CQL Knowledge Base
Ready-to-use CQL queries for threat hunting, detection, and SOC triage. Copy, filter, and search in seconds.
Registry Run Key Modification
Detects modifications to Run/RunOnce registry keys commonly used by malware and threat actors for persistence.
Scheduled Task Creation
Detects new scheduled task creation used for persistence or lateral movement, especially by non-administrative users.
Script Execution from Temp/Downloads
Detects scripts executed from temporary or downloads directories — a common staging area for malicious payloads.
Security Tool Tampering
Detects attempts to disable Windows Defender, the firewall, or security services — often a pre-ransomware or persistence step.
Shadow Copy Deletion (Ransomware Indicator)
Detects Volume Shadow Copy deletion via vssadmin or wmic — a strong pre-ransomware indicator used to prevent recovery.
SSO Application Access Failures
Detects repeated SSO application access failures (GlobalProtect, AzureAD, Okta) that may indicate credential stuffing or account takeover.
Suspicious DLL Loading from Temp Dirs
Detects DLLs loaded from temporary or downloads directories — indicative of DLL side-loading or dropped payload execution.
Suspicious LOLBin Execution
Detects LOLBin executions with suspicious arguments (download, encode, decode, execute) used for defense evasion.
Suspicious Service Installation
Detects service installations with binaries in temporary or suspicious paths — indicative of malware persistence or lateral movement.
Timestomping Detection
Detects file timestamp manipulation (timestomping) used as an anti-forensics technique to conceal malicious activity.
WMI Remote Execution
Detects remote execution via WMI (wmic process call create, Invoke-WmiMethod) — a fileless lateral movement technique.
