← Back to SOC feed Coverage →

BloodHound Collection Files

sigma HIGH SigmaHQ
T1087.001T1087.002T1482T1069.001T1069.002T1059.001
imFileEvent
This detection content is auto-generated from open-source rule repositories and enriched with AI analysis. Always validate rules in a test environment before deploying to production Sentinel workspaces.
View original rule at SigmaHQ →
Retrieved: 2026-03-19T03:46:59Z · Confidence: medium

Hunt Hypothesis

Detects default file names outputted by the BloodHound collection tool SharpHound

Detection Rule

Sigma (Original)

title: BloodHound Collection Files
id: 02773bed-83bf-469f-b7ff-e676e7d78bab
status: test
description: Detects default file names outputted by the BloodHound collection tool SharpHound
references:
    - https://academy.hackthebox.com/course/preview/active-directory-bloodhound/bloodhound--data-collection
author: C.J. May
date: 2022-08-09
modified: 2026-02-19
tags:
    - attack.discovery
    - attack.t1087.001
    - attack.t1087.002
    - attack.t1482
    - attack.t1069.001
    - attack.t1069.002
    - attack.execution
    - attack.t1059.001
logsource:
    product: windows
    category: file_event
detection:
    selection:
        TargetFilename|endswith:
            - 'BloodHound.zip'
            - '_computers.json'
            - '_containers.json'
            # - '_domains.json'  # prone to false positives with ProbabilisticRevealTokenRegistry function in Google Chrome
            - '_gpos.json'
            - '_groups.json'
            - '_ous.json'
            - '_users.json'
    filter_optional_ms_winapps:
        Image|endswith: '\svchost.exe'
        TargetFilename|startswith: 'C:\Program Files\WindowsApps\Microsoft.'
        TargetFilename|endswith: '\pocket_containers.json'
    condition: selection and not 1 of filter_optional_*
falsepositives:
    - Some false positives may arise in some environment and this may require some tuning. Add additional filters or reduce level depending on the level of noise
level: high

KQL (Azure Sentinel)

imFileEvent
| where (TargetFileName endswith "BloodHound.zip" or TargetFileName endswith "_computers.json" or TargetFileName endswith "_containers.json" or TargetFileName endswith "_gpos.json" or TargetFileName endswith "_groups.json" or TargetFileName endswith "_ous.json" or TargetFileName endswith "_users.json") and (not((TargetFilePath endswith "\\svchost.exe" and TargetFileName startswith "C:\\Program Files\\WindowsApps\\Microsoft." and TargetFileName endswith "\\pocket_containers.json")))

Required Data Sources

Sentinel TableNotes
imFileEventEnsure this data connector is enabled

False Positive Guidance

MITRE ATT&CK Context

Commands such a

Validation (Atomic Red Team)

Use these Atomic Red Team tests to validate this detection fires correctly:

References

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/file/file_event/file_event_win_bloodhound_collection.yml