Skip to content

Conversation

@Polaceka
Copy link
Contributor

Thanks to @Aamir-Muhammad for allowing us to add his queries to the project.

The query chain detects and correlates multiple indicators of the Charon ransomware attack lifecycle, including ransomware package writes, malicious DLL sideloading, process execution triggers (notably via svchost.exe), creation of ransom notes, and suspicious service creation (WWC.sys). It merges these findings across several event types to confirm successful ransomware deployment.
The query traces processes that write both DLL and EXE files to the same location while exhibiting masquerading behavior.
Introduces a new query for detecting logins from different countries with impossible travel times between consecutive logins per identity.
Introduces a query to detect the malicious FreeVPN-One Chrome extension by correlating its unique extension ID and network traffic to suspicious domains.
Introduces a new Query for detecting ROKRAT malware activity associated with APT 37.
@Polaceka Polaceka self-assigned this Oct 30, 2025
@Polaceka Polaceka merged commit 7c4d823 into main Oct 30, 2025
2 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants