Skip to content

Update Dexplugin.yaml#199

Merged
KwachSean merged 2 commits intoAzure:mainfrom
KajhonSoyini:patch-1
Jun 4, 2025
Merged

Update Dexplugin.yaml#199
KwachSean merged 2 commits intoAzure:mainfrom
KajhonSoyini:patch-1

Conversation

@KajhonSoyini
Copy link
Copy Markdown
Contributor

Added 15 New DEX emerging threat detections.

Added 15 New DEX emerging threat detections.
@KajhonSoyini
Copy link
Copy Markdown
Contributor Author

@KPreme7 please read the following Contributor License Agreement(CLA). If you agree with the CLA, please reply with the following information.

@microsoft-github-policy-service agree [company="{your company}"]

Options:

  • (default - no company specified) I have sole ownership of intellectual property rights to my Submissions and I am not making Submissions in the course of work for my employer.
@microsoft-github-policy-service agree
  • (when company given) I am making Submissions in the course of work for my employer (or my employer has intellectual property rights in my Submissions by contract or applicable law). I have permission from my employer to make Submissions and enter into this Agreement on behalf of my employer. By signing below, the defined term “You” includes me and my employer.
@microsoft-github-policy-service agree company="Microsoft"

Contributor License Agreement

@microsoft-github-policy-service agree company="Microsoft"

@KwachSean KwachSean requested review from KwachSean and Copilot May 21, 2025 14:30
Copy link
Copy Markdown
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

This PR updates the Dexplugin.yaml file to add 15 new DEX emerging threat detection rules. Key changes include the addition of multiple detection queries for various threat activities, updates to rule descriptions, and adjustments to query formatting.

Comments suppressed due to low confidence (1)

Plugins/Community Based Plugins/Microsoft Security Experts/Microsoft Defender Experts Plugin/Dexplugin.yaml:46

  • [nitpick] The description uses inconsistent casing for 'ROADtx'; consider changing 'roadtx' to 'ROADtx' to match the DisplayName.
Description: Detects known filenames and command line activity associated with ROADrecon and roadtx tools.

…rosoft Defender Experts Plugin/Dexplugin.yaml

Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
Copy link
Copy Markdown
Collaborator

@KwachSean KwachSean left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Detailed Breakdown

  1. Formatting Fixes and Minor Edits
    Added a YAML document separator (---) at the top.
    Minor whitespace and formatting adjustments for code consistency.
    Corrected description: Changed "ROADrecon and ROADtx tools" to "ROADrecon and roadtx tools" (lowercased 'roadtx').
    Changed single quotes to double quotes in several KQL query templates for consistency.
  2. Improved Query Formatting
    Adjusted query blocks for skills like DEX-QakbotReconnaissanceActivities, changing single quotes to double quotes and aligning logical structure for improved clarity and consistency.
  3. Added New Detection Skills (Major Additions)
    Microsoft Teams and RMM/Phishing Detections
    DEX-TeamsActivityAfterSuspiciousRMM

Detects Teams chat activity after suspicious Remote Monitoring and Management (RMM) tool usage.
Cross-references device process events with Teams chat creation involving foreign tenants.
DEX-TeamsPhishingviaUrlClickEvents

Correlates suspicious device alerts with URL click events in Microsoft Teams.
DEX-TeamsAdversary-in-The-Middle(AiTM)

Correlates risky sign-in attempts with Teams phishing from external tenants to identify adversary-in-the-middle scenarios.
LOLBINs, Exfiltration, and Persistence
DEX-SuspiciousFileDownloadsviaLOLBINs

Detects use of LOLBINs (e.g., curl.exe, powershell.exe, certutil.exe, bitsadmin.exe) for suspicious file downloads from public IPs.
DEX-CSVDEDownloadandADEnumeration

Detects the download and execution of Csvde.exe (Active Directory data export tool) via curl, followed by enumeration commands, within a short time window.
DEX-DataCompressionandExfiltration

Detects use of 7-Zip to extract files with a password, followed by possible data exfiltration via network connections.
DEX-PersistenceThroughStartupOperations

Detects persistence mechanisms via:
Registry keys (ASEP, Run, etc.)
Startup folder file creation/modification
Scheduled task creation
Browser, DPAPI, and Infostealer Detections
DEX-BrowserRemoteDebugging

Detects AutoIT scripts launching Chromium-based browsers in remote debugging mode.
DEX-DPAPI-AutoIT

Detects DPAPI (Data Protection API) decryption actions initiated by AutoIT scripts, specifically for Chrome/Edge.
DEX-DPAPI-LOLBAS

Detects DPAPI decryption via LOLBAS binaries (e.g., RegAsm.exe, MSBuild.exe).
DEX-SensitiveBrowserAccessAutoIT

Identifies AutoIT scripts accessing sensitive browser files (cookies, password databases, etc.).
DEX-SensitiveBrowserAccessLOLBAS

Identifies LOLBAS binaries accessing sensitive browser files.
DEX-Node.jsInfostealerActivity

Detects Node.js-based infostealers accessing Windows DPAPI-protected credentials, run via PowerShell parent process.
DEX-SuspiciousInlineJavaScriptExecution

Identifies suspicious inline JavaScript execution patterns with Node.js.
DEX-SuspiciousJSCFile

Identifies execution of suspicious .jsc (JavaScript compiled) files via Node.js.

@KwachSean KwachSean requested a review from markrafn-msft May 23, 2025 14:16
@KwachSean KwachSean merged commit 8fffd6d into Azure:main Jun 4, 2025
1 check passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants