← Back to SOC feed Coverage →

winrar-cve-2018-20250-file-creation

kql MEDIUM Azure-Sentinel
DeviceFileEvents
exploithuntingmicrosoftofficialpersistence
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-22T11:00:00Z · Confidence: medium

Hunt Hypothesis

Adversaries may exploit the WinRAR CVE-2018-20250 vulnerability to create arbitrary files and execute malicious code through crafted archive files. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential exploitation of outdated WinRAR installations and mitigate lateral movement or persistence risks.

KQL Query

//Query for WinRAR file creation in the Startup folder
DeviceFileEvents
| where Timestamp > ago(7d)
//Look for WinRAR as the initiating process or a commandline that has ".rar" 
| where (InitiatingProcessFileName =~ "winrar.exe" 
or InitiatingProcessCommandLine contains ".rar") 
//Check for the file in the Startup folder
and FolderPath contains "Programs\\Startup"

Analytic Rule Definition

id: 04eaf822-d364-4434-b2c8-a6378d97f192
name: winrar-cve-2018-20250-file-creation
description: |
  This query was originally published in the threat analytics report, WinRAR CVE-2018-20250 exploit
  WinRAR is a third-party file compressing application. Versions 5.61 and earlier contained a flaw that could be exploited by an attacker to read and write to an arbitrary path on the target's system. This could be used to run arbitrary code, overwrite system files, or access sensitive information. This vulnerability was designated CVE-2018-20250, and it is associated an outdated version of the legacy ACE compression library, 'unacev2.dll'.
  The following query detects possible CVE-2020-20250 exploitation by looking for files created in the Startup folder.
  Reference - https://nvd.nist.gov/vuln/detail/CVE-2018-20250
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - DeviceFileEvents
tactics:
- Execution
- Lateral movement
- Impact
query: |
  //Query for WinRAR file creation in the Startup folder
  DeviceFileEvents
  | where Timestamp > ago(7d)
  //Look for WinRAR as the initiating process or a commandline that has ".rar" 
  | where (InitiatingProcessFileName =~ "winrar.exe" 
  or InitiatingProcessCommandLine contains ".rar") 
  //Check for the file in the Startup folder
  and FolderPath contains "Programs\\Startup"

Required Data Sources

Sentinel TableNotes
DeviceFileEventsEnsure this data connector is enabled

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Exploits/winrar-cve-2018-20250-file-creation.yaml