Skip to content

Commit b39c0ed

Browse files
committed
docs(osquery_manager): update artifacts matrix with LNK queries
- Add lnk_yara_detection query (#28) to additional queries table - Update total query count from 31 to 32 - Update LNK files entry in User Activity section - Note YARA-based binary content scanning capability
1 parent aa103f4 commit b39c0ed

1 file changed

Lines changed: 6 additions & 5 deletions

File tree

packages/osquery_manager/artifacts_matrix.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,9 @@
22

33
This document tracks the coverage of forensic artifacts in Osquery.
44

5-
**Last Updated**: 2025-11-20
5+
**Last Updated**: 2025-11-28
66
**Total Core Artifacts**: 2 available + 38 in progress + 6 not available = 46 total variants
7-
**Total Queries**: 31 (4 core forensic variants + 27 additional)
7+
**Total Queries**: 32 (4 core forensic variants + 28 additional)
88
**Completion Rate**: 4.3% (2/46 core artifacts fully supported)
99

1010
---
@@ -36,7 +36,7 @@ This document tracks the coverage of forensic artifacts in Osquery.
3636
| 6a | Installed Services | ⚠️ | Linux | - | - | systemd table |
3737
| 6b | Installed Services | ⚠️ | Mac | - | - | launchd table |
3838
| 7 | Jumplists || Win | - | - | Not natively supported — PR #7260 closed due to OLE format complexity |
39-
| 8 | LNK files || Win | lnk_forensics_windows_elastic | [a1b2c3d4-lnk1](kibana/osquery_saved_query/osquery_manager-a1b2c3d4-lnk1-11ef-8f39-bf9c07530bbb.json) | Uses file table's native Windows shortcut parsing with hash and shellbags enrichment. Detects suspicious patterns: risky executables (cmd, powershell, wscript, etc.), malicious arguments (encoded commands, download cradles, temp paths, UNC paths), large files (>20KB), HTTP/HTTPS strings, and persistence locations (Startup folders). Correlates LNK targets with Windows Explorer directory access patterns from shellbags registry data to identify user interaction. Includes suspicious indicator flags and intelligent result prioritization. |
39+
| 8 | LNK files || Win | lnk_forensics_windows_elastic | [a1b2c3d4-lnk1](kibana/osquery_saved_query/osquery_manager-a1b2c3d4-lnk1-11ef-8f39-bf9c07530bbb.json) | Comprehensive LNK forensics across 8+ locations (user/system Startup, Desktop, Recent Items, Quick Launch, SendTo, Start Menu) using users table enumeration. Enriched with hash, authenticode signatures, and shellbags data. Detects risky executables (cmd, powershell, pwsh, wscript, cscript, rundll32, regsvr32, mshta, wmic, certutil, bitsadmin), suspicious arguments (encoded commands, download cradles, hidden windows, UNC paths), large files (>20KB), and HTTP/HTTPS strings. Includes location_type classification and intelligent result prioritization. |
4040
| 9 | ARP Cache | ⚠️ | Win | - | - | arp_cache table |
4141
| 9a | ARP Cache | ⚠️ | Linux | - | - | arp_cache table |
4242
| 9b | ARP Cache | ⚠️ | Mac | - | - | arp_cache table |
@@ -105,7 +105,8 @@ These queries existed in the original repository and provide additional coverage
105105
| 24 | unsigned_startup_items_vt || Win | [b068](kibana/osquery_saved_query/osquery_manager-b0683c20-0dbb-11ed-a49c-6b13b058b135.json) | Unsigned startup items with VirusTotal integration |
106106
| 25 | unsigned_dlls_on_system_folders_vt || Win | [63c1](kibana/osquery_saved_query/osquery_manager-63c1fe20-176f-11ed-89c6-331eb0db6d01.json) | Unsigned DLLs in system folders with VirusTotal integration |
107107
| 26 | executables_in_temp_folder_vt || Win | [3e55](kibana/osquery_saved_query/osquery_manager-3e553650-17fd-11ed-89c6-331eb0db6d01.json) | Executables/drivers in temp folders with VirusTotal integration |
108-
| 27 | lnk_forensics || Win | [a1b2](kibana/osquery_saved_query/osquery_manager-a1b2c3d4-lnk1-11ef-8f39-bf9c07530bbb.json) | LNK shortcut file forensics with suspicious pattern detection and shellbags enrichment (risky executables, malicious arguments, large files, persistence locations, directory access correlation) |
108+
| 27 | lnk_forensics || Win | [a1b2](kibana/osquery_saved_query/osquery_manager-a1b2c3d4-lnk1-11ef-8f39-bf9c07530bbb.json) | Comprehensive LNK forensics across 8+ locations with hash, authenticode, and shellbags enrichment. Detects risky LOLBins, encoded commands, download cradles, UNC paths. Uses users table for dynamic enumeration. |
109+
| 28 | lnk_yara_detection || Win | [b2c3](kibana/osquery_saved_query/osquery_manager-b2c3d4e5-lnk2-11ef-8f39-bf9c07530bbb.json) | YARA-based LNK pattern detection. Scans LNK binary content directly for malicious patterns: LOLBins (powershell, cmd, wscript, mshta, rundll32, certutil, bitsadmin), encoded commands, hidden execution, download cradles, HTTP/HTTPS URLs, UNC paths, temp directory references, Base64 PowerShell patterns. Bypasses osquery shortcut_target_path parsing issues. |
109110

110111
**Note**: Queries with VirusTotal integration require the VirusTotal extension configured in osquery.
111112

@@ -168,7 +169,7 @@ While some artifacts are not directly available, the existing queries provide st
168169
- ⚠️ BITS Jobs Database (Windows: via windows_eventlog)
169170

170171
### User Activity
171-
- ✅ LNK files (Windows: file table with native shortcut parsing + hash enrichment + shellbags correlation + suspicious pattern detection)
172+
- ✅ LNK files (Windows: file table with native shortcut parsing + hash + authenticode enrichment + shellbags correlation + 8+ locations via users table + YARA-based binary content scanning)
172173
- ⚠️ Shell History (Linux/Mac: shell_history table)
173174
- ⚠️ Shellbags (Windows: shellbags table)
174175
- ⚠️ User Assist (Windows: userassist table)

0 commit comments

Comments
 (0)