← Back to SOC feed Coverage →

Electron-CVE-2018-1000006

kql MEDIUM Azure-Sentinel
DeviceProcessEvents
exploithuntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-21T23:00:01Z · Confidence: medium

Hunt Hypothesis

Processes with command line arguments indicative of Electron-based applications may be attempting to exploit the Protocol Handler Vulnerability (CVE-2018-1000006) through abnormal parent-child process relationships, which could lead to unauthorized code execution. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify and mitigate potential exploitation of the Electron framework vulnerability before it leads to a broader compromise.

KQL Query

DeviceProcessEvents 
| where Timestamp > ago(14d) 
| where FileName in~ ("code.exe", "skype.exe", "slack.exe", "teams.exe") 
| where InitiatingProcessFileName in~ ("iexplore.exe", "runtimebroker.exe", "chrome.exe") 
| where ProcessCommandLine has "--gpu-launcher"  
| summarize FirstEvent=min(Timestamp), LastEvent=max(Timestamp) by DeviceName, ProcessCommandLine, FileName, InitiatingProcessFileName

Analytic Rule Definition

id: 2953f075-035c-4803-9ea2-a9b0771ffc3d
name: Electron-CVE-2018-1000006
description: |
  The query checks process command lines arguments and parent/child combinations to find machines where there have been.
  Attempts to exploit the Protocol Handler Vulnerability of Electron framework CVE-2018-1000006.
  Electron is a common framework used by many popular applications (e.g. Skype, Teams, Slack, VSCode) which expose protocol handlers.
  Which can trigger a remote code execution vulnerability via a browser vector (e.g. Chrome, Internet Explorer, Edge).
  CVE: CVE-2018-1000006.
  Read more here:.
  Https://electronjs.org/blog/protocol-handler-fix.
  Https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000006.
  Https://www.exploit-db.com/exploits/43899.
  Https://hackernoon.com/exploiting-electron-rce-in-exodus-wallet-d9e6db13c374.
  Tags: #exploit #CVE-2018-1000006 #Electron.
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - DeviceProcessEvents
query: |
  DeviceProcessEvents 
  | where Timestamp > ago(14d) 
  | where FileName in~ ("code.exe", "skype.exe", "slack.exe", "teams.exe") 
  | where InitiatingProcessFileName in~ ("iexplore.exe", "runtimebroker.exe", "chrome.exe") 
  | where ProcessCommandLine has "--gpu-launcher"  
  | summarize FirstEvent=min(Timestamp), LastEvent=max(Timestamp) by DeviceName, ProcessCommandLine, FileName, InitiatingProcessFileName

Required Data Sources

Sentinel TableNotes
DeviceProcessEventsEnsure this data connector is enabled

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Exploits/Electron-CVE-2018-1000006.yaml