Hunting Query we've used for detecting suspicious processes exploiting the SeriousSAM Vulnerability. Depending on your environment you might see plenty false positives. A good idea might be to add valid processes to the query based on the sha256 value.
-- $$startTime$$ DATE -- $$endTime$$ DATE SELECT strftime('%Y-%m-%dT%H:%M:%SZ', datetime(sfj.time,'unixepoch')) dateTime, spj.processName, CASE sfj.eventType WHEN 0 THEN 'Created' WHEN 1 THEN 'Renamed' WHEN 2 THEN 'Deleted' WHEN 3 THEN 'Modified' WHEN 4 THEN 'HardLink Created' WHEN 5 THEN 'Timestamps Modified' WHEN 6 THEN 'Permissions Modified' WHEN 7 THEN 'Ownership Modified' WHEN 8 THEN 'Accessed' WHEN 9 THEN 'Binary File Mapped' END eventType, replace(sfj.pathname, rtrim(sfj.pathname, replace(sfj.pathname, '\', '')), '') fileName, spj.pathname processPath, sfj.pathname filePath, sfj.sophosPID, spj.sha256, spp.mlScore, spp.puaScore, spp.localRep, spp.globalRep FROM sophos_file_journal sfj LEFT JOIN sophos_process_journal spj ON spj.sophosPID = sfj.sophosPID AND spj.time = replace(sfj.sophosPID, rtrim(sfj.sophosPID, replace(sfj.sophosPID , ':', '')), '')/10000000-11644473600 LEFT JOIN sophos_process_properties spp ON spp.sophosPID = spj.sophosPID WHERE sfj.pathname LIKE '\Device\HarddiskVolumeShadowCopy%\Windows\System32\config\%' AND sfj.time > $$startTime$$ AND sfj.time < $$endTime$$ ORDER BY sfj.time DESC
KR, reg1nleifr