<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>CQL Knowledge Base - Latest Queries</title>
    <link>https://huntbase.darkreitor.xyz</link>
    <description>Free LogScale (CQL) detection queries for threat hunting and SOC operations</description>
    <language>en</language>
    <atom:link href="https://huntbase.darkreitor.xyz/rss.xml" rel="self" type="application/rss+xml"/>
    <item>
      <title><![CDATA[Web Browser Spawning a Command Interpreter Process]]></title>
      <description><![CDATA[Detects when a web browser process directly spawns a command interpreter or scripting engine. Highly anomalous behavior associated with browser exploitation, advanced social engineering, or drive-by download attacks.]]></description>
      <link>https://huntbase.darkreitor.xyz/queries/browser-spawns-cmd-shell-b1</link>
      <guid isPermaLink="true">https://huntbase.darkreitor.xyz/queries/browser-spawns-cmd-shell-b1</guid>
      <pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate>
      <category>EDR</category>
    </item>
    <item>
      <title><![CDATA[PowerShell Remote Download Cradle Detection]]></title>
      <description><![CDATA[Identifies PowerShell executions containing typical remote download patterns (IEX, Net.WebClient, BitsTransfer), techniques used in early APT compromise stages to download and execute in-memory payloads without touching disk.]]></description>
      <link>https://huntbase.darkreitor.xyz/queries/powershell-download-cradle-b1</link>
      <guid isPermaLink="true">https://huntbase.darkreitor.xyz/queries/powershell-download-cradle-b1</guid>
      <pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate>
      <category>EDR</category>
    </item>
    <item>
      <title><![CDATA[Basic Detection: Child Processes Spawned by WMI Provider Host]]></title>
      <description><![CDATA[Basic query to detect any process spawned by WmiPrvSE.exe. Unexpected child process generation from the WMI Provider Host may indicate remote command execution or persistence. Ideal for SOC analysts starting with threat hunting in CrowdStrike Falcon.]]></description>
      <link>https://huntbase.darkreitor.xyz/queries/wmi-provider-host-child-spawn-b2</link>
      <guid isPermaLink="true">https://huntbase.darkreitor.xyz/queries/wmi-provider-host-child-spawn-b2</guid>
      <pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate>
      <category>EDR</category>
    </item>
    <item>
      <title><![CDATA[Data Exfiltration via Native FTP or LOLBin Tools]]></title>
      <description><![CDATA[Detects use of native Windows tools such as ftp.exe, bitsadmin.exe, and certutil.exe with parameters associated with file transfer and data encoding to external destinations. These LOLBin techniques are commonly used by threat actors to exfiltrate compromised data while evading perimeter security controls.]]></description>
      <link>https://huntbase.darkreitor.xyz/queries/native-lolbin-ftp-exfil-b1</link>
      <guid isPermaLink="true">https://huntbase.darkreitor.xyz/queries/native-lolbin-ftp-exfil-b1</guid>
      <pubDate>Sat, 18 Apr 2026 00:00:00 GMT</pubDate>
      <category>EDR</category>
    </item>
    <item>
      <title><![CDATA[Shell Spawned from PHP Process - WordPress WebShell Detection]]></title>
      <description><![CDATA[Detects shell or command interpreter processes spawned as children of PHP or web server processes, a basic indicator of webshell presence in WordPress or other PHP applications. Relevant given 6,700+ CVEs recorded in WordPress plugins and themes during H1 2025.]]></description>
      <link>https://huntbase.darkreitor.xyz/queries/php-webshell-process-spawn-b1</link>
      <guid isPermaLink="true">https://huntbase.darkreitor.xyz/queries/php-webshell-process-spawn-b1</guid>
      <pubDate>Sat, 18 Apr 2026 00:00:00 GMT</pubDate>
      <category>Malware</category>
    </item>
    <item>
      <title><![CDATA[Basic PowerShell Base64 Encoded Command Detection]]></title>
      <description><![CDATA[Beginner-level query to detect the use of Base64 encoding parameters in PowerShell (-EncodedCommand, -enc), a technique widely used by attackers to obfuscate malicious scripts and evade plain-text detection. Ideal starting point for EDR threat hunting]]></description>
      <link>https://huntbase.darkreitor.xyz/queries/powershell-encoded-command-baseline-b2</link>
      <guid isPermaLink="true">https://huntbase.darkreitor.xyz/queries/powershell-encoded-command-baseline-b2</guid>
      <pubDate>Sat, 18 Apr 2026 00:00:00 GMT</pubDate>
      <category>EDR</category>
    </item>
    <item>
      <title><![CDATA[Basic APT Reconnaissance Tools Detection with Domain Discovery Arguments]]></title>
      <description><![CDATA[Introductory query for analysts learning threat hunting in CrowdStrike LogScale. Detects execution of classic APT reconnaissance tools (whoami, nltest, systeminfo) with specific domain and Active Directory discovery arguments, fundamental technique documented in APT TTP profiles.]]></description>
      <link>https://huntbase.darkreitor.xyz/queries/apt-recon-tools-domain-discovery-b2</link>
      <guid isPermaLink="true">https://huntbase.darkreitor.xyz/queries/apt-recon-tools-domain-discovery-b2</guid>
      <pubDate>Fri, 17 Apr 2026 00:00:00 GMT</pubDate>
      <category>EDR</category>
    </item>
    <item>
      <title><![CDATA[Basic Detection of PowerShell Encoded Command Execution]]></title>
      <description><![CDATA[Beginner-level query to detect PowerShell executions with base64 encoding or profile suppression parameters, a fundamental technique used by attackers to obfuscate malicious scripts in Windows environments]]></description>
      <link>https://huntbase.darkreitor.xyz/queries/powershell-encoded-command-basic-detect-b1</link>
      <guid isPermaLink="true">https://huntbase.darkreitor.xyz/queries/powershell-encoded-command-basic-detect-b1</guid>
      <pubDate>Fri, 17 Apr 2026 00:00:00 GMT</pubDate>
      <category>EDR</category>
    </item>
    <item>
      <title><![CDATA[Basic Windows Token Privilege Enumeration via whoami]]></title>
      <description><![CDATA[Introductory query to detect whoami.exe usage with privilege and group enumeration parameters, the typical first step of an attacker after gaining initial access to understand the privilege level available on the compromised host]]></description>
      <link>https://huntbase.darkreitor.xyz/queries/whoami-priv-token-enum-basic-b1</link>
      <guid isPermaLink="true">https://huntbase.darkreitor.xyz/queries/whoami-priv-token-enum-basic-b1</guid>
      <pubDate>Fri, 17 Apr 2026 00:00:00 GMT</pubDate>
      <category>EDR</category>
    </item>
    <item>
      <title><![CDATA[Registry Run Key Modification for Persistence]]></title>
      <description><![CDATA[Detects writes to Windows Run, RunOnce, and Winlogon registry keys, the most widely used persistence mechanism employed by malware to execute automatically at system startup. Essential for basic post-compromise triage during Incident Response to identify residual persistence artifacts per CrowdStrike best practices.]]></description>
      <link>https://huntbase.darkreitor.xyz/queries/registry-run-key-persistence-modification-b1</link>
      <guid isPermaLink="true">https://huntbase.darkreitor.xyz/queries/registry-run-key-persistence-modification-b1</guid>
      <pubDate>Thu, 16 Apr 2026 00:00:00 GMT</pubDate>
      <category>Persistence</category>
    </item>
    <item>
      <title><![CDATA[Scheduled Task Creation with schtasks.exe for Persistence]]></title>
      <description><![CDATA[Detects the use of schtasks.exe to create or modify scheduled tasks, a basic persistence mechanism widely used by malware and attackers to maintain access across system reboots. Essential for basic host triage during Incident Response to identify residual persistence artifacts on compromised endpoints.]]></description>
      <link>https://huntbase.darkreitor.xyz/queries/scheduled-task-persistence-schtasks-b1</link>
      <guid isPermaLink="true">https://huntbase.darkreitor.xyz/queries/scheduled-task-persistence-schtasks-b1</guid>
      <pubDate>Thu, 16 Apr 2026 00:00:00 GMT</pubDate>
      <category>Persistence</category>
    </item>
    <item>
      <title><![CDATA[Executable Launched from Windows Temp Directory]]></title>
      <description><![CDATA[Detects processes executing from Windows temporary directories — a common indicator of malware droppers, ransomware payload staging, and post-exploitation download-and-execute patterns. Beginner-friendly detection query for initial triage of suspicious execution paths, covering AppData Temp, Windows Temp, and root Temp locations]]></description>
      <link>https://huntbase.darkreitor.xyz/queries/executable-from-temp-directory-b1</link>
      <guid isPermaLink="true">https://huntbase.darkreitor.xyz/queries/executable-from-temp-directory-b1</guid>
      <pubDate>Wed, 15 Apr 2026 00:00:00 GMT</pubDate>
      <category>Malware</category>
    </item>
    <item>
      <title><![CDATA[Basic Detection: PowerShell Executed with EncodedCommand Parameter]]></title>
      <description><![CDATA[Fundamental detection query that identifies PowerShell executions with the -EncodedCommand parameter or its abbreviation -enc. A basic but consistent indicator of malicious obfuscation present in most modern ransomware campaigns (LeakNet/ClickFix) and in post-exploitation stages of critical 2025 vulnerabilities. Ideal as a first query for analysts new to CrowdStrike LogScale.]]></description>
      <link>https://huntbase.darkreitor.xyz/queries/powershell-encoded-command-b2</link>
      <guid isPermaLink="true">https://huntbase.darkreitor.xyz/queries/powershell-encoded-command-b2</guid>
      <pubDate>Wed, 15 Apr 2026 00:00:00 GMT</pubDate>
      <category>EDR</category>
    </item>
    <item>
      <title><![CDATA[Whoami Execution by Any Parent Process]]></title>
      <description><![CDATA[Basic detection of whoami.exe execution across all endpoints — one of the most common post-compromise enumeration commands used by attackers to identify current user context after initial access. Ideal for beginner threat hunters and SOC analysts building a baseline of identity enumeration activity in LogScale]]></description>
      <link>https://huntbase.darkreitor.xyz/queries/whoami-execution-baseline-b1</link>
      <guid isPermaLink="true">https://huntbase.darkreitor.xyz/queries/whoami-execution-baseline-b1</guid>
      <pubDate>Wed, 15 Apr 2026 00:00:00 GMT</pubDate>
      <category>EDR</category>
    </item>
    <item>
      <title><![CDATA[Browser Spawns Scripting Interpreter — Fake Update Delivery Indicator]]></title>
      <description><![CDATA[Detects when a web browser directly spawns a scripting interpreter such as PowerShell, cmd.exe, or wscript.exe. This execution chain does not occur during normal user activity and is the primary delivery mechanism used by SocGholish and FakeUpdates campaigns distributing ransomware and banking trojans through compromised websites presenting fake browser update prompts.]]></description>
      <link>https://huntbase.darkreitor.xyz/queries/browser-spawns-interpreter-b1</link>
      <guid isPermaLink="true">https://huntbase.darkreitor.xyz/queries/browser-spawns-interpreter-b1</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <category>EDR</category>
    </item>
    <item>
      <title><![CDATA[CMD.exe Inline APT Reconnaissance — Basic Detection]]></title>
      <description><![CDATA[Detects cmd.exe executing common APT reconnaissance commands inline via the /C flag, including whoami, hostname, net user, net group, systeminfo, ipconfig /all, and nltest. A beginner-friendly detection rule aligned with APT3 T1059.003 tradecraft and suitable as a baseline for new analysts building their first Falcon detection queries.]]></description>
      <link>https://huntbase.darkreitor.xyz/queries/cmd-apt-recon-basic-b1</link>
      <guid isPermaLink="true">https://huntbase.darkreitor.xyz/queries/cmd-apt-recon-basic-b1</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <category>EDR</category>
    </item>
    <item>
      <title><![CDATA[VSS Shadow Copy Deletion - Basic Ransomware Pre-Encryption Indicator]]></title>
      <description><![CDATA[Detects deletion of Windows Volume Shadow Copies via vssadmin.exe or wmic.exe, the most universally performed ransomware preparation step executed by virtually all modern ransomware families including WannaCry, ALPHV, Play, LockBit, and Akira to eliminate local snapshot recovery options before encrypting files — essential beginner detection for any Windows endpoint monitoring program]]></description>
      <link>https://huntbase.darkreitor.xyz/queries/vssadmin-shadow-delete-basic-b2</link>
      <guid isPermaLink="true">https://huntbase.darkreitor.xyz/queries/vssadmin-shadow-delete-basic-b2</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
      <category>EDR</category>
    </item>
    <item>
      <title><![CDATA[Basic Detection: cmd.exe Executing whoami (APT3 TTP)]]></title>
      <description><![CDATA[Beginner-level query to detect cmd.exe executions invoking whoami — the first technique documented in the public APT3 profile per T1059.003 and T1033. Ideal for SOC analysts new to threat hunting with CQL who want to get familiar with basic Falcon LogScale syntax using FDR process events.]]></description>
      <link>https://huntbase.darkreitor.xyz/queries/apt3-cmd-whoami-basic-b2</link>
      <guid isPermaLink="true">https://huntbase.darkreitor.xyz/queries/apt3-cmd-whoami-basic-b2</guid>
      <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
      <category>EDR</category>
    </item>
    <item>
      <title><![CDATA[Archive Tool Shell Spawn - Code Execution via Compressed File]]></title>
      <description><![CDATA[Detects when archive tools (WinRAR, 7-Zip, PeaZip, Bandizip, native Windows extractor) spawn command interpreters or loaders as a direct child process. High-fidelity pattern for detecting active 2025 archive exploitation vulnerabilities that execute hidden payloads when manipulated compressed files are opened.]]></description>
      <link>https://huntbase.darkreitor.xyz/queries/archive-shell-spawn-detection-b1</link>
      <guid isPermaLink="true">https://huntbase.darkreitor.xyz/queries/archive-shell-spawn-detection-b1</guid>
      <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
      <category>Malware</category>
    </item>
    <item>
      <title><![CDATA[CMD Discovery Recon - APT3 Basic Enumeration Detection]]></title>
      <description><![CDATA[Detects native Windows enumeration tools invoked from cmd.exe, following the basic reconnaissance pattern documented in the APT3 TTP profile. Covers use of whoami, net, ipconfig, systeminfo, and other LOLBins utilities to map the environment after initial intrusion.]]></description>
      <link>https://huntbase.darkreitor.xyz/queries/cmd-basic-discovery-recon-b1</link>
      <guid isPermaLink="true">https://huntbase.darkreitor.xyz/queries/cmd-basic-discovery-recon-b1</guid>
      <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
      <category>Threat Hunting</category>
    </item>
    <item>
      <title><![CDATA[Basic Reconnaissance with Native Windows Tools]]></title>
      <description><![CDATA[Detects execution of common Windows reconnaissance commands such as whoami, ipconfig, net user, and systeminfo, frequently used in the initial phase of a Living Off the Land (LOTL) attack]]></description>
      <link>https://huntbase.darkreitor.xyz/queries/basic-lotl-reconnaissance-windows-b1</link>
      <guid isPermaLink="true">https://huntbase.darkreitor.xyz/queries/basic-lotl-reconnaissance-windows-b1</guid>
      <pubDate>Sun, 12 Apr 2026 00:00:00 GMT</pubDate>
      <category>EDR</category>
    </item>
    <item>
      <title><![CDATA[Windows Executables Making Suspicious Outbound Connections]]></title>
      <description><![CDATA[Basic query to detect Windows executables located in temporary or download directories establishing outbound network connections, useful for identifying newly downloaded malware contacting command and control servers]]></description>
      <link>https://huntbase.darkreitor.xyz/queries/basic-windows-executable-outbound-connections-b2</link>
      <guid isPermaLink="true">https://huntbase.darkreitor.xyz/queries/basic-windows-executable-outbound-connections-b2</guid>
      <pubDate>Sun, 12 Apr 2026 00:00:00 GMT</pubDate>
      <category>EDR</category>
    </item>
    <item>
      <title><![CDATA[Suspicious Access to Linux Shadow File]]></title>
      <description><![CDATA[Detects read attempts against the /etc/shadow file on Linux systems, a technique used by attackers to extract password hashes and perform offline cracking after gaining initial access to the system]]></description>
      <link>https://huntbase.darkreitor.xyz/queries/linux-shadow-file-access-detection-b1</link>
      <guid isPermaLink="true">https://huntbase.darkreitor.xyz/queries/linux-shadow-file-access-detection-b1</guid>
      <pubDate>Sun, 12 Apr 2026 00:00:00 GMT</pubDate>
      <category>EDR</category>
    </item>
    <item>
      <title><![CDATA[Basic Windows Net Command Enumeration]]></title>
      <description><![CDATA[Detects use of the net.exe command to enumerate users, groups, and shared resources, one of the most abused native Windows tools in Living-off-the-Land attacks according to multiple CISA and CrowdStrike reports]]></description>
      <link>https://huntbase.darkreitor.xyz/queries/basic-net-command-enumeration-b1</link>
      <guid isPermaLink="true">https://huntbase.darkreitor.xyz/queries/basic-net-command-enumeration-b1</guid>
      <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
      <category>EDR</category>
    </item>
    <item>
      <title><![CDATA[Basic PowerShell Encoded Command Detection]]></title>
      <description><![CDATA[Query for junior SOC analysts that detects PowerShell executions with the -EncodedCommand flag, a common LotL technique for obfuscating malicious commands and evading plaintext signature-based detections]]></description>
      <link>https://huntbase.darkreitor.xyz/queries/basic-powershell-encoded-command-b1</link>
      <guid isPermaLink="true">https://huntbase.darkreitor.xyz/queries/basic-powershell-encoded-command-b1</guid>
      <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
      <category>EDR</category>
    </item>
    <item>
      <title><![CDATA[Basic whoami.exe Execution Monitor]]></title>
      <description><![CDATA[Simple query to detect any whoami.exe execution on endpoints, a tool frequently used as the first command by attackers after gaining initial access to verify user context and privileges, referenced in multiple APT profiles including APT3 and APT28]]></description>
      <link>https://huntbase.darkreitor.xyz/queries/basic-whoami-execution-monitor-b2</link>
      <guid isPermaLink="true">https://huntbase.darkreitor.xyz/queries/basic-whoami-execution-monitor-b2</guid>
      <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
      <category>EDR</category>
    </item>
    <item>
      <title><![CDATA[Native Windows Tools with External Internet Connections (FDR)]]></title>
      <description><![CDATA[Detects connections to external IPs (non-RFC1918) originating from native Windows administration and scripting tools, a basic LOTL pattern for payload download or C2 communication]]></description>
      <link>https://huntbase.darkreitor.xyz/queries/sofistic-lolbin-external-network-connection-b1</link>
      <guid isPermaLink="true">https://huntbase.darkreitor.xyz/queries/sofistic-lolbin-external-network-connection-b1</guid>
      <pubDate>Tue, 07 Apr 2026 00:00:00 GMT</pubDate>
      <category>EDR</category>
    </item>
    <item>
      <title><![CDATA[PowerShell with Base64-Encoded Commands (FDR)]]></title>
      <description><![CDATA[Detects PowerShell executions using the EncodedCommand parameter, a basic LOTL technique used to obfuscate malicious payloads and evade command-line detection]]></description>
      <link>https://huntbase.darkreitor.xyz/queries/sofistic-powershell-encoded-command-b1</link>
      <guid isPermaLink="true">https://huntbase.darkreitor.xyz/queries/sofistic-powershell-encoded-command-b1</guid>
      <pubDate>Tue, 07 Apr 2026 00:00:00 GMT</pubDate>
      <category>EDR</category>
    </item>
    <item>
      <title><![CDATA[Web/VPN Server Spawning Shell (Fortinet CVE-2025)]]></title>
      <description><![CDATA[Detects web server or VPN processes spawning shells or command interpreters, indicative of active RCE exploitation such as CVE-2025-59718/CVE-2025-59719 on internet-facing Fortinet devices]]></description>
      <link>https://huntbase.darkreitor.xyz/queries/webserver-shell-spawn-rce-b2</link>
      <guid isPermaLink="true">https://huntbase.darkreitor.xyz/queries/webserver-shell-spawn-rce-b2</guid>
      <pubDate>Tue, 07 Apr 2026 00:00:00 GMT</pubDate>
      <category>Vulnerability</category>
    </item>
    <item>
      <title><![CDATA[Failed Authentication Spike]]></title>
      <description><![CDATA[Detects brute-force attempts by counting authentication failures per user and source IP within a time window.]]></description>
      <link>https://huntbase.darkreitor.xyz/queries/failed-auth-spike</link>
      <guid isPermaLink="true">https://huntbase.darkreitor.xyz/queries/failed-auth-spike</guid>
      
      <category>Identity</category>
    </item>
    <item>
      <title><![CDATA[CSPM Policy Violations]]></title>
      <description><![CDATA[Detects cloud security policy (CSPM) violations in Azure/GCP including public storage, missing encryption, and exposed management ports.]]></description>
      <link>https://huntbase.darkreitor.xyz/queries/sofistic-cspm-policy-violations</link>
      <guid isPermaLink="true">https://huntbase.darkreitor.xyz/queries/sofistic-cspm-policy-violations</guid>
      
      <category>Cloud</category>
    </item>
    <item>
      <title><![CDATA[Data Staging via Archive Tools]]></title>
      <description><![CDATA[Detects use of compression utilities (7z, rar, zip) to package large volumes of data — a pre-exfiltration staging indicator.]]></description>
      <link>https://huntbase.darkreitor.xyz/queries/sofistic-data-staging-archive-tools</link>
      <guid isPermaLink="true">https://huntbase.darkreitor.xyz/queries/sofistic-data-staging-archive-tools</guid>
      
      <category>EDR</category>
    </item>
    <item>
      <title><![CDATA[Network Share Enumeration]]></title>
      <description><![CDATA[Detects mass network share enumeration via net view, net share, or similar tools indicative of lateral movement preparation.]]></description>
      <link>https://huntbase.darkreitor.xyz/queries/sofistic-network-share-enumeration</link>
      <guid isPermaLink="true">https://huntbase.darkreitor.xyz/queries/sofistic-network-share-enumeration</guid>
      
      <category>Threat Hunting</category>
    </item>
    <item>
      <title><![CDATA[Reconnaissance Commands Burst]]></title>
      <description><![CDATA[Detects bursts of reconnaissance commands (whoami, net, ipconfig, systeminfo, nltest) from a single process — a post-exploitation indicator.]]></description>
      <link>https://huntbase.darkreitor.xyz/queries/sofistic-reconnaissance-commands-burst</link>
      <guid isPermaLink="true">https://huntbase.darkreitor.xyz/queries/sofistic-reconnaissance-commands-burst</guid>
      
      <category>Threat Hunting</category>
    </item>
    <item>
      <title><![CDATA[Timestomping Detection]]></title>
      <description><![CDATA[Detects file timestamp manipulation (timestomping) used as an anti-forensics technique to conceal malicious activity.]]></description>
      <link>https://huntbase.darkreitor.xyz/queries/sofistic-timestomping-detection</link>
      <guid isPermaLink="true">https://huntbase.darkreitor.xyz/queries/sofistic-timestomping-detection</guid>
      
      <category>EDR</category>
    </item>
  </channel>
</rss>