← Back to SOC feed Coverage →

ADSI-Cache File Creation By Uncommon Tool

sigma MEDIUM SigmaHQ
T1001.003
imFileEvent
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T02:50:08Z · Confidence: medium

Hunt Hypothesis

The hypothesis is that an adversary is leveraging an uncommon tool to create ADSI-cache files to persist within the environment and evade detection. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential persistence mechanisms and disrupt advanced persistent threats.

Detection Rule

Sigma (Original)

title: ADSI-Cache File Creation By Uncommon Tool
id: 75bf09fa-1dd7-4d18-9af9-dd9e492562eb
status: test
description: Detects the creation of an "Active Directory Schema Cache File" (.sch) file by an uncommon tool.
references:
    - https://medium.com/@ivecodoe/detecting-ldapfragger-a-newly-released-cobalt-strike-beacon-using-ldap-for-c2-communication-c274a7f00961
    - https://blog.fox-it.com/2020/03/19/ldapfragger-command-and-control-over-ldap-attributes/
    - https://github.com/fox-it/LDAPFragger
author: xknow @xknow_infosec, Tim Shelton
date: 2019-03-24
modified: 2023-10-18
tags:
    - attack.t1001.003
    - attack.command-and-control
logsource:
    product: windows
    category: file_event
detection:
    selection:
        TargetFilename|contains: '\Local\Microsoft\Windows\SchCache\'
        TargetFilename|endswith: '.sch'
    filter_main_generic:
        - Image|endswith:
              - ':\Program Files\Cylance\Desktop\CylanceSvc.exe'
              - ':\Windows\CCM\CcmExec.exe'
              - ':\windows\system32\dllhost.exe'
              - ':\Windows\system32\dsac.exe'
              - ':\Windows\system32\efsui.exe'
              - ':\windows\system32\mmc.exe'
              - ':\windows\system32\svchost.exe'
              - ':\Windows\System32\wbem\WmiPrvSE.exe'
              - ':\windows\system32\WindowsPowerShell\v1.0\powershell.exe'
        - Image|contains:
              - ':\Windows\ccmsetup\autoupgrade\ccmsetup' # C:\Windows\ccmsetup\autoupgrade\ccmsetup.TMC00002.40.exe
              - ':\Program Files\SentinelOne\Sentinel Agent' # C:\Program Files\SentinelOne\Sentinel Agent 21.7.7.40005\SentinelAgent.exe
    filter_main_office:
        Image|contains|all:
            - ':\Program Files\'
            - '\Microsoft Office'
        Image|endswith: '\OUTLOOK.EXE'
    filter_optional_ldapwhoami:
        Image|endswith: '\LANDesk\LDCLient\ldapwhoami.exe'
    filter_optional_citrix:
        # Example:
        #   TargetFilename=C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\SchCache\REDACTED.com.sch
        Image|endswith: ':\Program Files\Citrix\Receiver StoreFront\Services\DefaultDomainServices\Citrix.DeliveryServices.DomainServices.ServiceHost.exe'
    condition: selection and not 1 of filter_main_* and not 1 of filter_optional_*
falsepositives:
    - Other legimate tools, which do ADSI (LDAP) operations, e.g. any remoting activity by MMC, Powershell, Windows etc.
level: medium

KQL (Azure Sentinel)

imFileEvent
| where (TargetFileName contains "\\Local\\Microsoft\\Windows\\SchCache\\" and TargetFileName endswith ".sch") and (not((((TargetFilePath endswith ":\\Program Files\\Cylance\\Desktop\\CylanceSvc.exe" or TargetFilePath endswith ":\\Windows\\CCM\\CcmExec.exe" or TargetFilePath endswith ":\\windows\\system32\\dllhost.exe" or TargetFilePath endswith ":\\Windows\\system32\\dsac.exe" or TargetFilePath endswith ":\\Windows\\system32\\efsui.exe" or TargetFilePath endswith ":\\windows\\system32\\mmc.exe" or TargetFilePath endswith ":\\windows\\system32\\svchost.exe" or TargetFilePath endswith ":\\Windows\\System32\\wbem\\WmiPrvSE.exe" or TargetFilePath endswith ":\\windows\\system32\\WindowsPowerShell\\v1.0\\powershell.exe") or (TargetFilePath contains ":\\Windows\\ccmsetup\\autoupgrade\\ccmsetup" or TargetFilePath contains ":\\Program Files\\SentinelOne\\Sentinel Agent")) or ((TargetFilePath contains ":\\Program Files\\" and TargetFilePath contains "\\Microsoft Office") and TargetFilePath endswith "\\OUTLOOK.EXE")))) and (not((TargetFilePath endswith "\\LANDesk\\LDCLient\\ldapwhoami.exe" or TargetFilePath endswith ":\\Program Files\\Citrix\\Receiver StoreFront\\Services\\DefaultDomainServices\\Citrix.DeliveryServices.DomainServices.ServiceHost.exe")))

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/file/file_event/file_event_win_adsi_cache_creation_by_uncommon_tool.yml