<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Windows defender and calc abuse for dll sideloading in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/windows-defender-and-calc-abuse-for-dll-sideloading/m-p/510632#M2439</link>
    <description>&lt;P&gt;Hello dear community,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Has anyone build a xql query for this case:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.sentinelone.com/blog/living-off-windows-defender-lockbit-ransomware-sideloads-cobalt-strike-through-microsoft-security-tool/" target="_blank"&gt;https://www.sentinelone.com/blog/living-off-windows-defender-lockbit-ransomware-sideloads-cobalt-strike-through-microsoft-security-tool/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Should this help?&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-hunting-renamed-lolbins-process-execution/m-p/488807#M2019" target="_blank"&gt;https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-hunting-renamed-lolbins-process-execution/m-p/488807#M2019&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And how do we Set this two queries up?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BR&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rob&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 02 Aug 2022 21:48:18 GMT</pubDate>
    <dc:creator>Cyber1985</dc:creator>
    <dc:date>2022-08-02T21:48:18Z</dc:date>
    <item>
      <title>Windows defender and calc abuse for dll sideloading</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/windows-defender-and-calc-abuse-for-dll-sideloading/m-p/510632#M2439</link>
      <description>&lt;P&gt;Hello dear community,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Has anyone build a xql query for this case:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.sentinelone.com/blog/living-off-windows-defender-lockbit-ransomware-sideloads-cobalt-strike-through-microsoft-security-tool/" target="_blank"&gt;https://www.sentinelone.com/blog/living-off-windows-defender-lockbit-ransomware-sideloads-cobalt-strike-through-microsoft-security-tool/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Should this help?&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-hunting-renamed-lolbins-process-execution/m-p/488807#M2019" target="_blank"&gt;https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-hunting-renamed-lolbins-process-execution/m-p/488807#M2019&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And how do we Set this two queries up?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BR&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rob&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Aug 2022 21:48:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/windows-defender-and-calc-abuse-for-dll-sideloading/m-p/510632#M2439</guid>
      <dc:creator>Cyber1985</dc:creator>
      <dc:date>2022-08-02T21:48:18Z</dc:date>
    </item>
    <item>
      <title>Re: Windows defender and calc abuse for dll sideloading</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/windows-defender-and-calc-abuse-for-dll-sideloading/m-p/510701#M2445</link>
      <description>&lt;P&gt;Hi Cyber1985,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you have a Pro per Endpoint license then the Analytics Engine will identify this sort of thing for you, here are some relevant Analytics alerts that can fire:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href="https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-analytics-alert-reference/cortex-xdr-analytics-alert-reference/execution-of-renamed-lolbin" target="_self"&gt;Execution of a renamed LOLBIN&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-analytics-alert-reference/cortex-xdr-analytics-alert-reference/recurring-access-to-rare-ip" target="_self"&gt;Recurring access to a rare IP&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;&lt;A href="https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-analytics-alert-reference/cortex-xdr-analytics-alert-reference/powershell-runs-suspicious-base64-encoded-commands" target="_self"&gt;PowerShell runs suspicious base64 encoded command&lt;/A&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Each of these alerts will generate incidents if they fire within your tenant.&amp;nbsp; If you want to create your own XQL search you can go to Incident Response -&amp;gt; Query Builder -&amp;gt; XQL Search, here you can paste the query from the second article you linked and then you have the option to Run, Run in Background, Save or Schedule.&amp;nbsp; If you want this to generate alerts if data is returned, you can save it as a correlation rule and it will then be run periodically and can create incidents (depending on the severity you set, medium and high severity generate alerts).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you are a Prevent customer, then you do not have EDR data collection as a feature and will be unable to detect this sort of behavior.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Aug 2022 14:10:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/windows-defender-and-calc-abuse-for-dll-sideloading/m-p/510701#M2445</guid>
      <dc:creator>afurze</dc:creator>
      <dc:date>2022-08-03T14:10:30Z</dc:date>
    </item>
  </channel>
</rss>

