<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic XQL query for hunting MS-DFSNM in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-query-for-hunting-ms-dfsnm/m-p/505523#M2254</link>
    <description>&lt;P&gt;Hello dear community,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;has anyone of you a XQL Query for this type of attack?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.bleepingcomputer.com/news/microsoft/new-dfscoerce-ntlm-relay-attack-allows-windows-domain-takeover/" target="_blank"&gt;https://www.bleepingcomputer.com/news/microsoft/new-dfscoerce-ntlm-relay-attack-allows-windows-domain-takeover/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BR&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rob&lt;/P&gt;</description>
    <pubDate>Wed, 22 Jun 2022 21:05:15 GMT</pubDate>
    <dc:creator>RFeyertag</dc:creator>
    <dc:date>2022-06-22T21:05:15Z</dc:date>
    <item>
      <title>XQL query for hunting MS-DFSNM</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-query-for-hunting-ms-dfsnm/m-p/505523#M2254</link>
      <description>&lt;P&gt;Hello dear community,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;has anyone of you a XQL Query for this type of attack?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.bleepingcomputer.com/news/microsoft/new-dfscoerce-ntlm-relay-attack-allows-windows-domain-takeover/" target="_blank"&gt;https://www.bleepingcomputer.com/news/microsoft/new-dfscoerce-ntlm-relay-attack-allows-windows-domain-takeover/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BR&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rob&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2022 21:05:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-query-for-hunting-ms-dfsnm/m-p/505523#M2254</guid>
      <dc:creator>RFeyertag</dc:creator>
      <dc:date>2022-06-22T21:05:15Z</dc:date>
    </item>
    <item>
      <title>Re: XQL query for hunting MS-DFSNM</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-query-for-hunting-ms-dfsnm/m-p/507083#M2303</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/190671"&gt;@RFeyertag&lt;/a&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for submitting the coverage request regarding DFSCoerce.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;At this time, our security engineers are working diligently to provide protection and coverage against the DFSCoerce NTLM Relay Attack for the Cortex XDR agent and Cortex XDR server. If you would like to receive direct notifications when advances in this coverage have been deployed or want a more immediate option for inquiries on future attack coverage, we highly recommend contacting our TAC team at &lt;A href="https://support.paloaltonetworks.com/" target="_blank"&gt;https://support.paloaltonetworks.com/&lt;/A&gt;. We can update you on the availability of Cortex XDR coverage in the LiveCommunity when it is available, however, that would be best effort and may involve some delay.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2022 13:11:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-query-for-hunting-ms-dfsnm/m-p/507083#M2303</guid>
      <dc:creator>mfakhouri</dc:creator>
      <dc:date>2022-06-29T13:11:02Z</dc:date>
    </item>
    <item>
      <title>Re: XQL query for hunting MS-DFSNM</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-query-for-hunting-ms-dfsnm/m-p/508677#M2351</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi &lt;/SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/190671" target="_blank"&gt;&lt;SPAN&gt;@RFeyertag&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;With the release of &lt;/SPAN&gt;&lt;SPAN&gt;Content Update 590-96665, a new XQL query has been provided for the DFSCoerce attack:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;dataset  = xdr_data 

| alter day = extract_time(_time, "DAY"), dfs_relay_server = json_extract_scalar(action_rpc_func_str_call_fields,"$.ServerName"), 

 dfs_root_share = json_extract_scalar(action_rpc_func_str_call_fields,"$.RootShare")

| filter event_type = 22 and action_rpc_interface_uuid = "{4FC742E0-4A10-11CF-8273-00AA004AE673}" and action_rpc_func_name  = "NetrDfsRemoveStdRoot" and action_rpc_func_opnum in (12, 13)

| fields actor_remote_ip, agent_hostname, agent_id, action_rpc_func_opnum, action_rpc_func_str_call_fields, action_rpc_func_name, actor_type, day, dfs_relay_server, dfs_root_share

| comp count_distinct(day) as day_count_dfrpc_src_dst_func by actor_type, action_rpc_func_name, action_rpc_func_opnum, agent_hostname, agent_id, actor_remote_ip, dfs_relay_server, dfs_root_share

| filter day_count_dfrpc_src_dst_func &amp;lt; 7&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Since the RPC functionality can be normal... this may require further tuning for your environment.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The client can see the remote actor under &lt;/SPAN&gt;&lt;STRONG&gt;actor_remote_ip&lt;/STRONG&gt;&lt;SPAN&gt; , the affected server under &lt;/SPAN&gt;&lt;STRONG&gt;agent_id&lt;/STRONG&gt;&lt;SPAN&gt; or &lt;/SPAN&gt;&lt;STRONG&gt;agent_hostname&lt;/STRONG&gt;&lt;SPAN&gt; , and the possible relay server extracted under &lt;/SPAN&gt;&lt;STRONG&gt;dfs_relay_server &lt;/STRONG&gt;&lt;SPAN&gt;in addition to other fields there that might help triage.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This is not guaranteed to be the attack, but will most likely show an unusual usage of DFS which can indicate a possible attack.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jul 2022 18:26:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-query-for-hunting-ms-dfsnm/m-p/508677#M2351</guid>
      <dc:creator>mfakhouri</dc:creator>
      <dc:date>2022-07-13T18:26:16Z</dc:date>
    </item>
  </channel>
</rss>

