.OSProcessorThe operating system processor.unknown
MicrosoftATP.FileMachineResults for File information on a device.unknown
MicrosoftATP.FileMachine.FileThe machine related file hash.unknown
MicrosoftATP.HuntNetworkConnections.ResultThe query results for Hunt Network Connections.unknown
MicrosoftATP.HuntNetworkConnections.Result.external_addressesThe query results for external_addresses query_purpose.unknown
MicrosoftATP.HuntNetworkConnections.Result.dns_queryThe query results for dns_query query_purpose.unknown
MicrosoftATP.HuntNetworkConnections.Result.encoded_commandsThe query results for encoded_commands query_purpose.unknown
MatchRegexThe regex found in the command lineunknown
IndicatorsIndicators extracted from the command lineunknown
commandlineThe command lineunknown
CommandlineVerdictThe command line verdictunknown

Playbook Image#


MDE - Host Advanced Hunting For Powershell Executions