Skip to main content

Search and Compare Process Executions - Generic

This Playbook is part of the Common Playbooks Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.9.0 and later.

This playbook is a generic playbook that receives a process name and a command-line argument. It searches for the given process executions and compares the command-line argument from the results to the command-line argument received from the playbook input. The playbook supports searching process executions using the following integrations:

  • Cortex XDR XQL Engine
  • Cortex XDR IR(Search executions inside XDR alerts)
  • Microsoft Defender For Endpoint

Note: Under the "Processes" input, the playbook should receive an array that contains the following keys:

  • value: process name
  • commands: command-line arguments

Dependencies#

This playbook uses the following sub-playbooks, integrations, and scripts.

Sub-playbooks#

  • MDE - Search and Compare Process Executions
  • Cortex XDR - Search and Compare Process Executions - XQL Engine
  • Cortex XDR - Search and Compare Process Executions - XDR Alerts

Integrations#

This playbook does not use any integrations.

Scripts#

This playbook does not use any scripts.

Commands#

This playbook does not use any commands.

Playbook Inputs#


NameDescriptionDefault ValueRequired
ProcessesProcess name to search and command-line argument to compare. This input should receive an array that contains the following keys:
- value: *process name*
- commands: *command-line arguments*
Optional
HuntingTimeFrameTime in relative date or range format (for example: "1 day", "3 weeks ago", "between 2021-01-01 12:34:56 +02:00 and 2021-02-01 12:34:56 +02:00"). The default is the last 24 hours.7 daysOptional
StringSimilarityThresholdStringSimilarity automation threshold. A number between 0 and 1, where 1 represents the most similar results of string comparisons. The automation will output only the results with a similarity score equal to or greater than the specified threshold.0.5Optional
SearchXDRAlertsSet to "True" if you want to hunt for processes that are part of XDR alertsOptional

Playbook Outputs#


PathDescriptionType
StringSimilarityStringSimilarity automation results.unknown
FindingsSuspicious process executions found.unknown

Playbook Image#


Search and Compare Process Executions - Generic