Dev-0322 Command Line Activity November 2021 (ASIM Version)

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This query hunts for command line activity linked to Dev-0322's compromise of ZOHO ManageEngine ADSelfService Plus software. It focuses on commands used in post-exploitation activity. Hosts with higher risk scores should be prioritized.

Attribute Value
Type Hunting Query
Solution Legacy IOC based Threat Protection
ID 6bfea14f-2122-46b3-8f8b-3947e0fb6d92
Tactics Persistence, LateralMovement, CommandAndControl
Techniques T1078, T1219, T1021
Required Connectors MicrosoftDefenderAdvancedThreatProtection
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
SecurityAlert ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Hunting Queries · Back to Legacy IOC based Threat Protection