← Back to SOC feed Coverage →

Flash-CVE-2018-4848

kql MEDIUM Azure-Sentinel
DeviceNetworkEvents
exploithuntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-21T23:00:01Z · Confidence: medium

Hunt Hypothesis

The Flash-CVE-2018-4848 rule detects potential exploitation of a zero-day vulnerability in Adobe Flash Player through processes associated with malicious domains using suspicious TLDs, indicative of targeted attacks. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify and mitigate early-stage compromises leveraging outdated or unpatched Flash components.

KQL Query

DeviceNetworkEvents 
| where Timestamp > ago(14d) 
| where InitiatingProcessFileName =~ "cmd.exe" and InitiatingProcessParentFileName =~ "excel.exe" 
| where RemoteUrl endswith ".kr" 
| project Timestamp, DeviceName, RemoteIP, RemoteUrl  
| top 100 by Timestamp

Analytic Rule Definition

id: 8e32bc35-72e6-4bc9-b3bb-2ee346c8acf0
name: Flash-CVE-2018-4848
description: |
  This query checks for specific processes and domain TLD used in the CVE-2018-4878 flash 0day exploit attack reported by KrCERT.
  CVE: CVE-2018-4878.
  Read more here:.
  Https://www.krcert.or.kr/data/secNoticeView.do?bulletin_writing_sequence=26998.
  Https://helpx.adobe.com/security/products/flash-player/apsa18-01.html.
  Http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html.
  Http://blog.morphisec.com/flash-exploit-cve-2018-4878-spotted-in-the-wild-massive-malspam-campaign.
  Tags: #exploit #CVE-2018-4878 #0day #Korea #Flash.
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - DeviceNetworkEvents
query: |
  DeviceNetworkEvents 
  | where Timestamp > ago(14d) 
  | where InitiatingProcessFileName =~ "cmd.exe" and InitiatingProcessParentFileName =~ "excel.exe" 
  | where RemoteUrl endswith ".kr" 
  | project Timestamp, DeviceName, RemoteIP, RemoteUrl  
  | top 100 by Timestamp

Required Data Sources

Sentinel TableNotes
DeviceNetworkEventsEnsure this data connector is enabled

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Exploits/Flash-CVE-2018-4848.yaml