File tree Expand file tree Collapse file tree 1 file changed +32
-0
lines changed
rules/cloud/azure/activity_logs Expand file tree Collapse file tree 1 file changed +32
-0
lines changed Original file line number Diff line number Diff line change 1+ title : Azure VM Run Command Execution
2+ id : 5a2e6f43-85f2-4e6a-8d3b-9c2e1f4a5b6c
3+ status : experimental
4+ description : |
5+ Detects the execution of the 'Run Command' action on an Azure Virtual Machine via the Azure Activity Log.
6+ Adversaries with 'Virtual Machine Contributor' rights (and higher) can use this to execute arbitrary code even when NSGs block SSH/RDP.
7+ author : Vladan Sekulic
8+ date : 2025-12-17
9+ references :
10+ - https://cloud.google.com/blog/topics/threat-intelligence/azure-run-command-dummies
11+ - https://cloud.google.com/blog/topics/threat-intelligence/russian-targeting-gov-business?hl=en
12+ - https://learn.microsoft.com/azure/virtual-machines/run-command
13+ logsource :
14+ product : azure
15+ service : activitylogs
16+ detection :
17+ selection :
18+ operationName :
19+ - ' Microsoft.Compute/virtualMachines/runCommand/action'
20+ - ' Microsoft.Compute/virtualMachines/runCommands/write'
21+ status :
22+ - ' Started'
23+ - ' Succeeded'
24+ condition : selection
25+ falsepositives :
26+ - Legitimate system administration
27+ - Automated configuration or patching workflows
28+ - Azure Automation and Automanage operations
29+ level : medium
30+ tags :
31+ - attack.execution
32+ - attack.t1059
You can’t perform that action at this time.
0 commit comments