Dev-0322 Command Line Activity November 2021

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This query hunts for command line activity linked to Dev-0322's compromise of ZOHO ManageEngine ADSelfService Plus software. It focuses on commands used in post-exploitation activity. Hosts with higher risk scores should be prioritized.

Attribute Value
Type Hunting Query
Solution Legacy IOC based Threat Protection
ID 78fa22f9-0c13-4847-bbe6-6a7aa1b47547
Tactics Persistence, LateralMovement, CommandAndControl
Techniques T1078, T1219, T1021
Required Connectors MicrosoftDefenderAdvancedThreatProtection, MicrosoftThreatProtection
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
DeviceProcessEvents ?
SecurityAlert ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Hunting Queries · Back to Legacy IOC based Threat Protection