CommentCrew-threat-apt1 detects potential adversary behavior involving suspicious comment creation or modification in Azure resources, which may indicate reconnaissance or initial compromise activities. SOC teams should proactively hunt for this behavior to identify early-stage threats and prevent lateral movement or data exfiltration in their Azure Sentinel environment.
YARA Rule
rule BOUNCER_DLL_APT1
{
meta:
author = "AlienVault Labs"
info = "CommentCrew-threat-apt1"
strings:
$s1 = "new_connection_to_bounce():" wide ascii
$s2 = "usage:%s IP port [proxip] [port] [key]" wide ascii
condition:
all of them
}
This YARA rule can be deployed in the following contexts:
This rule contains 2 string patterns in its detection logic.
Scenario: Scheduled system maintenance job using task scheduler
Filter/Exclusion: process.parent_process_name != "schtasks.exe" or process.name != "schtasks.exe"
Scenario: Admin performing a log cleanup using logparser
Filter/Exclusion: process.name != "logparser.exe" or process.parent_process_name != "cmd.exe"
Scenario: Database backup using sqlcmd initiated by a service account
Filter/Exclusion: process.name != "sqlcmd.exe" or process.parent_process_name != "sqlservr.exe"
Scenario: User running a script to generate documentation using PowerShell
Filter/Exclusion: process.name != "powershell.exe" or process.parent_process_name != "explorer.exe"
Scenario: IT team deploying a patch using Windows Update or wsusutil.exe
Filter/Exclusion: process.name != "wsusutil.exe" or process.parent_process_name != "svchost.exe"