Tag: KQL

URL-Based IOC Validation for Microsoft Defender KQL
URL-Based IOC Validation for Microsoft Defender KQL

How It Works This feature in Uncoder AI demonstrates how to validate and optimize URL-based detection logic for Microsoft Defender for Endpoint, using Kusto Query Language (KQL). In the example shown, the input consists of remote access indicators from CERT-UA#11689 (WRECKSTEEL), which include phishing domains and command-and-control endpoints. Detection Pattern: The KQL query performs the […]

Read More
Zip Archive & C2 Domain Detection in Microsoft Sentinel via Uncoder AI
Zip Archive & C2 Domain Detection in Microsoft Sentinel via Uncoder AI

How It Works This Uncoder AI feature generates a broad-spectrum KQL detection query for Microsoft Sentinel, based on indicators from CERT-UA#14045 (DarkCrystal RAT). The AI processes a threat report and outputs a query to search logs for strings such as: “Розпорядження.zip” – a suspicious Ukrainian-language file name used to disguise malware “imgurl.ir” – a known […]

Read More
IOC Query Generation for Microsoft Sentinel in Uncoder AI
IOC Query Generation for Microsoft Sentinel in Uncoder AI

How It Works 1. IOC Parsing from Threat Report Uncoder AI automatically identifies and extracts key observables from the threat report, including: Malicious domains like: docs.google.com.spreadsheets.d.l1p6eeakedbmwteh36vana6hu-glaekssht-boujdk.zhblz.com mail.zhblz.com doc.gmail.com.gyehdhhrggdi1323sdnhnsiwvh2uhdqjwdhhfjcjeuejcj.zhblz.com These IOCs are used by the adversary for phishing and staging access to victim mailboxes. Explore Uncoder AI 2. Sentinel-Compatible KQL Generation On the right, Uncoder AI […]

Read More