Solutions/CyberArkEPM/Hunting Queries/CyberArkEPMProcessNewHash.yaml (25 lines of code) (raw):
id: 8d72be65-d837-4e86-bca8-4a30e6834a22
name: CyberArkEPM - Process hash changed
description: |
'Query shows processes which hash has been changed recently.'
severity: Medium
requiredDataConnectors:
- connectorId: CyberArkEPM
dataTypes:
- CyberArkEPM
tactics:
- DefenseEvasion
relevantTechniques:
- T1036
query: |
CyberArkEPM
| where TimeGenerated > ago(24h)
| where isnotempty(Hash)
| summarize hashes = makeset(Hash) by ActingProcessFileInternalName
| where array_length(hashes) > 1
| extend FileCustomEntity = ActingProcessFileInternalName
entityMappings:
- entityType: File
fieldMappings:
- identifier: Name
columnName: FileCustomEntity