LogScale · CQL

CQL Knowledge Base

Ready-to-use CQL queries for threat hunting, detection, and SOC triage. Copy, filter, and search in seconds.

151 queries8 categories
Powered bySofistic·created bydarkreitor
K
20 queries
NEW
FREE

Browser Spawns Scripting Interpreter — Fake Update Delivery Indicator

Detects when a web browser directly spawns a scripting interpreter such as PowerShell, cmd.exe, or wscript.exe. This execution chain does not occur during normal user activity and is the primary delivery mechanism used by SocGholish and FakeUpdates campaigns distributing ransomware and banking trojans through compromised websites presenting fake browser update prompts.

#repo="base_sensor" #event_simpleName=ProcessRollup2
| ParentBaseFileName=/(?i)(chrome\.exe|firefox\.exe|msedge\.exe|iexplore\.exe)/
| FileName=/(?i)(powershell\.exe|cmd\.exe|wscript\.exe|cscript\.exe|mshta\.exe)/
EDRfake-updatebrowser-spawn
Beginner
NEW
FREE

CMD.exe Inline APT Reconnaissance — Basic Detection

Detects cmd.exe executing common APT reconnaissance commands inline via the /C flag, including whoami, hostname, net user, net group, systeminfo, ipconfig /all, and nltest. A beginner-friendly detection rule aligned with APT3 T1059.003 tradecraft and suitable as a baseline for new analysts building their first Falcon detection queries.

#repo="base_sensor" #event_simpleName=ProcessRollup2
| FileName=/(?i)cmd\.exe/
| CommandLine=/(?i)\/[cC]\s+(whoami|hostname|net\s+(user|group|localgroup)|systeminfo|ipconfig\s*\/all|nltest|quser)/
EDRaptcmd-exe
Beginner
NEW
PAID

F5 BIG-IP APM Exploitation - Web Service Process Spawning Interactive Shell

Detects suspicious child process spawning from F5 BIG-IP web service and management plane processes, indicative of active exploitation of CVE-2025-53521 added to CISA KEV, where APM authentication bypass enables remote code execution through web shell deployment or command injection against the BIG-IP management interface

#repo="base_sensor" #event_simpleName=ProcessRollup2
| ParentBaseFileName=/(?i)(httpd|nginx|tmm|mcpd|restjavad|node)/
| FileName=/(?i)(bash|sh|python3?|perl|curl|wget|nc|ncat|socat|whoami|id|uname|ifconfig)/
Vulnerabilityf5-bigipcve-2025-53521
Intermediate
NEW
PAID

Fake Browser Update — Scripting Interpreter Spawned by Browser Process

Detects when Chrome, Firefox, or Edge spawns a scripting interpreter or proxy execution binary, the primary delivery mechanism in SocGholish and FakeUpdates campaigns. These campaigns distribute ransomware and banking malware families including IcedID, Dridex, and Cobalt Strike beacons via compromised or malicious websites serving fake update pages.

#repo="base_sensor" #event_simpleName=ProcessRollup2
| ParentBaseFileName=/(?i)(chrome\.exe|firefox\.exe|msedge\.exe|brave\.exe|opera\.exe)/
| FileName=/(?i)(powershell\.exe|cmd\.exe|wscript\.exe|cscript\.exe|mshta\.exe|regsvr32\.exe|rundll32\.exe|certutil\.exe|bitsadmin\.exe)/
Malwarefake-browser-updatesocgholish
Intermediate
NEW
PAID

IIS w3wp.exe Spawning LOLBins - ViewState Deserialization RCE Detection

Detects IIS Application Pool Worker Process (w3wp.exe) spawning Living-off-the-Land binaries and scripting engines, the primary execution chain for successful ViewState deserialization attacks such as CVE-2025-53690 in Sitecore where exposed ASP.NET machineKey values enable .NET object injection leading to unauthenticated remote code execution on internet-facing web applications

#repo="base_sensor" #event_simpleName=ProcessRollup2
| ParentBaseFileName=/(?i)(w3wp\.exe)/
| FileName=/(?i)(cmd\.exe|powershell\.exe|certutil\.exe|mshta\.exe|wscript\.exe|cscript\.exe|regsvr32\.exe|rundll32\.exe|msiexec\.exe|bitsadmin\.exe|curl\.exe|wget\.exe)/
Vulnerabilityiisviewstate
Intermediate
NEW
PAID

Play Ransomware ESXi Variant - Virtual Machine Shutdown Detection

Detects execution of ESXi-specific management binaries used by the Play ransomware ESXi variant to enumerate and forcibly power off virtual machines before encrypting VMDK files, behavior documented in the CISA StopRansomware advisory on Play ransomware targeting VMware ESXi infrastructure

#repo="base_sensor" #event_simpleName=ProcessRollup2
| FileName=/(?i)(esxcli|vim-cmd|esxcfg-scsidevs|vmkfstools)/
| CommandLine=/(?i)(vm\s+process\s+kill|vmsvc\/power\.off|vmsvc\/getallvms|storage\s+filesystem\s+list|vmfs\s+volume\s+list)/
Malwareplay-ransomwareesxi
Advanced
NEW
PAID

Multi-Stage Ransomware Kill Chain Correlation - Pre-Encryption Activity Clustering

Correlates multiple distinct ransomware preparation behaviors executed by the same user on the same host within a detection window, identifying the combination of VSS deletion, boot recovery disablement, and backup service termination that consistently precedes encryption in ALPHV, Play, LockBit, and Akira ransomware deployments observed in CrowdStrike IR investigations

#repo="base_sensor" #event_simpleName=ProcessRollup2
| FileName=/(?i)(vssadmin\.exe|bcdedit\.exe|wbadmin\.exe|wmic\.exe|sc\.exe|net\.exe|taskkill\.exe)/
| CommandLine=/(?i)(delete\s+shadows|recoveryenabled\s+no|shadowcopy.*delete|backup\s+delete|bootstatuspolicy\s+ignoreallfailures|stop\s+(vss|swprv|backup|SQLWriter|MSSQLServer|ReportServer)|\/im\s+(sql|backup|veeam|synology))/
Threat Huntingransomwarethreat-hunting
Advanced
NEW
PAID

Ransomware Pre-Encryption Stage — Shadow Copy and Recovery Inhibition

Detects execution of commands targeting Volume Shadow Copies and Windows recovery mechanisms, a universal pre-encryption step across virtually all ransomware families. Covers vssadmin delete shadows, wmic shadowcopy delete, bcdedit recoveryenabled no, wbadmin delete catalog, and cipher wipe. Early detection of this stage enables response before file encryption begins.

#repo="base_sensor" #event_simpleName=ProcessRollup2
| CommandLine=/(?i)(vssadmin.{0,60}delete|wmic.{0,60}shadowcopy.{0,30}delete|bcdedit.{0,60}(recoveryenabled.{0,10}no|bootstatuspolicy.{0,20}ignoreallfailures)|wbadmin.{0,60}delete.{0,30}catalog|cipher\s+\/w)/
| groupBy([ComputerName, UserName, FileName, CommandLine], function=[count(as=hit_count)])
Malwareransomwareshadow-copy
Intermediate
NEW
FREE

VSS Shadow Copy Deletion - Basic Ransomware Pre-Encryption Indicator

Detects deletion of Windows Volume Shadow Copies via vssadmin.exe or wmic.exe, the most universally performed ransomware preparation step executed by virtually all modern ransomware families including WannaCry, ALPHV, Play, LockBit, and Akira to eliminate local snapshot recovery options before encrypting files — essential beginner detection for any Windows endpoint monitoring program

#repo="base_sensor" #event_simpleName=ProcessRollup2
| FileName=/(?i)(vssadmin\.exe|wmic\.exe)/
| CommandLine=/(?i)(delete\s+shadows|shadowcopy.*delete)/
EDRshadow-copyvssadmin
Beginner
PAID

WMIC Abuse for APT Reconnaissance and Remote Execution

Detects anomalous wmic.exe usage with high-risk arguments typical of nation-state APT actors: remote process execution via /node:, Shadow Copy deletion, and system/network enumeration. Based on TTPs documented by Intel 471 for APT groups abusing WMI for stealthy operations that evade traditional security controls.

#repo="base_sensor" #event_simpleName=ProcessRollup2
| FileName=/(?i)wmic\.exe/
| CommandLine=/(?i)(process\s+call\s+create|\/node\s*:|shadowcopy\s+delete|os\s+get|nicconfig\s+get|computersystem\s+get|startup\s+list|product\s+get)/
Threat Huntingwmicwmi-abuse
Advanced
PAID

APT3 Reconnaissance Chain via cmd.exe

Detects reconnaissance command execution via cmd.exe with arguments typical of APT3 operators, excluding legitimate OS parent processes. Inspired by the APT3 TTP profile that abuses Windows Command Shell to run whoami, net, ipconfig, and systeminfo on compromised systems.

#repo="base_sensor" #event_simpleName=ProcessRollup2
| FileName=/(?i)cmd\.exe/
| CommandLine=/(?i)\/[cC]\s+(whoami|net\s+(user|group|localgroup)|hostname|ipconfig|systeminfo|tasklist|netstat)/
Threat Huntingapt3cmd-shell
Advanced
FREE

Basic Detection: cmd.exe Executing whoami (APT3 TTP)

Beginner-level query to detect cmd.exe executions invoking whoami — the first technique documented in the public APT3 profile per T1059.003 and T1033. Ideal for SOC analysts new to threat hunting with CQL who want to get familiar with basic Falcon LogScale syntax using FDR process events.

#repo="base_sensor" #event_simpleName=ProcessRollup2
| FileName=/(?i)cmd\.exe/
| CommandLine=/(?i)\/c\s+whoami/
EDRcmdwhoami
Beginner
PAID

Code Execution from Archive Tool (WinRAR/7-Zip Style CVE-2023-38831)

Detects command interpreter and script execution as direct child processes of archive applications. Technique similar to CVE-2023-38831 where user interaction with a malicious file triggers code execution through WinRAR, 7-Zip, or other archive utilities common in corporate environments.

#repo="base_sensor" #event_simpleName=ProcessRollup2
| ParentBaseFileName=/(?i)(winrar\.exe|7zfm\.exe|winzip32\.exe|peazip\.exe|bandizip\.exe)/
| FileName=/(?i)(cmd\.exe|powershell\.exe|wscript\.exe|cscript\.exe|mshta\.exe|rundll32\.exe|regsvr32\.exe|certutil\.exe)/
Malwarewinrararchive-exploitation
Intermediate
FREE

Archive Tool Shell Spawn - Code Execution via Compressed File

Detects when archive tools (WinRAR, 7-Zip, PeaZip, Bandizip, native Windows extractor) spawn command interpreters or loaders as a direct child process. High-fidelity pattern for detecting active 2025 archive exploitation vulnerabilities that execute hidden payloads when manipulated compressed files are opened.

#repo="base_sensor" #event_simpleName=ProcessRollup2
| ParentBaseFileName=/(?i)^(winrar\.exe|7z\.exe|7zfm\.exe|peazip\.exe|bandizip\.exe|zipfldr\.dll)$/
| FileName=/(?i)^(cmd\.exe|powershell\.exe|wscript\.exe|cscript\.exe|mshta\.exe|rundll32\.exe|regsvr32\.exe)$/
Malwarewinrararchive
Beginner
PAID

LOLBAS Process Spawned from Web Browser (Keitaro Malvertising)

Detects popular web browsers spawning child processes that are known LOLBAS binaries, a pattern consistent with Keitaro malvertising campaigns that infect users through malicious ads and phishing pages to deliver multi-stage malware. Covers Chrome, Edge, Firefox, Opera, Brave, and Vivaldi with exclusions for internal browser processes.

#repo="base_sensor" #event_simpleName=ProcessRollup2
| ParentBaseFileName=/(?i)(chrome\.exe|msedge\.exe|firefox\.exe|iexplore\.exe|opera\.exe|brave\.exe|vivaldi\.exe)/
| FileName=/(?i)(powershell\.exe|cmd\.exe|wscript\.exe|mshta\.exe|regsvr32\.exe|rundll32\.exe|certutil\.exe|bitsadmin\.exe|csc\.exe|installutil\.exe)/
Malwaremalvertisinglolbas
Advanced
FREE

CMD Discovery Recon - APT3 Basic Enumeration Detection

Detects native Windows enumeration tools invoked from cmd.exe, following the basic reconnaissance pattern documented in the APT3 TTP profile. Covers use of whoami, net, ipconfig, systeminfo, and other LOLBins utilities to map the environment after initial intrusion.

#repo="base_sensor" #event_simpleName=ProcessRollup2
| FileName=/(?i)^(whoami|hostname|ipconfig|systeminfo|net|arp|netstat|tasklist|quser)\.exe$/
| ParentBaseFileName=/(?i)^cmd\.exe$/
Threat Huntingdiscoverycmd
Beginner
PAID

Compromised Identity Multi-Host Lateral Movement via Admin Protocols

Detects potentially compromised identities performing lateral movement by identifying users with connections to multiple distinct hosts via remote administration protocols (SMB, RDP, WinRM, SSH). Inspired by CrowdStrike IR use of Falcon Identity Threat Protection to identify active hands-on-keyboard adversaries abusing valid credentials.

#repo="base_sensor" #event_simpleName=NetworkConnectIP4
| LocalPort=/^(445|3389|5985|5986|22)$/
| NOT RemoteAddressIP4=/^(127\.|169\.254\.)/
Identitylateral-movementidentity
Advanced
PAID

PowerShell LOTL with Base64-Encoded Payload (-EncodedCommand)

Detects PowerShell executions using the -EncodedCommand parameter to conceal the actual payload, a primary LOTL technique documented by CISA where adversaries abuse native PowerShell to evade signature-based detection. Critical for detecting post-initial infection stages in ransomware and APT campaigns that prefer LOTL over custom binaries.

#repo="base_sensor" #event_simpleName=ProcessRollup2
| FileName=/(?i)powershell(\.exe)?/
| CommandLine=/(?i)-[eE][nN][cC]\w*\s+[A-Za-z0-9+\/=]{50,}/
EDRpowershellencoded-command
Intermediate
PAID

Linux Sudo Privilege Escalation Pattern - CVE-2025-32463

Detects suspicious sudo binary invocations originating from command interpreters or network tools with privilege escalation flags. Covers the CVE-2025-32463 (CVSS 7.8) pattern that allows unauthorized escalation to root on Linux by manipulating the sudo command from illegitimate parent processes.

#repo="base_sensor" #event_simpleName=ProcessRollup2
| FileName=sudo
| CommandLine=/(?i)(-s\b|-i\b|--stdin|--shell|LD_PRELOAD=|SUDO_ASKPASS=|\/bin\/(ba)?sh)/
EDRprivilege-escalationsudo
Advanced
PAID

WinRAR/7-Zip Archive Exploitation - Child Executable Detection

Detects execution of binaries or scripts originating from archive tools (WinRAR, 7-Zip, unrar) outside legitimate system paths. Covers the pattern of active 2025 archive vulnerabilities similar to CVE-2023-38831 that allow code execution when interacting with socially-engineered manipulated compressed files.

#repo="base_sensor" #event_simpleName=ProcessRollup2
| ParentBaseFileName=/(?i)^(winrar\.exe|rar\.exe|unrar\.exe|7z\.exe|7zg\.exe|7zfm\.exe)$/
| ImageFileName=/(?i)\.(exe|dll|bat|cmd|ps1|vbs|js|wsf|hta|scr|com|pif|cpl)$/
Malwarewinrararchive
Intermediate