CQL Knowledge Base
Ready-to-use CQL queries for threat hunting, detection, and SOC triage. Copy, filter, and search in seconds.
AD Brute Force / Password Spray (NGSIEM)
Detects accounts with multiple authentication failures in Active Directory — indicator of brute force or password spray attacks.
AD Privileged Group Membership Change
Detects additions or removals to privileged Active Directory groups such as Domain Admins or Enterprise Admins.
AMSI Bypass Attempt
Detects AMSI bypass attempts via PowerShell reflection or string obfuscation techniques used to evade AV/EDR scanning.
Anomalous DNS Query Volume
Identifies hosts generating abnormally high DNS query volumes, a common indicator of DNS tunneling or C2 beaconing.
Azure NSG Rule Changes
Detects additions or modifications to Azure Network Security Group rules that may expose resources to the internet.
Brute Force / Password Spray
Detects accounts with more than 100 type-3 (network) logon failures in 24h — indicative of brute force or password spray.
Credential Dumping Tools
Detects execution of known credential dumping tools (Mimikatz, fgdump, gsecdump, pwdump) on Windows endpoints.
CSPM Policy Violations
Detects cloud security policy (CSPM) violations in Azure/GCP including public storage, missing encryption, and exposed management ports.
Data Staging via Archive Tools
Detects use of compression utilities (7z, rar, zip) to package large volumes of data — a pre-exfiltration staging indicator.
DCSync Attack Detected
Detects Directory Replication Service (DCSync) attempts used to extract password hashes from domain controllers without logging on.
DNS Exfiltration Indicators
Detects DNS queries with abnormally long subdomains (80+ chars) — indicator of DNS tunneling used for C2 or data exfiltration.
LSASS Memory Access
Detects direct access to LSASS process memory — a common technique for credential extraction via tools like Mimikatz or ProcDump.
Network Share Enumeration
Detects mass network share enumeration via net view, net share, or similar tools indicative of lateral movement preparation.
Pass-the-Hash / Overpass-the-Hash
Detects Pass-the-Hash techniques via sekurlsa, pth-winexe, Rubeus, or similar tools that abuse NTLM hashes for authentication.
PowerShell Download Cradle
Detects PowerShell downloading payloads via IEX, Invoke-WebRequest, Net.WebClient, or similar download cradle patterns.
PowerShell Encoded Commands
Detects PowerShell execution with Base64-encoded commands (-enc, -encodedcommand) commonly used to evade AV/EDR detection.
Process Injection Indicators
Detects process injection techniques and tools via command-line indicators (OpenProcess, WriteProcessMemory, CreateRemoteThread).
PsExec / Remote Service Execution
Detects PsExec and similar remote service execution tools used for lateral movement across Windows environments.
RDP Lateral Movement Burst
Detects multiple RDP sessions (logon type 10) from the same user to different hosts in a short window — lateral movement indicator.
Reconnaissance Commands Burst
Detects bursts of reconnaissance commands (whoami, net, ipconfig, systeminfo, nltest) from a single process — a post-exploitation indicator.
