← Back to SOC feed Coverage →

Potential Suspicious Change To Sensitive/Critical Files

sigma MEDIUM SigmaHQ
T1565.001
imProcessCreate
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T02:50:08Z · Confidence: medium

Hunt Hypothesis

Adversaries may modify sensitive or critical files to alter system behavior or exfiltrate data, leveraging T1565.001 to persist or execute malicious code. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential compromise of critical assets and prevent further lateral movement or data theft.

Detection Rule

Sigma (Original)

title: Potential Suspicious Change To Sensitive/Critical Files
id: 86157017-c2b1-4d4a-8c33-93b8e67e4af4
status: test
description: Detects changes of sensitive and critical files. Monitors files that you don't expect to change without planning on Linux system.
references:
    - https://learn.microsoft.com/en-us/azure/defender-for-cloud/file-integrity-monitoring-overview#which-files-should-i-monitor
author: '@d4ns4n_ (Wuerth-Phoenix)'
date: 2023-05-30
tags:
    - attack.impact
    - attack.t1565.001
logsource:
    category: process_creation
    product: linux
detection:
    selection_img_1:
        Image|endswith:
            - '/cat'
            - '/echo'
            - '/grep'
            - '/head'
            - '/more'
            - '/tail'
        CommandLine|contains: '>'
    selection_img_2:
        Image|endswith:
            - '/emacs'
            - '/nano'
            - '/sed'
            - '/vi'
            - '/vim'
    selection_paths:
        CommandLine|contains:
            - '/bin/login'
            - '/bin/passwd'
            - '/boot/'
            - '/etc/*.conf'
            - '/etc/cron.' # Covers different cron config files "daily", "hourly", etc.
            - '/etc/crontab'
            - '/etc/hosts'
            - '/etc/init.d'
            - '/etc/sudoers'
            - '/opt/bin/'
            - '/sbin' # Covers: '/opt/sbin', '/usr/local/sbin/', '/usr/sbin/'
            - '/usr/bin/'
            - '/usr/local/bin/'
    condition: 1 of selection_img_* and selection_paths
falsepositives:
    - Some false positives are to be expected on user or administrator machines. Apply additional filters as needed.
level: medium

KQL (Azure Sentinel)

imProcessCreate
| where (((TargetProcessName endswith "/cat" or TargetProcessName endswith "/echo" or TargetProcessName endswith "/grep" or TargetProcessName endswith "/head" or TargetProcessName endswith "/more" or TargetProcessName endswith "/tail") and TargetProcessCommandLine contains ">") or (TargetProcessName endswith "/emacs" or TargetProcessName endswith "/nano" or TargetProcessName endswith "/sed" or TargetProcessName endswith "/vi" or TargetProcessName endswith "/vim")) and (TargetProcessCommandLine contains "/bin/login" or TargetProcessCommandLine contains "/bin/passwd" or TargetProcessCommandLine contains "/boot/" or (TargetProcessCommandLine contains "/etc/" and TargetProcessCommandLine contains ".conf") or TargetProcessCommandLine contains "/etc/cron." or TargetProcessCommandLine contains "/etc/crontab" or TargetProcessCommandLine contains "/etc/hosts" or TargetProcessCommandLine contains "/etc/init.d" or TargetProcessCommandLine contains "/etc/sudoers" or TargetProcessCommandLine contains "/opt/bin/" or TargetProcessCommandLine contains "/sbin" or TargetProcessCommandLine contains "/usr/bin/" or TargetProcessCommandLine contains "/usr/local/bin/")

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/linux/process_creation/proc_creation_lnx_susp_sensitive_file_access.yml