Falcon Responder Flashcards

1
Q

What is svchost.exe

A

A wrapper for services starting, manages scheduled tasks and services from DLL files, usually showing in Falcon, its the execution of a scheduled task when it’s in the command line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How long is a quarantined file retained when downloaded vs in the cloud?

A

30 days when downloaded, 90 days in the cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is services.exe

A

The tool used to stop and restart services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What process creates, modifies, and deletes registry keys?

A

reg.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What raw data is available for a DNSRequest event?

A

index

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How many detections are displayed per day per AID?

A

1000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What sentence best describes the primary use of the Hash Executions search?

A

A summary view of the environment-wide presence of a given hash list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If trying to create a tightly-scoped allowlist for a certain ML detection group, what grouping might be used first?

A

Hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the six CrowdStrike objectives?

A

Gain Access, Keep Access, Explore, Contact Controlled Systems, Follow Through

And then Falcon Detection Method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What MITRE tactics are contained under Gain Access?

A

Initial Access
Credential Access
Privilege Escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What MITRE Tactics are under the Keep Access Objective?

A

Persistence
Defense Evasion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What MITRE Tactics are under the Explore Objective?

A

Discovery
Lateral Movement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What single MITRE Tactic falls under the Contact Controlled Systems Objective?

A

Command and Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What MITRE Tactics fall under the Follow Through Objective

A

Collection
Exfiltration
Execution
Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 7 different Falcon Detection Methods?

A

Malware,
Exploit,
Post-Exploit,
Machine Learning,
Custom Intelligence,
Falcon Overwatch
Falcon Intel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is FDM?

A

Falcon Detection Method - will show up in Detections as the Objective, with our own Tactic & Technique… meant for detections that don’t cleanly match a MITRE matrix spot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is required when creating a custom IOA from scratch?

A

Create a rule group
Create the custom rule in the group
Enable the rule & group
Assign the IOA rule group to a prevention policy

18
Q

What are the 4 IOA rule actions?

A

Monitor
Detect
Block execution (process creation only)
Kill process

19
Q

Can a custom IOA be applied to more than one prevention policy?

20
Q

How long are Detection-Related Events retained?

A

90 days, by default

21
Q

Which stages of the cyber kill chain does the Falcon sensor have visibility over?

A

Only the last 4:

Exploit, Control, Execute, Maintain

22
Q

What is the maximum size for a quarantined file to be uploaded to the Cloud?

23
Q

What is the default retention for “cloudable” events?

A

7 days by default

24
Q

What are the 4 rule types for IOA?

A

Process creation
File creation
Network connection
Domain name

25
What is the icon of a lightning bolt in a circle?
RTR
26
What does the stacked hexagon icon mean?
Incident
27
In order, what are the Overwatch Best Practice steps for IR?
1. Understand the detection 2. Review Process Tree to understand origin 3. Understand processes involved 4. Examine what is normal for the system 5. Examine what is normal for the environment
28
How long are incidents labeled inactive without new activity?
One hour
29
What percentage increase would a CrowdScore get from a good indication of attack?
20%
30
What dictates if a quarantined file can be uploaded to the cloud?
Prevention policy
31
What is WMIC.exe?
**WMIC.exe** stands for **Windows Management Instrumentation Command-line*). It is a command-line utility that provides access to **Windows Management Instrumentation (WMI)**, which is a set of specifications from Microsoft for consolidating the management of devices and applications in a networked environment.
32
In the Host timeline, which process identification number(s) is/are present?
ProcessID, the unique one of ours, but not the system PID.
33
What does the stacked hexagon icon signify?
Incident
34
What are event workflows?
Event Workflows are automated searches that can be used to pivot between related events and searches.
35
What actions does Falcon take upon detection
Kills and blocks process, quarantines files
36
What are the three kinds of detections, and what are they?
Manual - initiated by Falcon Overwatch Automated - IOCs and IOAs Custom - triggered by analyst-provided hashes
37
What are the four filters on the Host search page?
Search type Host Company Time Range
38
How do you get to Process Timeline?
By either - clicking the dashboard directly, under Investigate>Timelines under - Investigate Host search > Processes and Services > Clicking on Process ID
39
What parameters are there on the Process Timeline?
aid TargetProcessID ParentProcessID #event_simpleName Company
40
On Host Search, what are the subheadings?
Host info BIOS Local and external IPs Managed neighbors Unmanaged neighbors User log on activities
41
What are the filters on User Search?
UserName ComputerName aid Company FileName CommandLine Excluded Files Excluded Command Lines