Manual
search
Ctrlk
  • BluSapphire Manuals
  • BluSapphire
    • Detectionschevron-right
    • Roles & Permissions
    • Knowledge Base
  • BluGenie
    • Full Function Listchevron-right
    • Functions by Categorychevron-right
    • Artifactschevron-right
      • Example Template
      • Tactical Artifacts by Categorychevron-right
        • Combination Querychevron-right
        • EventLog Querychevron-right
          • Query for Process execution from unusual directories
          • Query suspicious programs processed by the Task Scheduler using the Event Log
          • Query for unusual instances of rundll32.exe via the Event Log
          • Query for Unusual Instances of rundll32.exe making outbound network connections using SysMon Data
          • Query Suspicious Powershell Command Line Executions
          • Query the Windows System Log for 104, 517, 1102
        • File and Folder Querychevron-right
        • Network Querychevron-right
        • Process Querychevron-right
        • Registry Querychevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. BluGeniechevron-right
  2. Artifactschevron-right
  3. Tactical Artifacts by Category

EventLog Query

Query for Process execution from unusual directorieschevron-rightQuery suspicious programs processed by the Task Scheduler using the Event Logchevron-rightQuery for unusual instances of rundll32.exe via the Event Logchevron-rightQuery for Unusual Instances of rundll32.exe making outbound network connections using SysMon Datachevron-rightQuery Suspicious Powershell Command Line Executionschevron-rightQuery the Windows System Log for 104, 517, 1102chevron-right
PreviousQuery Autorun locations for any item nested that is not digitally signedchevron-leftNextQuery for Process execution from unusual directorieschevron-right

Last updated 3 years ago