← Back to SOC feed Coverage →

Browser Extension Enumeration via DeviceFileEvents

kql MEDIUM Azure-Sentinel
DeviceFileEvents
backdoorhuntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-09T11:00:00Z · Confidence: medium

Hunt Hypothesis

The detection identifies potential adversary enumeration of browser extensions by monitoring CRX file activity, which may indicate reconnaissance or persistence efforts. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify suspicious extensions that could be used for lateral movement or data exfiltration.

KQL Query

DeviceFileEvents
| where TimeGenerated >= ago(180d)
| where FileName endswith ".crx"
| extend ExtensionId = tolower(split(FileName, "_")[0])
| where ExtensionId matches regex @"^[a-p]{32}$"
| summarize DeviceCount = dcount(DeviceName) by ExtensionId
| sort by DeviceCount desc

Analytic Rule Definition

id: ede058ab-97a8-4494-aa76-b7f5f6d78cba
name: Browser Extension Enumeration via DeviceFileEvents
description: |
  Identifies browser extension CRX files observed across endpoints. Helps in enumerating commonly installed extensions and hunting for potentially malicious ones.

  ---
  Optional Enrichment: 
  To enrich the `ExtensionId` values with extension names, ratings, and user counts, use the open-source script from:
  https://github.com/venkat117/browser-extension-scraper
severity: Medium
requiredDataConnectors:
  - connectorId: MicrosoftDefenderAdvancedThreatProtection
    dataTypes:
      - DeviceFileEvents
tactics:
  - Discovery
query: |
  DeviceFileEvents
  | where TimeGenerated >= ago(180d)
  | where FileName endswith ".crx"
  | extend ExtensionId = tolower(split(FileName, "_")[0])
  | where ExtensionId matches regex @"^[a-p]{32}$"
  | summarize DeviceCount = dcount(DeviceName) by ExtensionId
  | sort by DeviceCount desc
queryFrequency: P7D
queryPeriod: P180D
version: 1.0.0
kind: Hunting
tags:
  - ChromeExtensions
  - Endpoint
  - DeviceFileEvents
author:
  name: Venkata Reddy
  email: venkatareddy1173@gmail.com

Required Data Sources

Sentinel TableNotes
DeviceFileEventsEnsure this data connector is enabled

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Discovery/BrowserExtension_Discovery.yaml