Base64 encoded Windows process command-lines

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


Identifies instances of a base64-encoded PE file header seen in the process command line parameter.

Attribute Value
Type Analytic Rule
Solution Endpoint Threat Protection Essentials
ID ca67c83e-7fff-4127-a3e3-1af66d6d4cad
Severity Medium
Status Available
Kind Scheduled
Tactics Execution, DefenseEvasion
Techniques T1059, T1027, T1140
Required Connectors SecurityEvents, WindowsSecurityEvents, WindowsSecurityEvents, WindowsForwardedEvents
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
SecurityEvent ?
WindowsEvent ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to Endpoint Threat Protection Essentials