Dev-0322 File Drop Activity November 2021

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This query hunts for file creation events linked to Dev-0322's compromise of ZOHO ManageEngine ADSelfService Plus software. It focuses on files dropped during post-exploitation activity. Hosts with higher risk scores should be prioritized.

Attribute Value
Type Hunting Query
Solution Legacy IOC based Threat Protection
ID 5bf2d4d8-ea03-4673-aaf8-716a61446022
Tactics Persistence, CommandAndControl
Techniques T1078, T1219
Required Connectors MicrosoftDefenderAdvancedThreatProtection, MicrosoftThreatProtection
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
DeviceFileEvents ?
DeviceProcessEvents ?
SecurityAlert ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Hunting Queries · Back to Legacy IOC based Threat Protection