Skip to content

Commit daa7c9a

Browse files
committed
update: added azure vm run command rule
1 parent 34da43b commit daa7c9a

File tree

1 file changed

+32
-0
lines changed

1 file changed

+32
-0
lines changed
Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
title: Azure VM Run Command Execution
2+
id: 5a2e6f43-85f2-4e6a-8d3b-9c2e1f4a5b6c
3+
status: experimental
4+
description: |
5+
Detects the execution of the 'Run Command' action on an Azure Virtual Machine via the Azure Activity Log.
6+
Adversaries with 'Virtual Machine Contributor' rights (and higher) can use this to execute arbitrary code even when NSGs block SSH/RDP.
7+
author: Vladan Sekulic
8+
date: 2025-12-17
9+
references:
10+
- https://cloud.google.com/blog/topics/threat-intelligence/azure-run-command-dummies
11+
- https://cloud.google.com/blog/topics/threat-intelligence/russian-targeting-gov-business?hl=en
12+
- https://learn.microsoft.com/azure/virtual-machines/run-command
13+
logsource:
14+
product: azure
15+
service: activitylogs
16+
detection:
17+
selection:
18+
operationName:
19+
- 'Microsoft.Compute/virtualMachines/runCommand/action'
20+
- 'Microsoft.Compute/virtualMachines/runCommands/write'
21+
status:
22+
- 'Started'
23+
- 'Succeeded'
24+
condition: selection
25+
falsepositives:
26+
- Legitimate system administration
27+
- Automated configuration or patching workflows
28+
- Azure Automation and Automanage operations
29+
level: medium
30+
tags:
31+
- attack.execution
32+
- attack.t1059

0 commit comments

Comments
 (0)