ID: 0xFF-0209-Oracle_Suspicious_Command_Execution-WIn
OS: WindowsEndpoint, WindowsServer
FP Rate: Low
Tactic | Technique | Subtechnique | Technique Name |
---|---|---|---|
TA0008 - Lateral Movement | T1210 | Exploitation of Remote Services | |
TA0004 - Privilege Escalation | T1611 | Escape to Host |
Log Provider | Event ID | Event Name | ATT&CK Data Source | ATT&CK Data Component |
---|---|---|---|---|
MicrosoftThreatProtection | ProcessCreated | Process | Process Creation |
This query searches process creation events that are indicative of an attacker spawning OS commands from an Oracle database.
User
Attackers can use database systems such as Oracle to laterally move through the network by using command execution functionality in these databases.
None.
Some legitimate Oracle plugins will also perform command execution. Such plugins will have to be filtered.
Investigate the source of the command being executed. This could be indicative of an attacker attempting to perform lateral movement.
None.
Language: Kusto
Platform: M365 Security
Query:
let timeframe = 2*1h;
DeviceProcessEvents
| where ingestion_time() >= ago(timeframe)
| where ActionType =~ "ProcessCreated"
| where InitiatingProcessFileName =~ "oracle.exe"
| where not(FileName in~ ("conhost.exe", "oradim.exe"))
| where not(FileName =~ "WerFault.exe" and ProcessCommandLine contains tostring(InitiatingProcessId))
// Begin environment-specific filter.
// End environment-specific filter.
Version | Date | Impact | Notes |
---|---|---|---|
1.3 | 2024-06-06 | minor | Added a filter for "ProcessCreated" actiontype, as MDE is rolling out other actiontypes as well. |
1.2 | 2022-02-22 | minor | Use ingestion_time for event selection and include de-duplication logic. |
1.1 | 2022-01-18 | minor | Added werfault to filter. |
1.0 | 2021-11-09 | major | Initial version. |