<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://stage-community-sophos-comv11.telligenthosting.net/cfs-file/__key/system/syndication/atom.xsl" media="screen"?><feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-US"><title type="html">Announcements</title><subtitle type="html" /><id>https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/atom</id><link rel="alternate" type="text/html" href="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog" /><link rel="self" type="application/atom+xml" href="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/atom" /><generator uri="http://telligent.com" version="12.1.9.35025">Telligent Community (Build: 12.1.9.35025)</generator><updated>2020-05-23T12:18:00Z</updated><entry><title>New XDR Features EAP now open</title><link rel="alternate" type="text/html" href="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/xdr-detection-sensor-eap-now-open" /><id>https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/xdr-detection-sensor-eap-now-open</id><published>2022-08-14T17:14:00Z</published><updated>2022-08-14T17:14:00Z</updated><content type="html">Note:&amp;nbsp;Use of all features and functionalities provided under the Early Access Program is subject to the &lt;a href="https://www.sophos.com/en-us/legal/sophos-end-user-terms-of-use"&gt;Sophos End User Terms of Use&lt;/a&gt;.

We are excited to announce the opening of the New XDR Features Early Access Program (EAP).&amp;nbsp; This EAP will...(&lt;a href="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/xdr-detection-sensor-eap-now-open"&gt;read more&lt;/a&gt;)&lt;img src="https://stage-community-sophos-comv11.telligenthosting.net/aggbug?PostID=1198&amp;AppID=32&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</content><author><name>Kevin Kingston</name><uri>https://stage-community-sophos-comV11.telligenthosting.net/members/kevin-kingston</uri></author></entry><entry><title>HTTPS policy changes</title><link rel="alternate" type="text/html" href="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/https-policy-changes" /><id>https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/https-policy-changes</id><published>2021-12-03T15:53:00Z</published><updated>2021-12-03T15:53:00Z</updated><content type="html">Hi all,
This weekend we are making some policy changes relating to the SSL/TLS decryption of HTTPS websites. We will be adding a toggle for SSL/TLS decryption into the Threat Protection policy for all customers.

This new setting will determine if En...(&lt;a href="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/https-policy-changes"&gt;read more&lt;/a&gt;)&lt;img src="https://stage-community-sophos-comv11.telligenthosting.net/aggbug?PostID=1068&amp;AppID=32&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</content><author><name>StephenMcKay</name><uri>https://stage-community-sophos-comV11.telligenthosting.net/members/stephenmckay</uri></author></entry><entry><title>Intercept X updates in the Early Access Program</title><link rel="alternate" type="text/html" href="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/intercept-x-updates-in-the-early-access-program" /><id>https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/intercept-x-updates-in-the-early-access-program</id><published>2021-11-04T10:13:00Z</published><updated>2021-11-04T10:13:00Z</updated><content type="html">Hi all,
As you will have read in the &lt;a href="/intercept-x-endpoint/early-access-program/f/recommended-reads/130871/new-hmpa-version-3-8-3-release-to-eap-today"&gt;Recommended Read&lt;/a&gt;&amp;nbsp;from last week; we released an update to Intercept X, 2.0.23. This week we will start enabling new features that are part of the update for devices that are running in the New Endpoint/Server...(&lt;a href="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/intercept-x-updates-in-the-early-access-program"&gt;read more&lt;/a&gt;)&lt;img src="https://stage-community-sophos-comv11.telligenthosting.net/aggbug?PostID=1048&amp;AppID=32&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</content><author><name>StephenMcKay</name><uri>https://stage-community-sophos-comV11.telligenthosting.net/members/stephenmckay</uri></author></entry><entry><title>SSL/TLS decryption of HTTPS websites</title><link rel="alternate" type="text/html" href="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/ssl-tls-decryption-of-https-websites" /><id>https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/ssl-tls-decryption-of-https-websites</id><published>2021-10-15T09:17:00Z</published><updated>2021-10-15T09:17:00Z</updated><content type="html">Hi all,
HTTPS inspection&amp;nbsp;is being enabled by default for devices in the EAP now that the roll out has finished, (both Endpoint and Server).
When users visit websites via browsers the Sophos endpoint will decrypt HTTPS network traffic for the pur...(&lt;a href="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/ssl-tls-decryption-of-https-websites"&gt;read more&lt;/a&gt;)&lt;img src="https://stage-community-sophos-comv11.telligenthosting.net/aggbug?PostID=1035&amp;AppID=32&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</content><author><name>StephenMcKay</name><uri>https://stage-community-sophos-comV11.telligenthosting.net/members/stephenmckay</uri></author></entry><entry><title>XDR - Detection and Investigation Early Access Program</title><link rel="alternate" type="text/html" href="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/xdr---detection-and-investigation-early-access-program" /><id>https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/xdr---detection-and-investigation-early-access-program</id><published>2021-10-10T12:06:00Z</published><updated>2021-10-10T12:06:00Z</updated><content type="html">We are excited to announce the opening of the Detections and Investigations Early Access Program (EAP).&amp;nbsp; The EAP begins with the introduction of the Detections dashboard which provides a prioritized list of suspicious activity for further invest...(&lt;a href="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/xdr---detection-and-investigation-early-access-program"&gt;read more&lt;/a&gt;)&lt;img src="https://stage-community-sophos-comv11.telligenthosting.net/aggbug?PostID=1005&amp;AppID=32&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</content><author><name>Kevin Kingston</name><uri>https://stage-community-sophos-comV11.telligenthosting.net/members/kevin-kingston</uri></author></entry><entry><title>Important Changes to the Endpoint/Server Protection and EDR Features Early Access Program</title><link rel="alternate" type="text/html" href="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/important-changes-to-the-endpoint-server-protection-and-edr-features-early-access-program" /><id>https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/important-changes-to-the-endpoint-server-protection-and-edr-features-early-access-program</id><published>2021-06-11T08:44:00Z</published><updated>2021-06-11T08:44:00Z</updated><content type="html">Hi all,
We have some exciting changes coming to the Endpoint/Server Protection and EDR Features Early Access Program over the next few weeks. One of the biggest changes&amp;nbsp;is the decrypt and re-encrypt of HTTPS traffic between the browser and the w...(&lt;a href="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/important-changes-to-the-endpoint-server-protection-and-edr-features-early-access-program"&gt;read more&lt;/a&gt;)&lt;img src="https://stage-community-sophos-comv11.telligenthosting.net/aggbug?PostID=931&amp;AppID=32&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</content><author><name>StephenMcKay</name><uri>https://stage-community-sophos-comV11.telligenthosting.net/members/stephenmckay</uri></author><category term="Endpoint EAP" scheme="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/archive/tags/Endpoint%2bEAP" /><category term="Intercept X" scheme="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/archive/tags/Intercept%2bX" /><category term="Server EAP" scheme="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/archive/tags/Server%2bEAP" /></entry><entry><title>New Endpoint/Server Protection early access features now generally available</title><link rel="alternate" type="text/html" href="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/new-endpoint-server-protection-early-access-features-now-generally-available" /><id>https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/new-endpoint-server-protection-early-access-features-now-generally-available</id><published>2021-01-01T14:01:00Z</published><updated>2021-01-01T14:01:00Z</updated><content type="html">This blog post contains a listing and details on features that have previously been released to the&amp;nbsp;New Endpoint/Server Protection Features early access program and are now generally available to all customers.


19/08/2020 - IPS for Windows Ser...(&lt;a href="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/new-endpoint-server-protection-early-access-features-now-generally-available"&gt;read more&lt;/a&gt;)&lt;img src="https://stage-community-sophos-comv11.telligenthosting.net/aggbug?PostID=1038&amp;AppID=32&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</content><author><name>Kevin Kingston</name><uri>https://stage-community-sophos-comV11.telligenthosting.net/members/kevin-kingston</uri></author></entry><entry><title>License changes to New Endpoint and Server Protection and EDR Features early access programs</title><link rel="alternate" type="text/html" href="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/license-changes-to-new-endpoint-and-server-protection-and-edr-features-early-access-programs" /><id>https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/license-changes-to-new-endpoint-and-server-protection-and-edr-features-early-access-programs</id><published>2020-10-23T15:12:00Z</published><updated>2020-10-23T15:12:00Z</updated><content type="html">With having completed the early access testing on our new EDRv3 capabilities and with the upcoming features that will be entering the New Endpoint and Server Protection and EDR Features early access program being more protection rather than EDR relat...(&lt;a href="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/license-changes-to-new-endpoint-and-server-protection-and-edr-features-early-access-programs"&gt;read more&lt;/a&gt;)&lt;img src="https://stage-community-sophos-comv11.telligenthosting.net/aggbug?PostID=750&amp;AppID=32&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</content><author><name>Kevin Kingston</name><uri>https://stage-community-sophos-comV11.telligenthosting.net/members/kevin-kingston</uri></author></entry><entry><title>Notice for next EAP update</title><link rel="alternate" type="text/html" href="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/notice-for-next-eap-update" /><id>https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/notice-for-next-eap-update</id><published>2020-09-15T09:39:00Z</published><updated>2020-09-15T09:39:00Z</updated><content type="html">Hello all,
We are due to update our EAP agent during the week of 21st September; this update has some small fixes in it and will allow us to start enabling IPS and our new behavioral engine.&amp;nbsp;
Note: After this update you need to reboot devices to...(&lt;a href="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/notice-for-next-eap-update"&gt;read more&lt;/a&gt;)&lt;img src="https://stage-community-sophos-comv11.telligenthosting.net/aggbug?PostID=720&amp;AppID=32&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</content><author><name>StephenMcKay</name><uri>https://stage-community-sophos-comV11.telligenthosting.net/members/stephenmckay</uri></author><category term="EAP" scheme="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/archive/tags/EAP" /><category term="Endpoint EAP" scheme="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/archive/tags/Endpoint%2bEAP" /><category term="featured" scheme="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/archive/tags/featured" /></entry><entry><title>Exploring Windows Events and Security groups  with Live Discover</title><link rel="alternate" type="text/html" href="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/exploring-security-groups-with-live-discover" /><id>https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/exploring-security-groups-with-live-discover</id><published>2020-07-06T18:43:00Z</published><updated>2020-07-06T18:43:00Z</updated><content type="html">&lt;p&gt;&lt;span&gt;For query assistance, please see the following&amp;nbsp;&lt;/span&gt;&lt;a href="/intercept-x-endpoint/f/recommended-reads/128529/best-practices-on-using-live-discover-response-query-forum#mcetoc_1f8ovtfbt4"&gt;Best Practices&lt;/a&gt;&lt;span&gt;&amp;nbsp;guide&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The Sophos UK Sales engineering team has been getting familiar with live discover. In the work they explored group policy and provided the following queries:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Deleted security groups&lt;/strong&gt; -&lt;/p&gt;
&lt;p&gt;Variable to specify the number of days to check&lt;br /&gt;Windows&lt;/p&gt;
&lt;p&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;/* Deleted Security Groups */&lt;br /&gt;SELECT&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;source, &lt;br /&gt;&amp;nbsp; &amp;nbsp;eventid,&amp;nbsp;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;CAST(datetime(time, &amp;#39;unixepoch&amp;#39;) AS TEXT) AS &amp;#39;Change Made&amp;#39;,&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;JSON_EXTRACT(data, &amp;#39;$.EventData.SubjectUserName&amp;#39;) AS &amp;#39;Who Made The Change&amp;#39;,&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;JSON_EXTRACT(data, &amp;#39;$.EventData.TargetUserName&amp;#39;) AS &amp;#39;Deleted Groups&amp;#39;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;FROM sophos_windows_events&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;WHERE time &amp;gt; STRFTIME(&amp;#39;%s&amp;#39;,&amp;#39;NOW&amp;#39;,&amp;#39;-$$Number of days to check$$ DAYS&amp;#39;)&amp;nbsp;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;AND &lt;br /&gt;&amp;nbsp; &amp;nbsp;source = &amp;#39;Security&amp;#39;&amp;nbsp;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;AND eventid IN(&amp;#39;4730&amp;#39;, &amp;#39;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;4734&amp;#39;, &amp;#39;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;4758&amp;#39;);&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-family:tahoma, arial, helvetica, sans-serif;"&gt;&lt;strong&gt;Locked Accounts&amp;nbsp;&amp;nbsp;-&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Variable to specify the number of days to check&lt;br /&gt;Windows&lt;/p&gt;
&lt;p&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;/* Locked Accounts */&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;SELECT&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;source, &lt;br /&gt;&amp;nbsp; &amp;nbsp;eventid,&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;CAST(datetime(time, &amp;#39;unixepoch&amp;#39;) AS TEXT) AS &amp;#39;Change Made&amp;#39;,&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;JSON_EXTRACT(data, &amp;#39;$.EventData.SubjectUserName&amp;#39;) AS &amp;#39;Who Made The Change&amp;#39;,&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;JSON_EXTRACT(data, &amp;#39;$.EventData.TargetUserName&amp;#39;) AS &amp;#39;Locked Account&amp;#39;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;FROM sophos_windows_events&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;WHERE time &amp;gt; STRFTIME(&amp;#39;%s&amp;#39;,&amp;#39;NOW&amp;#39;,&amp;#39;-$$Number of days to check$$ DAYS&amp;#39;)&amp;nbsp;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;AND source = &amp;#39;Security&amp;#39;&amp;nbsp;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;AND eventid = 4740;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;New Security Groups&amp;nbsp; -&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Variable to specify the number of days to check&lt;br /&gt;Windows&lt;/p&gt;
&lt;p&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;SELECT&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;source, &lt;br /&gt;&amp;nbsp; &amp;nbsp;eventid,&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;CAST(datetime(time, &amp;#39;unixepoch&amp;#39;) AS TEXT) AS &amp;#39;Change Made&amp;#39;,&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;JSON_EXTRACT(data, &amp;#39;$.EventData.SubjectUserName&amp;#39;) AS &amp;#39;Who Made The Change&amp;#39;,&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;JSON_EXTRACT(data, &amp;#39;$.EventData.TargetUserName&amp;#39;) AS &amp;#39;New Group&amp;#39;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;FROM sophos_windows_events&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;WHERE time &amp;gt; STRFTIME(&amp;#39;%s&amp;#39;,&amp;#39;NOW&amp;#39;,&amp;#39;-$$Number of days to check$$ DAYS&amp;#39;)&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;AND source = &amp;#39;Security&amp;#39;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;AND eventid IN (&amp;#39;4727&amp;#39;, &amp;#39;4754&amp;#39;, &amp;#39;4731&amp;#39;);&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;New&amp;nbsp;User Accounts &amp;nbsp;-&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Variable to specify the number of days to check&lt;br /&gt;Windows&lt;/p&gt;
&lt;p&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;SELECT&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;source, &lt;br /&gt;&amp;nbsp; &amp;nbsp;eventid,&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;CAST(datetime(time, &amp;#39;unixepoch&amp;#39;) AS TEXT) AS &amp;#39;Change Made&amp;#39;,&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;JSON_EXTRACT(data, &amp;#39;$.EventData.SubjectUserName&amp;#39;) AS &amp;#39;Who Made The Change&amp;#39;,&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;JSON_EXTRACT(data, &amp;#39;$.EventData.TargetUserName&amp;#39;) AS &amp;#39;New User&amp;#39;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;FROM sophos_windows_events&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;WHERE time &amp;gt; STRFTIME(&amp;#39;%s&amp;#39;,&amp;#39;NOW&amp;#39;,&amp;#39;-$$Number of days to check$$ DAYS&amp;#39;)&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;AND source = &amp;#39;Security&amp;#39;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;AND eventid = 4720;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Unlocked Accounts&amp;nbsp;&amp;nbsp;-&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Variable to specify the number of days to check&lt;br /&gt;Windows&lt;/p&gt;
&lt;p&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;SELECT&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;source,&lt;br /&gt;&amp;nbsp; &amp;nbsp;eventid,&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;CAST(datetime(time, &amp;#39;unixepoch&amp;#39;) AS TEXT) AS &amp;#39;Change Made&amp;#39;,&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;JSON_EXTRACT(data, &amp;#39;$.EventData.SubjectUserName&amp;#39;) AS &amp;#39;Who Made The Change&amp;#39;,&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;JSON_EXTRACT(data, &amp;#39;$.EventData.TargetUserName&amp;#39;) AS &amp;#39;Unlocked Account&amp;#39;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;FROM sophos_windows_events&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;WHERE time &amp;gt; STRFTIME(&amp;#39;%s&amp;#39;,&amp;#39;NOW&amp;#39;,&amp;#39;-$$Number of days to check$$ DAYS&amp;#39;)&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;AND source = &amp;#39;Security&amp;#39;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;AND eventid = 4767;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;User Account was disabled&amp;nbsp; -&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Variable to specify the number of days to check&lt;br /&gt;Windows&lt;/p&gt;
&lt;p&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;SELECT&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;source,&lt;br /&gt;&amp;nbsp; &amp;nbsp;eventid,&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;CAST(datetime(time, &amp;#39;unixepoch&amp;#39;) AS TEXT) AS &amp;#39;Change Made&amp;#39;,&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;JSON_EXTRACT(data, &amp;#39;$.EventData.SubjectUserName&amp;#39;) AS &amp;#39;Who Made The Change&amp;#39;,&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;JSON_EXTRACT(data, &amp;#39;$.EventData.TargetUserName&amp;#39;) AS &amp;#39;Disabled Account&amp;#39;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;FROM sophos_windows_events&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;WHERE time &amp;gt; STRFTIME(&amp;#39;%s&amp;#39;,&amp;#39;NOW&amp;#39;,&amp;#39;-$$Number of days to check$$ DAYS&amp;#39;)&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;AND source = &amp;#39;Security&amp;#39;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;AND eventid = 4725;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;User Account was enabled-&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Variable to specify the number of days to check&lt;br /&gt;Windows&lt;/p&gt;
&lt;p&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;SELECT&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;source,&lt;br /&gt;&amp;nbsp; &amp;nbsp;eventid,&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;CAST(datetime(time, &amp;#39;unixepoch&amp;#39;) AS TEXT) AS &amp;#39;Change Made&amp;#39;,&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;JSON_EXTRACT(data, &amp;#39;$.EventData.SubjectUserName&amp;#39;) AS &amp;#39;Who Made The Change&amp;#39;,&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;JSON_EXTRACT(data, &amp;#39;$.EventData.TargetUserName&amp;#39;) AS &amp;#39;Enabled Account&amp;#39;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;FROM sophos_windows_events&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;WHERE time &amp;gt; STRFTIME(&amp;#39;%s&amp;#39;,&amp;#39;NOW&amp;#39;,&amp;#39;-$$Number of days to check$$ DAYS&amp;#39;)&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;AND source = &amp;#39;Security&amp;#39;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;AND eventid = 4722;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;User password reset-&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Variable to specify the number of days to check&lt;br /&gt;Windows&lt;/p&gt;
&lt;p&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;SELECT&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;source,&lt;br /&gt;&amp;nbsp; &amp;nbsp;eventid,&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;CAST(datetime(time, &amp;#39;unixepoch&amp;#39;) AS TEXT) AS &amp;#39;Change Made&amp;#39;,&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;JSON_EXTRACT(data, &amp;#39;$.EventData.SubjectUserName&amp;#39;) AS &amp;#39;Who Made The Change&amp;#39;,&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;JSON_EXTRACT(data, &amp;#39;$.EventData.TargetUserName&amp;#39;) AS &amp;#39;user password reset&amp;#39;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;FROM sophos_windows_events&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;WHERE time &amp;gt; STRFTIME(&amp;#39;%s&amp;#39;,&amp;#39;NOW&amp;#39;,&amp;#39;-$$Number of days to check$$ DAYS&amp;#39;)&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;AND source = &amp;#39;Security&amp;#39;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;AND eventid&amp;nbsp;IN (&amp;#39;4723&amp;#39;,&amp;#39;4724&amp;#39;);&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;User Added to Security Group-&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Variable to specify the number of days to check&lt;br /&gt;Windows&lt;/p&gt;
&lt;p&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;SELECT&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;source,&lt;br /&gt;&amp;nbsp; &amp;nbsp;eventid,&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;CAST(datetime(time, &amp;#39;unixepoch&amp;#39;) AS TEXT) AS &amp;#39;Change Made&amp;#39;,&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;JSON_EXTRACT(data, &amp;#39;$.EventData.SubjectUserName&amp;#39;) AS &amp;#39;Who Made The Change&amp;#39;,&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;JSON_EXTRACT(data, &amp;#39;$.EventData.MemberName&amp;#39;) AS &amp;#39;User/Group Added&amp;#39;,&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;JSON_EXTRACT(data, &amp;#39;$.EventData.TargetUserName&amp;#39;) AS &amp;#39;Group Changed&amp;#39;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;FROM sophos_windows_events&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;WHERE time &amp;gt; STRFTIME(&amp;#39;%s&amp;#39;,&amp;#39;NOW&amp;#39;,&amp;#39;-$$Number of days to check$$&amp;nbsp;DAYS&amp;#39;)&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;AND source = &amp;#39;Security&amp;#39;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;AND eventid&amp;nbsp;IN (&amp;#39;4728&amp;#39;,&amp;#39;4732&amp;#39;,&amp;#39;4756&amp;#39;);&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;User Removed from Security Group-&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Variable to specify the number of days to check&lt;br /&gt;Windows&lt;/p&gt;
&lt;p&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;SELECT&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;source,&lt;br /&gt;&amp;nbsp; &amp;nbsp;eventid,&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;CAST(datetime(time, &amp;#39;unixepoch&amp;#39;) AS TEXT) AS &amp;#39;Change Made&amp;#39;,&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;JSON_EXTRACT(data, &amp;#39;$.EventData.SubjectUserName&amp;#39;) AS &amp;#39;Who Made The Change&amp;#39;,&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;JSON_EXTRACT(data, &amp;#39;$.EventData.MemberName&amp;#39;) AS &amp;#39;User/Group Added&amp;#39;,&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;JSON_EXTRACT(data, &amp;#39;$.EventData.TargetUserName&amp;#39;) AS &amp;#39;Group Changed&amp;#39;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;FROM sophos_windows_events&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;WHERE time &amp;gt; STRFTIME(&amp;#39;%s&amp;#39;,&amp;#39;NOW&amp;#39;,&amp;#39;-$$Number of days to check$$&amp;nbsp;DAYS&amp;#39;)&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;AND source = &amp;#39;Security&amp;#39;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;AND eventid&amp;nbsp;IN (&amp;#39;4729&amp;#39;,&amp;#39;4733&amp;#39;,&amp;#39;4757&amp;#39;);&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="https://stage-community-sophos-comv11.telligenthosting.net/aggbug?PostID=679&amp;AppID=32&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</content><author><name>Karl_Ackerman</name><uri>https://stage-community-sophos-comV11.telligenthosting.net/members/karl_5f00_ackerman</uri></author></entry><entry><title>Detecting Glupteba malware with Sophos EDR</title><link rel="alternate" type="text/html" href="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/detecting-glupteba-malware-with-sophos-edr" /><id>https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/detecting-glupteba-malware-with-sophos-edr</id><published>2020-06-29T14:38:00Z</published><updated>2020-06-29T14:38:00Z</updated><content type="html">&lt;p&gt;Last week SophosLabs&amp;nbsp;&lt;a href="https://news.sophos.com/en-us/2020/06/24/glupteba-report/"&gt;published a report&lt;/a&gt;&amp;nbsp;about the Glupteba malware.&amp;nbsp;According to Sophos Labs this&amp;nbsp;malware family&amp;nbsp;has been&amp;nbsp;growing&amp;nbsp;in numbers. &amp;quot;This malware, with its hard-to-pronounce name, has been getting regular updates and feature enhancements that seem to be focused on its ability to conceal itself from detection on infected computers....The core malware is, in essence, a dropper with extensive backdoor functionality, but it is a dropper that goes to great efforts to keep itself, and its various components, hidden from view by the human operator of an infected computer, or the security software charged with its protection&amp;quot;&lt;/p&gt;
&lt;p&gt;In addition to the article SophosLabs published&amp;nbsp;a&amp;nbsp;&lt;a href="https://news.sophos.com/wp-content/uploads/2020/06/glupteba_final.pdf"&gt;detailed report&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;To help detect Glupteba indicators with Intercept X the team created a new Live Query:&amp;nbsp;&lt;a href="https://gist.github.com/andrewmundellsophos/ed42d0d6d3dc4c9e8dae0b4de301ad38"&gt;https://gist.github.com/andrewmundellsophos/ed42d0d6d3dc4c9e8dae0b4de301ad38&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;-----------------------------------------&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;pre&gt;-- IOCs complied from https://github.com/sophoslabs/IoCs/blob/master/Trojan-Glupteba
-- Collected 2020-06-26, 4pm US Eastern time

-- Create temp table with necessary columns
CREATE TABLE glupteba (domain text, SHA text, reg text, file text);
INSERT INTO glupteba (domain,SHA,reg,file) VALUES (&amp;#39;domain&amp;#39;,&amp;#39;SHA&amp;#39;,&amp;#39;reg&amp;#39;,&amp;#39;file&amp;#39;);

-- Search Sophos DNS journal over the last 90 days for domain IOCs
UPDATE glupteba SET domain = (SELECT CAST(CASE WHEN COUNT(*) &amp;gt; 0 THEN 1 ELSE 0 END AS BIT) as &amp;#39;Exists&amp;#39; FROM sophos_dns_journal WHERE (
		name like &amp;#39;%1.podcast.best%&amp;#39; OR
		name like &amp;#39;%anotheronedom.com%&amp;#39; OR
		name like &amp;#39;%bestblues.tech%&amp;#39; OR
		name like &amp;#39;%easywbdesign.com%&amp;#39; OR
		name like &amp;#39;%gamedate.xyz%&amp;#39; OR
		name like &amp;#39;%getfixed.xyz%&amp;#39; OR
		name like &amp;#39;%gfixprice.xyz%&amp;#39; OR
		name like &amp;#39;%maxbook.space%&amp;#39; OR
		name like &amp;#39;%robotatten.com%&amp;#39; OR
		name like &amp;#39;%sleepingcontrol.com%&amp;#39; OR
		name like &amp;#39;%sndvoices.com%&amp;#39; OR
		name like &amp;#39;%whitecontroller.com%&amp;#39; OR
		name like &amp;#39;%myonetime.top%&amp;#39; OR
		name like &amp;#39;%venoxcontrol.com%&amp;#39;)
		AND time &amp;gt; STRFTIME(&amp;#39;%s&amp;#39;,&amp;#39;NOW&amp;#39;,&amp;#39;-90 days&amp;#39;));
		
-- Search Sophos file hash journal over the last 90 days for SHA IOCs
UPDATE glupteba SET SHA = (SELECT CAST(CASE WHEN COUNT(*) &amp;gt; 0 THEN 1 ELSE 0 END AS BIT) as &amp;#39;Exists&amp;#39; FROM sophos_file_hash_journal WHERE (
		sha256 = &amp;#39;73fddd441a764e808ed6d6b8f3d0d13713e61221aa3cfef7da91cdaf112fe061&amp;#39; OR
		sha256 = &amp;#39;414035cc96d8bcc87ed173852a839ffbb45882a98c7a6f7b821e1668891deef0&amp;#39; OR
		sha256 = &amp;#39;04d71e8af8b5cbec912b82b6ebef7c19c5b888873dfd4609b1e38b2a6c398b2e&amp;#39; OR
		sha256 = &amp;#39;0b2a84359501923d1aa6ccd4e03b3f1b619e01d978efae45feea34a4d0ffed04&amp;#39; OR
		sha256 = &amp;#39;20e983e90144c385996eeb2edb584d654d898c34725e149682170f870ee12870&amp;#39; OR
		sha256 = &amp;#39;407c70f0c1a1e34503dae74dd973cf037d607e3c4deb8f063d33f2142f1baf71&amp;#39; OR
		sha256 = &amp;#39;6b0d90a0571ec870fa26372a1c5d83d06e8febca130a8f710e0c389a3054e05c&amp;#39; OR
		sha256 = &amp;#39;83bbe9e7b7967ecbc493f8ea40947184c6c7346c6084431fceea0401a6279d29&amp;#39; OR
		sha256 = &amp;#39;8d19c59db26a3e0a3251c5f05e143558bf009ed0b46fb9b6151f98441407ae8b&amp;#39; OR
		sha256 = &amp;#39;5e541d1ab46ab3d58e4889b08f5f4427d38afe8320582a63d992eda172af6c7f&amp;#39; OR
		sha256 = &amp;#39;9e4f09faee3eba3ae271b241cbaf0cb3621845ef83608a8abb3df8791e6c36e1&amp;#39; OR
		sha256 = &amp;#39;dec11036bca8384f81c0c1d534e1f37fd2864c974dad020f32b835af3c7c4e28&amp;#39; OR
		sha256 = &amp;#39;eb35bb221de38f5953f923cd349b4c85a50145329152a8aaa01e4cd8602a560e&amp;#39; OR
		sha256 = &amp;#39;469953521e9b64eac07f02fecf3488406c65ec1f3d5c182363c8ba0664a4b640&amp;#39;)
		AND time &amp;gt; STRFTIME(&amp;#39;%s&amp;#39;,&amp;#39;NOW&amp;#39;,&amp;#39;-90 days&amp;#39;));
		
-- Search Sophos registry journal over the last 1 day for registry IOCs
UPDATE glupteba SET reg = (SELECT CAST(CASE WHEN COUNT(*) &amp;gt; 0 THEN 1 ELSE 0 END AS BIT) as &amp;#39;Exists&amp;#39; FROM sophos_registry_journal WHERE (
		keyname like &amp;#39;%InstallKey%&amp;#39; OR
		keyname like &amp;#39;%RegisterAppOk%&amp;#39; OR
		keyname like &amp;#39;%RegisterAppProcessing%&amp;#39; OR
		keyname like &amp;#39;%TestApp%&amp;#39;)
		AND time &amp;gt; STRFTIME(&amp;#39;%s&amp;#39;,&amp;#39;NOW&amp;#39;,&amp;#39;-1 days&amp;#39;));
		
-- Search Sophos file journal over the last 4 hours for file IOCs being created
UPDATE glupteba SET file = (SELECT CAST(CASE WHEN COUNT(*) &amp;gt; 0 THEN 1 ELSE 0 END AS BIT) as &amp;#39;Exists&amp;#39; FROM sophos_file_journal WHERE (
		pathname like &amp;#39;%cloudnet.exe%&amp;#39; OR
		pathname like &amp;#39;%dsefix.exe%&amp;#39; OR
		pathname like &amp;#39;%e7.exe%&amp;#39; OR
		pathname like &amp;#39;%windefender.exe%&amp;#39; OR
		pathname like &amp;#39;%Winmon.sys%&amp;#39; OR
		pathname like &amp;#39;%WinmonFS.sys%&amp;#39; OR
		pathname like &amp;#39;%WinmonFS32.sys%&amp;#39; OR
		pathname like &amp;#39;%WinmonFS64.sys%&amp;#39; OR
		pathname like &amp;#39;%WinmonProcessMonitor32.sys%&amp;#39; OR
		pathname like &amp;#39;%WinmonProcessMonitor64.sys%&amp;#39; OR
		pathname like &amp;#39;%WinmonSystemMonitor-10-64.sys%&amp;#39; OR
		pathname like &amp;#39;%WinmonSystemMonitor-7-10-32.sys%&amp;#39; OR
		pathname like &amp;#39;%WinmonSystemMonitor-7-64.sys%&amp;#39; OR
		pathname like &amp;#39;%deps.zip%&amp;#39;)
		AND time &amp;gt; STRFTIME(&amp;#39;%s&amp;#39;,&amp;#39;NOW&amp;#39;,&amp;#39;-4 hours&amp;#39;));

-- Compile results and make display more friendly
SELECT
	CASE domain
	WHEN &amp;#39;0&amp;#39; THEN &amp;#39;Domain IOC NOT present&amp;#39;
	WHEN &amp;#39;1&amp;#39; THEN &amp;#39;Domain IOC IS present&amp;#39;
	ELSE &amp;#39;Error&amp;#39;
	END AS &amp;#39;Domain IOC present&amp;#39;,
	CASE SHA
	WHEN &amp;#39;0&amp;#39; THEN &amp;#39;SHA IOC NOT present&amp;#39;
	WHEN &amp;#39;1&amp;#39; THEN &amp;#39;SHA IOC IS present&amp;#39;
	ELSE &amp;#39;Error&amp;#39;
	END AS &amp;#39;SHA IOC present&amp;#39;,
	CASE reg
	WHEN &amp;#39;0&amp;#39; THEN &amp;#39;Registry IOC NOT present&amp;#39;
	WHEN &amp;#39;1&amp;#39; THEN &amp;#39;Registry IOC IS present&amp;#39;
	ELSE &amp;#39;Error&amp;#39;
	END AS &amp;#39;Registry IOC present&amp;#39;,
	CASE file
	WHEN &amp;#39;0&amp;#39; THEN &amp;#39;File IOC NOT present&amp;#39;
	WHEN &amp;#39;1&amp;#39; THEN &amp;#39;File IOC IS present&amp;#39;
	ELSE &amp;#39;Error&amp;#39;
	END AS &amp;#39;File IOC present&amp;#39;
	FROM glupteba where (domain = &amp;#39;1&amp;#39; OR SHA = &amp;#39;1&amp;#39; OR reg = &amp;#39;1&amp;#39; OR file = &amp;#39;1&amp;#39;);
	
-- Clean up temp table
DROP TABLE glupteba;&lt;/pre&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="https://stage-community-sophos-comv11.telligenthosting.net/aggbug?PostID=673&amp;AppID=32&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</content><author><name>Seth Geftic</name><uri>https://stage-community-sophos-comV11.telligenthosting.net/members/seth-geftic</uri></author><category term="Intercept X Advanced with EDR" scheme="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/archive/tags/Intercept%2bX%2bAdvanced%2bwith%2bEDR" /><category term="malware" scheme="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/archive/tags/malware" /><category term="EDR" scheme="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/archive/tags/EDR" /><category term="EDR Feed" scheme="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/archive/tags/EDR%2bFeed" /><category term="Live Query" scheme="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/archive/tags/Live%2bQuery" /></entry><entry><title>Live Discover for LINUX.... Video</title><link rel="alternate" type="text/html" href="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/live-discover-for-linux-video-952542611" /><id>https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/live-discover-for-linux-video-952542611</id><published>2020-06-11T23:14:00Z</published><updated>2020-06-11T23:14:00Z</updated><content type="html">&lt;p&gt;In the next two weeks we will be fully launching the EDR Live Discover for LINUX.&lt;/p&gt;
&lt;p&gt;The capabilities on Linux are simply astounding, we have been busy creating the prebuilt queries and finishing the last bit of work before this is fully available.&lt;/p&gt;
&lt;p&gt;In the video, Ethan Vince-Urwin, one of the core linux developers who has been building the features we all love takes the product for a test drive and shows off some of the&amp;nbsp;power and simplicity of Live Discover for Linux.&lt;/p&gt;
&lt;p&gt;Ethan shows how to use a query that leverages lenses to parse configuration files to check if the linux system allows password based authentication for root users over ssh.&amp;nbsp; To top it off he then uses the Live Response feature (coming on Linux later this summer) to go fix the problem remotely and then run the query again to confirm the problem has been fixed.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://vimeo.com/428304806"&gt;https://vimeo.com/428304806&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Enjoy.&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="https://stage-community-sophos-comv11.telligenthosting.net/aggbug?PostID=653&amp;AppID=32&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</content><author><name>Karl_Ackerman</name><uri>https://stage-community-sophos-comV11.telligenthosting.net/members/karl_5f00_ackerman</uri></author></entry><entry><title>KingMiner non-deterministic indicators of compromise</title><link rel="alternate" type="text/html" href="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/kingminer-non-deterministic-indicators-of-compromise" /><id>https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/kingminer-non-deterministic-indicators-of-compromise</id><published>2020-06-10T10:32:00Z</published><updated>2020-06-10T10:32:00Z</updated><content type="html">&lt;p&gt;&lt;span&gt;For query assistance, please see the following&amp;nbsp;&lt;/span&gt;&lt;a href="/intercept-x-endpoint/f/recommended-reads/128529/best-practices-on-using-live-discover-response-query-forum#mcetoc_1f8ovtfbt4"&gt;Best Practices&lt;/a&gt;&lt;span&gt;&amp;nbsp;guide&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;See the story from SophosLabs Uncut on KingMiner:&amp;nbsp;&lt;a href="https://news.sophos.com/en-us/2020/06/09/kingminer-report/"&gt;https://news.sophos.com/en-us/2020/06/09/kingminer-report/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The article is both educational and enlightening.&amp;nbsp; One of the aspects of KingMiner that is common with&amp;nbsp;other attacks is that many of the indicators of compromise are non-deterministic.&amp;nbsp; The domain names and URLs they use are all auto generated.&amp;nbsp; &amp;nbsp;I read through the article and crafted a query to check if you have experienced a Kingminer attack but because the indicators are not sufficient to convict with 100% accuracy I suspect we will have some false positive detections.&amp;nbsp; Even with the FP rate above 0 each of the detections requires a deeper investigation. See below for the query.&lt;/p&gt;
&lt;p&gt;-------------------------------------- QUERY TEXT BELOW --------------------------------------------&lt;/p&gt;
&lt;p&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;/************************************************************\&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;| IOC Partial list for Kingminer from SophosLabs Uncut&amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;|&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;\************************************************************/&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;/* Build the list of IOCs from the article */&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;WITH kingminer_IOCs(attribution, Conviction, method, ioc, notes) AS (&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;VALUES &lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;/*****************************************************************************************\&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;| These servers used domain names that were generated from the value of the current date |&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;| and time. This method has the advantage that the downloaders don&amp;rsquo;t have to carry |&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;| hardcoded server names, rather those server names are dynamically generated and keep |&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;| changing with time. This way, if one of the download servers is shut down, the operators|&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;| don&amp;rsquo;t have to release new versions of the downloader with the updated server names. |&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;| Instead, they just register the next domain name, and when the time comes, the botnet |&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;| will automatically switch to the new download servers. |&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;| The generated domain names have the following structure: 3615.30713fdae.tk |&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;| The fdae.tk part is the core of the domain name. In the observed cases it was either |&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;| fdae.tk, fdae.com or fghh.com, but the strings found in the side-loading DLLs suggest |&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;| that additionally the fdae.ga and fdae.cf domain cores could potentially be used, or |&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;| were planned to be used at some point |&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;\*****************************************************************************************/&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;NON-deterministic&amp;#39;, &amp;#39;domain_name&amp;#39;, &amp;#39;%fdae.tk&amp;#39;, &amp;#39;Time-coded DGA - These servers used domain names that were generated from the value of the current date and time.&amp;#39;),&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;NON-deterministic&amp;#39;, &amp;#39;domain_name&amp;#39;, &amp;#39;%fdae.com&amp;#39;, &amp;#39;Time-coded DGA - These servers used domain names that were generated from the value of the current date and time.&amp;#39;),&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;NON-deterministic&amp;#39;, &amp;#39;domain_name&amp;#39;, &amp;#39;%fghh.com&amp;#39;, &amp;#39;Time-coded DGA - These servers used domain names that were generated from the value of the current date and time.&amp;#39;),&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;NON-deterministic&amp;#39;, &amp;#39;domain_name&amp;#39;, &amp;#39;%fgae.ga&amp;#39;, &amp;#39;Time-coded DGA - These servers used domain names that were generated from the value of the current date and time.&amp;#39;),&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;NON-deterministic&amp;#39;, &amp;#39;domain_name&amp;#39;, &amp;#39;%fghh.cf&amp;#39;, &amp;#39;Time-coded DGA - These servers used domain names that were generated from the value of the current date and time.&amp;#39;),&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;NON-deterministic&amp;#39;, &amp;#39;domain_name&amp;#39;, &amp;#39;%a.qwerr.ga&amp;#39;, &amp;#39;Time-coded DGA - These servers used domain names that were generated from the value of the current date and time.&amp;#39;),&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;NON-deterministic&amp;#39;, &amp;#39;domain_name&amp;#39;, &amp;#39;%lu4n.com&amp;#39;, &amp;#39;The lu4n.com site also hosted a few SQL brute forcing command injection tools&amp;#39;),&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;Deterministic&amp;#39;, &amp;#39;domain_name&amp;#39;, &amp;#39;%ip.yototoo.com&amp;#39;, &amp;#39;encrypted backdoor connection&amp;#39;),&lt;/span&gt;&lt;br /&gt; &lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&lt;span style="color:#0000ff;"&gt;&amp;nbsp; &amp;nbsp;/******************************************************************************************\&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;| We have found over 20 Github user accounts that were used to deliver the contents of the |&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;| Kingminer botnet over the time. |&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;\******************************************************************************************/&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;NON-deterministic&amp;#39;, &amp;#39;URL&amp;#39;, &amp;#39;%github%cvffdscccss%&amp;#39;, &amp;#39;Github repositories used to deliver contents of kingminer botnet&amp;#39;),&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;NON-deterministic&amp;#39;, &amp;#39;URL&amp;#39;, &amp;#39;%github%xieliang3%&amp;#39;, &amp;#39;Github repositories used to deliver contents of kingminer botnet&amp;#39;), &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;NON-deterministic&amp;#39;, &amp;#39;URL&amp;#39;, &amp;#39;%github%hansho23%&amp;#39;, &amp;#39;Github repositories used to deliver contents of kingminer botnet&amp;#39;),&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;NON-deterministic&amp;#39;, &amp;#39;URL&amp;#39;, &amp;#39;%github%paishi45276%&amp;#39;, &amp;#39;Github repositories used to deliver contents of kingminer botnet&amp;#39;),&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;NON-deterministic&amp;#39;, &amp;#39;URL&amp;#39;, &amp;#39;%github%oit847996%&amp;#39;, &amp;#39;Github repositories used to deliver contents of kingminer botnet&amp;#39;),&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;NON-deterministic&amp;#39;, &amp;#39;URL&amp;#39;, &amp;#39;%github%muzhuoyiyue%&amp;#39;, &amp;#39;Github repositories used to deliver contents of kingminer botnet&amp;#39;), &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;NON-deterministic&amp;#39;, &amp;#39;URL&amp;#39;, &amp;#39;%github%daonaoyef%&amp;#39;, &amp;#39;Github repositories used to deliver contents of kingminer botnet&amp;#39;),&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;NON-deterministic&amp;#39;, &amp;#39;URL&amp;#39;, &amp;#39;%github%leishi9%&amp;#39;, &amp;#39;Github repositories used to deliver contents of kingminer botnet&amp;#39;),&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;NON-deterministic&amp;#39;, &amp;#39;URL&amp;#39;, &amp;#39;%github%yut42929%&amp;#39;, &amp;#39;Github repositories used to deliver contents of kingminer botnet&amp;#39;),&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;NON-deterministic&amp;#39;, &amp;#39;URL&amp;#39;, &amp;#39;%github%shazhuangq%&amp;#39;, &amp;#39;Github repositories used to deliver contents of kingminer botnet&amp;#39;), &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;NON-deterministic&amp;#39;, &amp;#39;URL&amp;#39;, &amp;#39;%github%zaiya00387%&amp;#39;, &amp;#39;Github repositories used to deliver contents of kingminer botnet&amp;#39;),&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;NON-deterministic&amp;#39;, &amp;#39;URL&amp;#39;, &amp;#39;%github%gghhjjjj%&amp;#39;, &amp;#39;Github repositories used to deliver contents of kingminer botnet&amp;#39;),&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;NON-deterministic&amp;#39;, &amp;#39;URL&amp;#39;, &amp;#39;%github%gghhhhgh%&amp;#39;, &amp;#39;Github repositories used to deliver contents of kingminer botnet&amp;#39;),&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;NON-deterministic&amp;#39;, &amp;#39;URL&amp;#39;, &amp;#39;%github%haj08341%&amp;#39;, &amp;#39;Github repositories used to deliver contents of kingminer botnet&amp;#39;), &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;NON-deterministic&amp;#39;, &amp;#39;URL&amp;#39;, &amp;#39;%github%qipu872262484%&amp;#39;, &amp;#39;Github repositories used to deliver contents of kingminer botnet&amp;#39;),&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;NON-deterministic&amp;#39;, &amp;#39;URL&amp;#39;, &amp;#39;%github%jiaoyi7992%&amp;#39;, &amp;#39;Github repositories used to deliver contents of kingminer botnet&amp;#39;),&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;NON-deterministic&amp;#39;, &amp;#39;URL&amp;#39;, &amp;#39;%github%huitun237%&amp;#39;, &amp;#39;Github repositories used to deliver contents of kingminer botnet&amp;#39;),&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;NON-deterministic&amp;#39;, &amp;#39;URL&amp;#39;, &amp;#39;%github%zaiya00387%&amp;#39;, &amp;#39;Github repositories used to deliver contents of kingminer botnet&amp;#39;), &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;NON-deterministic&amp;#39;, &amp;#39;URL&amp;#39;, &amp;#39;%github%fff%&amp;#39;, &amp;#39;Github repositories used to deliver contents of kingminer botnet&amp;#39;),&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;NON-deterministic&amp;#39;, &amp;#39;URL&amp;#39;, &amp;#39;%github%chigutuiche%&amp;#39;, &amp;#39;Github repositories used to deliver contents of kingminer botnet&amp;#39;),&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;NON-deterministic&amp;#39;, &amp;#39;URL&amp;#39;, &amp;#39;%github%zhizi471%&amp;#39;, &amp;#39;Github repositories used to deliver contents of kingminer botnet&amp;#39;),&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;NON-deterministic&amp;#39;, &amp;#39;URL&amp;#39;, &amp;#39;%github%jiaoshq %&amp;#39;, &amp;#39;Github repositories used to deliver contents of kingminer botnet&amp;#39;), &lt;/span&gt;&lt;br /&gt; &lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;/*****************************************************************************************\&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;| Usually the first activity that we observed after a successful infection was the |&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;| execution of a PowerShell script spawned from the sqlservr.exe process |&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;| !!! TO_DO !!! Build detection method for this type of IOC |&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;\*****************************************************************************************/&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;&lt;span style="color:#0000ff;"&gt;/* (&amp;#39;kingminer&amp;#39;, &amp;#39;NON-deterministic&amp;#39;, &amp;#39;Powershell_Parent&amp;#39;, &amp;#39;%sqlserver.exe%&amp;#39;, &amp;#39;successful infection was the execution of a PowerShell script spawned from the sqlservr.exe process&amp;#39;), */&lt;/span&gt;&lt;/span&gt;&lt;br /&gt; &lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;&lt;span style="color:#0000ff;"&gt;/*****************************************************************************************\&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;| Copy of powershell.exe running under anothername |&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;\*****************************************************************************************/&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;NON-deterministic&amp;#39;, &amp;#39;Powershell_renamed&amp;#39;, &amp;#39;%powershell%&amp;#39;, &amp;#39;A powershell process runing under another name&amp;#39;),&lt;/span&gt;&lt;br /&gt; &lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;/*****************************************************************************************\&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;| In one of the cases, we were able to observe the network traffic of an initial infection|&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;| attempt, which helped us reconstruct the majority of the infection process. The attack |&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;| in that case came from the IP address 185.234.216.223. | &lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;\*****************************************************************************************/&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;Non-Deterministic&amp;#39;, &amp;#39;IP&amp;#39;, &amp;#39;185.234.216.223&amp;#39;, &amp;#39;this server is part of the Kingminer infrastructure&amp;#39;), &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;Non-Deterministic&amp;#39;, &amp;#39;IP&amp;#39;, &amp;#39;9.9.9.9&amp;#39;, &amp;#39;The malicious loader contains the IP addresses of a few DNS servers&amp;#39;),&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;Non-Deterministic&amp;#39;, &amp;#39;IP&amp;#39;, &amp;#39;1.1.1.1&amp;#39;, &amp;#39;The malicious loader contains the IP addresses of a few DNS servers&amp;#39;),&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;Non-Deterministic&amp;#39;, &amp;#39;IP&amp;#39;, &amp;#39;119.29.29.29&amp;#39;, &amp;#39;The malicious loader contains the IP addresses of a few DNS servers&amp;#39;),&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;Non-Deterministic&amp;#39;, &amp;#39;IP&amp;#39;, &amp;#39;8.8.4.4&amp;#39;, &amp;#39;The malicious loader contains the IP addresses of a few DNS servers&amp;#39;),&lt;/span&gt;&lt;br /&gt; &lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;&lt;span style="color:#0000ff;"&gt;/*****************************************************************************************\&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;| this script is saved to a couple of locations, typically C:\Users\Public\Music\1.vbs. |&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;\*****************************************************************************************/&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;Non-Deterministic&amp;#39;, &amp;#39;file_path&amp;#39;, &amp;#39;C:\Users\Public\Music\1.vbs&amp;#39;, &amp;#39;VBscript downloader&amp;#39;),&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;Non-Deterministic&amp;#39;, &amp;#39;file_path&amp;#39;, &amp;#39;C:\Users\Public\Music\2.vbs&amp;#39;, &amp;#39;VBscript downloader&amp;#39;),&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;&lt;span style="color:#0000ff;"&gt;/*****************************************************************************************\&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;| some cmd line options used |&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;\*****************************************************************************************/&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;Non-Deterministic&amp;#39;, &amp;#39;cmdline&amp;#39;, &amp;#39;%whoami%&amp;#39;, &amp;#39;luan_exec reference&amp;#39;),&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;Non-Deterministic&amp;#39;, &amp;#39;cmdline&amp;#39;, &amp;#39;%vbscript:GetObject(%script:hxxp://ww.3113cfdae[.]com/r1.txt?&amp;#39;, &amp;#39;Kingminer executes this simple downloader command&amp;#39;),&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;&lt;span style="color:#0000ff;"&gt;/*****************************************************************************************\&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;| There were a handful of legit programs that were abused by Kingminer, coming from |&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;| different software vendors |&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;\*****************************************************************************************/&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;Non-Deterministic&amp;#39;, &amp;#39;processname&amp;#39;, &amp;#39;fix.exe&amp;#39;, &amp;#39;Clean executable may be used to trigger malware via side loading&amp;#39;),&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;Non-Deterministic&amp;#39;, &amp;#39;processname&amp;#39;, &amp;#39;alger.exe&amp;#39;, &amp;#39;Clean executable may be used to trigger malware via side loading&amp;#39;),&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;Non-Deterministic&amp;#39;, &amp;#39;processname&amp;#39;, &amp;#39;powered.exe&amp;#39;, &amp;#39;Clean executable may be used to trigger malware via side loading&amp;#39;),&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;Non-Deterministic&amp;#39;, &amp;#39;processname&amp;#39;, &amp;#39;repair.exe&amp;#39;, &amp;#39;Clean executable may be used to trigger malware via side loading&amp;#39;),&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;(&amp;#39;kingminer&amp;#39;, &amp;#39;Non-Deterministic&amp;#39;, &amp;#39;processname&amp;#39;, &amp;#39;dwmer.exe&amp;#39;, &amp;#39;Clean executable may be used to trigger malware via side loading&amp;#39;)&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt; )&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;/**********************************************************************\&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;| The admin may want to search a large amount of data in the tables so |&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;| split time into 20 min chunks given the number hours specified |&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;\**********************************************************************/&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;, for(x) AS (&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;VALUES ( ( SELECT CAST (strftime (&amp;#39;%s&amp;#39;, &amp;#39;now&amp;#39;,&amp;#39;-$$Hours to look back$$ hours&amp;#39;) AS INT) ) )&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;UNION ALL&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;SELECT x+1200 FROM for WHERE x &amp;lt; (SELECT CAST (strftime (&amp;#39;%s&amp;#39;, &amp;#39;now&amp;#39;) AS INT))&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt; )&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;/****************************************************************************\&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;| Check for matching domain or URL info seen in the specified lookback period|&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;\****************************************************************************/&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;SELECT&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;CAST( datetime(spa.time,&amp;#39;unixepoch&amp;#39;) AS TEXT) DATE_TIME,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;km.attribution,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;km.Conviction,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;spa.subject,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;spa.SophosPID,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;CAST ( (select replace(spa.pathname, rtrim(spa.pathname, replace(spa.pathname, &amp;#39;\&amp;#39;, &amp;#39;&amp;#39;)), &amp;#39;&amp;#39;)) AS TEXT) process_name,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;spa.action,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;spa.object,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;spa.url,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;km.method,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;km.ioc,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;km.notes&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;FROM for&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;LEFT JOIN kingminer_IOCs km ON km.method IN(&amp;#39;domain_name&amp;#39;, &amp;#39;url&amp;#39;)&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;LEFT JOIN sophos_process_activity spa ON spa.subject IN (&amp;#39;Http&amp;#39;,&amp;#39;Url&amp;#39;,&amp;#39;Network&amp;#39;) AND spa.time &amp;gt;= for.x and spa.time &amp;lt;= for.x+1200 &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;WHERE spa.url LIKE km.ioc&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;UNION ALL&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;/****************************************************************************\&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;| Check for matching IP info seen in the specified lookback period |&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;\****************************************************************************/&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;SELECT&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;CAST( datetime(spa.time,&amp;#39;unixepoch&amp;#39;) AS TEXT) DATE_TIME,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;km.attribution,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;km.Conviction,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;spa.subject,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;spa.SophosPID,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;CAST ( (select replace(spa.pathname, rtrim(spa.pathname, replace(spa.pathname, &amp;#39;\&amp;#39;, &amp;#39;&amp;#39;)), &amp;#39;&amp;#39;)) AS TEXT) process_name,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;spa.action,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;spa.object,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;spa.url,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;km.method,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;km.ioc,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;km.notes&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;FROM for&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;LEFT JOIN kingminer_IOCs km ON km.method IN(&amp;#39;ip&amp;#39;)&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;LEFT JOIN sophos_process_activity spa ON spa.subject IN (&amp;#39;Http&amp;#39;,&amp;#39;Ip&amp;#39;,&amp;#39;Network&amp;#39;) AND spa.time &amp;gt;= for.x and spa.time &amp;lt;= for.x+1200 &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;WHERE spa.source LIKE km.ioc OR spa.destination LIKE km.ioc&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;UNION ALL&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;/***********************************************************************************\&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;| Check for matching cmdline or file_path info seen in the specified lookback period|&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;\***********************************************************************************/&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;SELECT&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;CAST( datetime(spa.time,&amp;#39;unixepoch&amp;#39;) AS TEXT) DATE_TIME,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;km.attribution,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;km.Conviction,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;spa.subject,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;spa.SophosPID,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;CAST ( (select replace(spa.pathname, rtrim(spa.pathname, replace(spa.pathname, &amp;#39;\&amp;#39;, &amp;#39;&amp;#39;)), &amp;#39;&amp;#39;)) AS TEXT) process_name,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;spa.action,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;spa.object,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;spa.url,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;km.method,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;km.ioc,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;km.notes&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;FROM for&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;LEFT JOIN kingminer_IOCs km ON km.method IN(&amp;#39;cmdline&amp;#39;,&amp;#39;file_path&amp;#39;)&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;LEFT JOIN sophos_process_activity spa ON spa.subject IN (&amp;#39;FileBinaryChanges&amp;#39;,&amp;#39;FileBinaryReads&amp;#39;,&amp;#39;FileDataChanges&amp;#39;,&amp;#39;FileDataReads&amp;#39;,&amp;#39;FileOtherChanges&amp;#39;,&amp;#39;FileOtherReads&amp;#39;, &amp;#39;Image&amp;#39;,&amp;#39;Process&amp;#39;) AND &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt; spa.time &amp;gt;= for.x and spa.time &amp;lt;= for.x+1200 &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;WHERE spa.pathname LIKE km.ioc OR spa.cmdline LIKE km.ioc&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;UNION ALL&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;/***********************************************************************************\&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;| Check for powershell rename events |&lt;/span&gt;&lt;br /&gt;&lt;span style="color:#0000ff;font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;\***********************************************************************************/&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;SELECT&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;CAST( datetime(spa.time,&amp;#39;unixepoch&amp;#39;) AS TEXT) DATE_TIME,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;km.attribution,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;km.Conviction,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;spa.subject,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;spa.SophosPID,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;CAST ( (select replace(spa.pathname, rtrim(spa.pathname, replace(spa.pathname, &amp;#39;\&amp;#39;, &amp;#39;&amp;#39;)), &amp;#39;&amp;#39;)) AS TEXT) process_name,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;&amp;#39;Powershell renamed&amp;#39;,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;spa.object,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;spa.url,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;km.method,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;km.ioc,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;km.notes&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;FROM for&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;LEFT JOIN kingminer_IOCs km ON km.method IN(&amp;#39;Powershell_renamed&amp;#39;)&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;LEFT JOIN sophos_process_activity spa ON spa.subject IN (&amp;#39;FileBinaryChanges&amp;#39;,&amp;#39;FileOtherChanges&amp;#39;) AND &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt; spa.time &amp;gt;= for.x and spa.time &amp;lt;= for.x+1200 &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;WHERE spa.pathname LIKE km.ioc&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;--------------------------------------- END SQL SCRIPT -------------------------------------&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&lt;a href="/cfs-file/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-32/pastedimage1591787080609v1.png"&gt;&lt;img alt=" " src="/resized-image/__size/960x720/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-32/pastedimage1591787080609v1.png" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="https://stage-community-sophos-comv11.telligenthosting.net/aggbug?PostID=650&amp;AppID=32&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</content><author><name>Karl_Ackerman</name><uri>https://stage-community-sophos-comV11.telligenthosting.net/members/karl_5f00_ackerman</uri></author></entry><entry><title>New Sophos Table - Sophos_process_activity</title><link rel="alternate" type="text/html" href="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/new-sophos-table---sophos_5f00_process_5f00_activity" /><id>https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/new-sophos-table---sophos_5f00_process_5f00_activity</id><published>2020-05-26T13:20:00Z</published><updated>2020-05-26T13:20:00Z</updated><content type="html">&lt;p&gt;&lt;span&gt;For query assistance, please see the following&amp;nbsp;&lt;/span&gt;&lt;a href="/intercept-x-endpoint/f/recommended-reads/128529/best-practices-on-using-live-discover-response-query-forum#mcetoc_1f8ovtfbt4"&gt;Best Practices&lt;/a&gt;&lt;span&gt;&amp;nbsp;guide&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;We have added a new table to the sophos forensics journals. The sophos_process_activity table.&lt;/p&gt;
&lt;p&gt;Often as part of an investigation you need to to get a quick view of what a process did in the past and this table provides a quick lookup location for that information.&lt;/p&gt;
&lt;p&gt;This table contains a subject for each of the other Sophos &amp;#39;journals&amp;#39; and collects some of the more useful information like Registry Key/Values for the registry journal, IP/Port/Protocol for the various network activity journals and much more.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;JOURNALS consolidated into the Sophos_process_activity table&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;DirectoryChanges&lt;/li&gt;
&lt;li&gt;Dns&lt;/li&gt;
&lt;li&gt;File
&lt;ul&gt;
&lt;li&gt;BinaryChanges&lt;/li&gt;
&lt;li&gt;BinaryReads&lt;/li&gt;
&lt;li&gt;DataChanges&lt;/li&gt;
&lt;li&gt;DataReads&lt;/li&gt;
&lt;li&gt;OtherChanges&lt;/li&gt;
&lt;li&gt;OtherReads&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Http&lt;/li&gt;
&lt;li&gt;Image&lt;/li&gt;
&lt;li&gt;Ip&lt;/li&gt;
&lt;li&gt;Network&lt;/li&gt;
&lt;li&gt;Process&lt;/li&gt;
&lt;li&gt;Registry&lt;/li&gt;
&lt;li&gt;Thread&lt;/li&gt;
&lt;li&gt;Url&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;A process can generate thousands of recorded actions and can be running for several days so using this table requires us set some limits on how much data we want.&amp;nbsp; Below is an example that requires three variables to ensure we do not try and collect too much data.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a href="/cfs-file/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-32/pastedimage1590505737912v1.png"&gt;&lt;img alt=" " src="/resized-image/__size/960x720/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-32/pastedimage1590505737912v1.png" /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;/* Collect the process name and cmdline of the target process */&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;WITH Target_process(process_name, process_cmdLine) &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;AS (&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; SELECT replace(spj.pathname, rtrim(spj.pathname, replace(spj.pathname, &amp;#39;\&amp;#39;, &amp;#39;&amp;#39;)), &amp;#39;&amp;#39;) process_name, spj.cmdline process_cmdline &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; FROM sophos_process_journal spj WHERE spj.SophosPID = CAST (&amp;#39;$$SophosPID$$&amp;#39; AS TEXT) AND &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;time = replace(&amp;#39;$$SophosPID$$&amp;#39;, rtrim(&amp;#39;$$SophosPID$$&amp;#39;, replace(&amp;#39;$$SophosPID$$&amp;#39;, &amp;#39;:&amp;#39;, &amp;#39;&amp;#39;)), &amp;#39;&amp;#39;) / 10000000 - 11644473600 &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; LIMIT 1)&lt;/span&gt;&lt;br /&gt; &lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt; SELECT &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;subject,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;DateTime(time,&amp;#39;Unixepoch&amp;#39;) Time_of_activity,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;Target_process.process_name,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;Target_process.process_cmdline,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;action,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;replace(object, rtrim(object, replace(object, &amp;#39;\&amp;#39;, &amp;#39;&amp;#39;)), &amp;#39;&amp;#39;) Object_name,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;object Object_Path, fileid File_ID, pathname, filesize, targetpathname, url, source, sourcePort, destination, destinationPort, protocol, targetSophosPID, cmdLine, keyname, valuename, value, sophosTID&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;FROM sophos_process_activity JOIN Target_process &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt; WHERE SophosPID = &amp;#39;$$SophosPID$$&amp;#39; AND &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;time &amp;gt; replace(&amp;#39;$$SophosPID$$&amp;#39;, rtrim(&amp;#39;$$SophosPID$$&amp;#39;, replace(&amp;#39;$$SophosPID$$&amp;#39;, &amp;#39;:&amp;#39;, &amp;#39;&amp;#39;)), &amp;#39;&amp;#39;) / 10000000 - 11644473600 &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; + CAST (&amp;#39;$$Begin collection N Minutes after process start$$&amp;#39; AS INT) AND&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp;time &amp;lt; replace(&amp;#39;$$SophosPID$$&amp;#39;, rtrim(&amp;#39;$$SophosPID$$&amp;#39;, replace(&amp;#39;$$SophosPID$$&amp;#39;, &amp;#39;:&amp;#39;, &amp;#39;&amp;#39;)), &amp;#39;&amp;#39;) / 10000000 - 11644473600 &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; + CAST (&amp;#39;$$Begin collection N Minutes after process start$$&amp;#39; AS INT) &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; + CAST (&amp;#39;$$Number of minutes of activity to collect$$&amp;#39; AS INT)&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:&amp;#39;courier new&amp;#39;, courier;"&gt;;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-family:arial, helvetica, sans-serif;"&gt;Also check out the query to show ALL system activity from up to 90 days in the past (Depends on when EDR was deployed on the device and some tables may exceed their storage limits on machines that have higher activity)&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-family:arial, helvetica, sans-serif;"&gt;&lt;a href="/products/intercept/early-access-program/f/live-discover-queries/120672/live-discover-query-all-system-activity-for-n-seconds-from-a-date-time"&gt;https://community.sophos.com/products/intercept/early-access-program/f/live-discover-queries/120672/live-discover-query-all-system-activity-for-n-seconds-from-a-date-time&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="https://stage-community-sophos-comv11.telligenthosting.net/aggbug?PostID=642&amp;AppID=32&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</content><author><name>Karl_Ackerman</name><uri>https://stage-community-sophos-comV11.telligenthosting.net/members/karl_5f00_ackerman</uri></author></entry><entry><title>Live Discover Queries - Review Process</title><link rel="alternate" type="text/html" href="https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/live-discover-queries---review-process" /><id>https://stage-community-sophos-comv11.telligenthosting.net/intercept-x-endpoint/early-access-program/b/blog/posts/live-discover-queries---review-process</id><published>2020-05-23T16:18:00Z</published><updated>2020-05-23T16:18:00Z</updated><content type="html">&lt;p&gt;Posting a query to the Live Discover Queries board will now include a review process.&amp;nbsp; This will allow us to review any question and proposed answer prior to it being visible by others.&amp;nbsp; We are adding this to ensure that the content of the queries do not contain anything inappropriate and that the query has been reviewed and tested and is not believed to cause harm. as for how well it does what it says.&amp;nbsp; we advise administrators to test any query they get from the forum or other sites on one device first to ensure it is behaving as expected.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Queries that have been reviewed will have&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a href="/cfs-file/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-32/pastedimage1590250979477v1.png"&gt;&lt;img src="/resized-image/__size/320x240/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-32/pastedimage1590250979477v1.png" alt=" " /&gt;&lt;/a&gt;&amp;nbsp;&lt;span style="color:#000080;font-size:150%;"&gt;REVIEWED by Sophos&lt;/span&gt;&lt;/strong&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;at the top.&lt;/p&gt;
&lt;p&gt;All this is in preparation for the general availability of the product, expected in early June for those already in the EAP, and others will have the features enabled through out the month.&lt;/p&gt;
&lt;p&gt;Thanks&lt;/p&gt;
&lt;p&gt;Karl&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="https://stage-community-sophos-comv11.telligenthosting.net/aggbug?PostID=641&amp;AppID=32&amp;AppType=Weblog&amp;ContentType=0" width="1" height="1"&gt;</content><author><name>Karl_Ackerman</name><uri>https://stage-community-sophos-comV11.telligenthosting.net/members/karl_5f00_ackerman</uri></author></entry></feed>