[Osquery_manager] UserAssist artifact saved query #16220
+84
−9
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
UserAssist Artifact
The UserAssist registry artifact tracks applications executed via Windows Explorer, providing forensic investigators with execution timestamps, run counts, and user attribution. This artifact is essential for reconstructing user activity timelines and identifying potentially malicious programs launched through the Windows shell.
Core Forensic Artifacts Coverage
Queries by Platform
🪟 Windows - User Execution Tracking via Explorer
Description
UserAssist Registry: Track applications executed via Windows Explorer. Shows execution count and last execution time per user. Useful for forensic investigation of user-initiated program execution. MITRE ATT&CK: T1204 (User Execution).
Detection Focus:
Forensic Value:
Result
Query results include application paths, extracted filenames, user SIDs with resolved usernames, execution timestamps in UTC, run counts, and MD5/SHA256 hashes when the executable exists on disk.
Platform
windowsInterval
3600seconds (1 hour)Query ID
userassist_windows_elasticECS Field Mappings
file.path→pathfile.name→nameuser.id→siduser.name→usernamefile.hash.md5→md5file.hash.sha256→sha256event.category→["process"](static)event.type→["info"](static)tags→["userassist", "mitre_t1204", "forensics"](static)SQL Query
MITRE ATT&CK Coverage
This PR was AI assisted with Claude Code