CQL Knowledge Base
Ready-to-use CQL queries for threat hunting, detection, and SOC triage. Copy, filter, and search in seconds.
Persistence via Scheduled Tasks with Privilege Escalation
Detects the creation of scheduled tasks with privilege elevation flags, a technique documented in LotL attacks where adversaries combine schtasks with token manipulation to maintain persistence with elevated privileges
Linux Privilege Escalation via Sudo - CVE-2025-32463 Pattern
Detects privilege escalation attempts on Linux systems via sudo manipulation, inspired by CVE-2025-32463 which allows unauthorized elevation to root by tricking the sudo command (CVSS 7.8)
Suspicious Child Processes Spawned from WinRAR
Detects when WinRAR spawns child processes that are command interpreters or known LOLBin binaries, a pattern of archive file vulnerability exploitation similar to CVE-2023-38831 and new WinRAR exploitation variants documented in the Kaspersky Securelist Q2 2025 vulnerability analysis
Bulk WMIC Enumeration for System Discovery
Detects multiple WMIC queries executed by the same user on a host, covering enumeration of processes, operating system, accounts, services, and patches — a typical pattern of APT operators performing system discovery as described in APT hunting analysis and the distinction between legitimate IT use vs malicious activity
Remote Reconnaissance via WMIC Living-off-the-Land
Detects the use of WMIC for remote command execution and inventory queries on remote hosts, a key Living-off-the-Land technique used by APTs after exploiting perimeter devices such as FortiGate according to Cynet 2025 reports
APT Hands-on-Keyboard Multi-Tool Reconnaissance Sequence
Detects the execution of multiple native Windows discovery tools by the same user on the same host, a distinctive pattern of APT operators with interactive access identified in CrowdStrike IR investigations with Falcon Identity Threat Protection
APT Office/PDF Document Spawning Shell with C2 Callback (APT3 / Spear-Phishing)
Detects Office or PDF documents spawning shell processes with a CommandLine indicating payload download or C2 callback, a core pattern in APT3 and advanced actor spear-phishing campaigns leveraging initial access TTPs via email
Lateral Movement via Compromised Identity (Network Logon Multi-Host)
Detects users authenticating over the network to multiple distinct hosts from the same source IP, a characteristic pattern of lateral movement with compromised credentials in APT hands-on-keyboard operations as described in CrowdStrike IR scenarios
Browser Spawning LOLBin with Download Indicator (Keitaro Malvertising Chain)
Detects web browsers spawning LOLBins with hidden download or encoded execution indicators in CommandLine, a drive-by exploitation pattern via malvertising or malicious extensions such as the Keitaro mass malware distribution campaign
SmarterMail RCE Post-Exploitation (CVE-2025-52691 CVSS 10)
Detects shells or LOLBins spawned by SmarterMail server processes, indicative of active exploitation of CVE-2025-52691 (pre-authentication RCE CVSS 10) on build 9406 and earlier
Post-Compromise LDAP Reconnaissance in Active Directory (FDR)
Detects aggressive Active Directory enumeration via LDAP/LDAPS connections from non-standard processes, a common technique after initial compromise in domain-joined environments per the LOTL model of hands-on-keyboard adversaries
Native Windows Tools with External Internet Connections (FDR)
Detects connections to external IPs (non-RFC1918) originating from native Windows administration and scripting tools, a basic LOTL pattern for payload download or C2 communication
LOLBins Abuse: Living Off the Land Execution Chain (FDR)
Detects the abuse of legitimate Windows binaries (LOLBins) used by attackers to execute malicious code without external tools, a common LOTL technique in advanced intrusions
PowerShell with Base64-Encoded Commands (FDR)
Detects PowerShell executions using the EncodedCommand parameter, a basic LOTL technique used to obfuscate malicious payloads and evade command-line detection
UAC Bypass via Trusted Windows Binaries (FDR)
Detects UAC bypass techniques via unexpected child processes spawned by trusted Windows binaries such as fodhelper, eventvwr, sdclt, and wsreset, used by LOTL attackers for privilege escalation
WSUS Abuse for Lateral Movement and RCE (FDR)
Detects anomalous use of wuauclt and WSUS-related processes pointing to non-Microsoft servers, indicative of CVE-2025-59287 exploitation or WSUS hijacking techniques for lateral movement
Web/VPN Server Spawning Shell (Fortinet CVE-2025)
Detects web server or VPN processes spawning shells or command interpreters, indicative of active RCE exploitation such as CVE-2025-59718/CVE-2025-59719 on internet-facing Fortinet devices
DNS Tunneling Detection
Identifies potential DNS tunneling by detecting unusually long DNS query names or high query frequency to a single domain.
Failed Authentication Spike
Detects brute-force attempts by counting authentication failures per user and source IP within a time window.
Lateral Movement via SMB
Detects lateral movement using SMB protocol by correlating process events with network connections on port 445.
