Tag: Microsoft Defender for Endpoint

Sigma-to-MDE Query Conversion: DNS Detection for Katz Stealer via Uncoder AI
Sigma-to-MDE Query Conversion: DNS Detection for Katz Stealer via Uncoder AI

  How It Works Uncoder AI reads a Sigma detection rule designed to identify DNS queries to malicious domains linked with the Katz Stealer malware family. It then automatically rewrites the logic into a fully compatible Microsoft Defender for Endpoint (MDE) Advanced Hunting query using the Kusto Query Language (KQL). Left Panel – Sigma Rule: […]

Read More
AI-Generated MDE Queries from APT28 Clipboard Attacks
AI-Generated MDE Queries from APT28 Clipboard Attacks

How It Works This feature of Uncoder AI transforms structured threat intel into Microsoft Defender for Endpoint-compatible KQL detection rules. In this case, it ingests IOCs from CERT-UA#11689, focusing on a known APT28 tradecraft: clipboard-based PowerShell payloads fetching staging scripts from malicious domains. IOC Extraction from Reported Behavior The left panel shows observables extracted from […]

Read More
Uncovering Insider Risks with Full Summary in Uncoder AI: A Microsoft Defender for Endpoint Case
Uncovering Insider Risks with Full Summary in Uncoder AI: A Microsoft Defender for Endpoint Case

Identifying unauthorized access to sensitive data—especially passwords—remains a critical concern for cybersecurity teams. When such access happens through legitimate tools like Notepad, visibility becomes a challenge. But with Uncoder AI’s Full Summary feature, security analysts can immediately understand the logic behind detection rules targeting exactly that type of threat. Explore Uncoder AI In a recent […]

Read More
Visualizing clfs.sys Threat Activity in Microsoft Defender with Uncoder AI’s Decision Tree
Visualizing clfs.sys Threat Activity in Microsoft Defender with Uncoder AI’s Decision Tree

Loading legitimate system drivers from illegitimate or suspicious directories is a known tactic for persistence, evasion, or execution by adversaries. One high-value target in this category is clfs.sys — a legitimate Windows driver tied to the Common Log File System. To detect this activity, Microsoft Defender for Endpoint supports advanced KQL-based detection logic. But to […]

Read More
Exposing Suspicious Scripting via CrushFTP with Uncoder AI in Microsoft Defender
Exposing Suspicious Scripting via CrushFTP with Uncoder AI in Microsoft Defender

File transfer services like CrushFTP are critical for business operations—but they can also be leveraged as stealthy launchpads for post-exploitation activity. When a server process such as crushftpservice.exe spawns command-line interpreters like powershell.exe , cmd.exe , or bash.exe , it may signal that an attacker is executing commands or deploying payloads under the radar. In […]

Read More