← Back to SOC feed Coverage →

Dopplepaymer In-Memory Malware Implant

kql MEDIUM Azure-Sentinel
DeviceProcessEvents
huntingmicrosoftofficialransomware
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-05T03:15:55Z · Confidence: medium

Hunt Hypothesis

Processes with command line arguments matching known Dopplepaymer ransomware patterns indicate potential in-memory malware implant activity, suggesting an adversary may be establishing persistence or exfiltrating data. SOC teams should proactively hunt for this behavior in Azure Sentinel to detect early-stage ransomware attacks and mitigate data loss risks.

KQL Query

DeviceProcessEvents
| where Timestamp > ago(7d)
| where ProcessCommandLine startswith "-q -s {{" and ProcessCommandLine contains "}} -p "

Analytic Rule Definition

id: c7927ab6-63c8-41bc-a5d7-fc15826e2b57
name: Dopplepaymer In-Memory Malware Implant
description: |
  Dopplepaymer In-Memory Malware Implant.
  This query identifies processes with command line launch strings.
  Which match the pattern used in Dopplepaymer ransomware attacks.
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - DeviceProcessEvents
query: |
  DeviceProcessEvents
  | where Timestamp > ago(7d)
  | where ProcessCommandLine startswith "-q -s {{" and ProcessCommandLine contains "}} -p "

Required Data Sources

Sentinel TableNotes
DeviceProcessEventsEnsure this data connector is enabled

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Campaigns/Dopplepaymer In-Memory Malware Implant.yaml