← Back to SOC feed Coverage →

compromised-certificate[Nobelium]

kql MEDIUM Azure-Sentinel
DeviceFileEvents
huntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-06T23:00:00Z · Confidence: medium

Hunt Hypothesis

Adversaries may use compromised certificates associated with the Nobelium campaign to sign malicious files and evade detection. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential command and control activities or lateral movement attempts.

KQL Query

DeviceFileCertificateInfo
| where Signer == 'Solarwinds Worldwide, LLC' and SignerHash == '47d92d49e6f7f296260da1af355f941eb25360c4'
| join DeviceFileEvents on SHA1
| distinct DeviceName, FileName, FolderPath, SHA1, SHA256, IsTrusted, IsRootSignerMicrosoft, SignerHash
//| distinct DeviceName
//| distinct FileName
//| summarize mylist = make_list(FileName) by DeviceName

Analytic Rule Definition

id: 8d8a5c56-54b8-4cd9-9a9b-83d0325bf802
name: compromised-certificate[Nobelium]
description: |
  Search for the files that are using a compromised certificate associated with the Nobelium campaign.
  You can remove the comments to:
  1. get the list of devices where there is at least one file signed with the certificate
  2. get the list of files signed with the certificate
  3. get the list of files signed with the certificate group by Devices
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - DeviceFileCertificateInfo
  - DeviceFileEvents
tactics:
- Privilege escalation
- Vulnerability
tags:
- Nobelium
query: |
  DeviceFileCertificateInfo
  | where Signer == 'Solarwinds Worldwide, LLC' and SignerHash == '47d92d49e6f7f296260da1af355f941eb25360c4'
  | join DeviceFileEvents on SHA1
  | distinct DeviceName, FileName, FolderPath, SHA1, SHA256, IsTrusted, IsRootSignerMicrosoft, SignerHash
  //| distinct DeviceName
  //| distinct FileName
  //| summarize mylist = make_list(FileName) by DeviceName

Required Data Sources

Sentinel TableNotes
DeviceFileEventsEnsure this data connector is enabled

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Campaigns/compromised-certificate[Nobelium].yaml