← Back to SOC feed Coverage →

locate-files-possibly-signed-by-fraudulent-ecc-certificates

kql MEDIUM Azure-Sentinel
exploithuntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-08T11:00:00Z · Confidence: medium

Hunt Hypothesis

Adversaries may use fraudulent ECC certificates to sign malicious files, bypassing certificate validation and executing code without detection. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential exploitation of the CVE-2020-0601 vulnerability and mitigate advanced persistent threats.

KQL Query

DeviceFileCertificateInfo
| where Timestamp > ago(30d)
| where IsSigned == 1 and IsTrusted == 1 and IsRootSignerMicrosoft == 1
| where SignatureType == "Embedded"
| where Issuer !startswith "Microsoft" and Issuer !startswith "Windows"
| project Timestamp, DeviceName,SHA1,Issuer,IssuerHash,Signer,SignerHash,
CertificateCreationTime,CertificateExpirationTime,CrlDistributionPointUrls

Analytic Rule Definition

id: d8f2e268-68a6-4f09-abd1-2568462bcaf5
name: locate-files-possibly-signed-by-fraudulent-ecc-certificates
description: |
  This query was originally published in the threat analytics report, CVE-2020-0601 certificate validation vulnerability.
  The Windows CryptoAPI Spoofing Vulnerability, CVE-2020-0601, can be exploited to spoof code-signing certificates. For example, an attacker could forge a certificate that lists Microsoft as the issuer. This would allow an attacker to disguise a malicious executable as legitimate.
  The vulnerability was patched with the January 2020 Security Update.
  Use the following query to locate files containing ECC certificates that might have been forged using this vulnerability. The query identifies files that don't correctly identify the signer name, yet list Microsoft as the root signer.
  References:
  https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2020-0601
  https://portal.msrc.microsoft.com/security-guidance/releasenotedetail/2020-Jan
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - DeviceFileCertificateInfo
tactics:
- Defense evasion
query: |
  DeviceFileCertificateInfo
  | where Timestamp > ago(30d)
  | where IsSigned == 1 and IsTrusted == 1 and IsRootSignerMicrosoft == 1
  | where SignatureType == "Embedded"
  | where Issuer !startswith "Microsoft" and Issuer !startswith "Windows"
  | project Timestamp, DeviceName,SHA1,Issuer,IssuerHash,Signer,SignerHash,
  CertificateCreationTime,CertificateExpirationTime,CrlDistributionPointUrls

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Defense evasion/locate-files-possibly-signed-by-fraudulent-ecc-certificates.yaml