CQL Knowledge Base
Ready-to-use CQL queries for threat hunting, detection, and SOC triage. Copy, filter, and search in seconds.
Windows Living off the Land Multi-Tool Chain Detection
Detects chaining of multiple native Windows tools by the same user on the same host within a time window, a characteristic pattern of APT actors in the reconnaissance phase using LOTL techniques to evade security controls
Data Exfiltration via Native FTP or LOLBin Tools
Detects use of native Windows tools such as ftp.exe, bitsadmin.exe, and certutil.exe with parameters associated with file transfer and data encoding to external destinations. These LOLBin techniques are commonly used by threat actors to exfiltrate compromised data while evading perimeter security controls.
Shell Spawned from PHP Process - WordPress WebShell Detection
Detects shell or command interpreter processes spawned as children of PHP or web server processes, a basic indicator of webshell presence in WordPress or other PHP applications. Relevant given 6,700+ CVEs recorded in WordPress plugins and themes during H1 2025.
Basic PowerShell Base64 Encoded Command Detection
Beginner-level query to detect the use of Base64 encoding parameters in PowerShell (-EncodedCommand, -enc), a technique widely used by attackers to obfuscate malicious scripts and evade plain-text detection. Ideal starting point for EDR threat hunting
Ransomware Pre-Encryption Shadow Copy Deletion and Recovery Sabotage Detection
Detects VSS volume shadow copy deletion commands and boot recovery system disabling, standard behavior of modern ransomware prior to mass file encryption to prevent data recovery without paying the ransom
PEASS Privilege Escalation Tool Execution Detection
Identifies execution of WinPEAS and LinPEAS, automated privilege escalation audit tools widely used by attackers after initial compromise to map available escalation vectors on Windows and Linux systems
Chained WMIC Discovery with Dynamic Risk Scoring - APT Pattern
Detects chained use of wmic.exe to execute multiple system inventory queries (users, groups, services, patches, products) by the same actor on the same host. APT actors use WMIC for silent reconnaissance before lateral movement. The query assigns a dynamic risk level (LOW/MEDIUM/HIGH) and calculates total attack duration.
APT Hands-on-Keyboard Interactive Discovery Burst
Identifies APT operators with interactive access by detecting rapid successive execution of multiple native Windows reconnaissance tools by the same user on the same host within a short time window, typical pattern of manual post-exploitation phases
Basic APT Reconnaissance Tools Detection with Domain Discovery Arguments
Introductory query for analysts learning threat hunting in CrowdStrike LogScale. Detects execution of classic APT reconnaissance tools (whoami, nltest, systeminfo) with specific domain and Active Directory discovery arguments, fundamental technique documented in APT TTP profiles.
APT3 Interactive CMD Shell Reconnaissance Chain Detection
Detects chained execution of native Windows reconnaissance tools through cmd.exe by the same user on the same host, characteristic pattern of APT3 executing remote discovery commands via Windows Command Shell. Triggers when 3 or more tools are executed in the same user session.
Anomalous Child Process from IIS Worker: ViewState Deserialization Exploitation
Detects anomalous child processes spawned from w3wp.exe (IIS worker process), primary exploitation vector in CVE-2025-53690 and other .NET deserialization vulnerabilities in ASP.NET applications. Shell or tool execution from w3wp.exe is highly suspicious in production environments.
Linux Sudo Misconfiguration Exploitation for Privilege Escalation
Detects exploitation attempts of insecure sudo configurations on Linux hosts, including use of dangerous environment variables (LD_PRELOAD, LD_LIBRARY_PATH) and execution of shells or commands with unexpected root context
Windows LOLBAS Multi-Stage Privilege Escalation Chain
Detects chained abuse of native Windows binaries (LOLBAS) used to download, decode, or execute payloads in privilege escalation contexts, a common pattern among APT actors avoiding detectable tooling
Basic Detection of PowerShell Encoded Command Execution
Beginner-level query to detect PowerShell executions with base64 encoding or profile suppression parameters, a fundamental technique used by attackers to obfuscate malicious scripts in Windows environments
Scheduled Task Persistence with Suspicious Script Interpreter Payload
Detects scheduled task creation invoking script interpreters or LOLBAS tools (PowerShell, WScript, CertUtil, MSHTA, Rundll32), critical persistence technique found in Falcon IR investigations even on apparently clean hosts after initial triage.
Shell Spawned by Web Interpreter: RCE Post-Exploitation Pattern
Detects RCE post-exploitation patterns on web servers by identifying command shells or discovery tools spawned by web interpreters (PHP, Python, Java, Node.js), active exploitation vector in CVE-2025-0520 (ShowDoc) and similar remote code execution vulnerabilities.
Basic Windows Token Privilege Enumeration via whoami
Introductory query to detect whoami.exe usage with privilege and group enumeration parameters, the typical first step of an attacker after gaining initial access to understand the privilege level available on the compromised host
APT WMIC Enumeration: Multiple System Discovery Queries in Same Session
Detects WMIC usage for multiple system enumeration queries within the same user session, documented technique in APT campaigns for asset inventory prior to lateral movement. Differentiates legitimate admins from adversarial operators by query volume and type.
APT Lateral Movement via WMIC with Explicit Remote Node Targeting
Identifies wmic.exe usage with /node: parameter targeting remote hosts other than localhost, a documented APT3 technique for remote command execution and system information gathering in compromised networks
Malicious Child Process from Office Application — APT3 Spear-Phishing Pattern
Detects the execution of command interpreters and download tools as child processes of Office and Acrobat applications, an initial access pattern documented in the APT3 profile via spear-phishing with malicious documents that execute macros or embedded exploits to deploy second-stage payloads.
