← Back to SOC feed Coverage →

KNOTWEED-PE File Dropped in Color Profile Folder

kql MEDIUM Azure-Sentinel
DeviceFileEvents
huntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-05T03:15:55Z · Confidence: medium

Hunt Hypothesis

Adversaries may drop malicious PE files in the color profile folder to evade detection by hiding malicious activity within legitimate system directories. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential lateral movement or persistence mechanisms that leverage trusted system locations.

KQL Query

// PE file dropped in C:\Windows\System32\spool\drivers\color\
DeviceFileEvents
| where Timestamp > ago(7d)
| where ActionType == "FileCreated"
| where FolderPath has "C:\\Windows\\System32\\spool\\drivers\\color\\"
| where FileName endswith ".exe" or FileName endswith ".dll"

Analytic Rule Definition

id: cfdb2ccb-0eb3-47ed-9220-d56795906fdc
name: KNOTWEED-PE File Dropped in Color Profile Folder
description: |
  'This query identifies modifications to COM registry keys to point to executable files in C:\Windows\System32\spool\drivers\color\'
requiredDataConnectors:
  - connectorId: MicrosoftThreatProtection
    dataTypes:
      - DeviceFileEvents
tactics:
relevantTechniques:
query: |
  // PE file dropped in C:\Windows\System32\spool\drivers\color\
  DeviceFileEvents
  | where Timestamp > ago(7d)
  | where ActionType == "FileCreated"
  | where FolderPath has "C:\\Windows\\System32\\spool\\drivers\\color\\"
  | where FileName endswith ".exe" or FileName endswith ".dll"

Required Data Sources

Sentinel TableNotes
DeviceFileEventsEnsure this data connector is enabled

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Campaigns/KNOTWEED/KNOTWEED-PEFileDroppedinColorProfileFolder.yaml