Skip to content

Commit 43e0f5a

Browse files
authored
add suspicious child process detection for Azure Run Command Linux
adds a new detection rule to identify suspicious child processes spawned by the Azure Run Command agent (waagent) on Linux
1 parent 613bfbb commit 43e0f5a

File tree

1 file changed

+45
-0
lines changed

1 file changed

+45
-0
lines changed
Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
title: Suspicious Child Process of Azure Run Command on Linux
2+
id: 8c452236-7341-5236-a362-236152152514
3+
related:
4+
- id: 5a2e6f43-85f2-4e6a-8d3b-9c2e1f4a5b6c
5+
type: similar
6+
status: experimental
7+
description: |
8+
Detects suspicious commands spawned by shell scripts running under the Azure Run Command
9+
extension context on Linux virtual machines.
10+
author: Vladan Sekulic
11+
date: 2025-12-17
12+
references:
13+
- https://cloud.google.com/blog/topics/threat-intelligence/azure-run-command-dummies
14+
logsource:
15+
product: linux
16+
category: process_creation
17+
detection:
18+
selection_parent:
19+
ParentCommandLine|contains|all:
20+
- '/bin/sh'
21+
- '/var/lib/waagent/run-command/download/'
22+
- '/script.sh'
23+
24+
selection_child:
25+
Image|endswith:
26+
- '/whoami' # recon
27+
- '/id'
28+
- '/nc' # reverse shells
29+
- '/ncat'
30+
- '/netcat'
31+
- '/python' # interactive shells
32+
- '/python3'
33+
- '/perl'
34+
- '/socat' # port forwarding/shell
35+
36+
condition: selection_parent and selection_child
37+
falsepositives:
38+
- Custom admin scripts invoking specific diagnostics
39+
- Legitimate python automation scripts pushed via Azure
40+
level: high
41+
tags:
42+
- attack.execution
43+
- attack.t1059.004
44+
- attack.discovery
45+
- attack.t1033

0 commit comments

Comments
 (0)