← Back to SOC feed Coverage →

Potential Winnti Dropper Activity

sigma HIGH SigmaHQ
T1027
imFileEvent
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T03:05:59Z · Confidence: medium

Hunt Hypothesis

Files dropped by Winnti malware, as identified in the RedMimicry playbook, indicate potential adversary persistence and execution capabilities. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify and mitigate early-stage Winnti infections before they establish deeper network access.

Detection Rule

Sigma (Original)

title: Potential Winnti Dropper Activity
id: 130c9e58-28ac-4f83-8574-0a4cc913b97e
status: test
description: Detects files dropped by Winnti as described in RedMimicry Winnti playbook
references:
    - https://redmimicry.com/posts/redmimicry-winnti/#dropper
author: Alexander Rausch
date: 2020-06-24
modified: 2023-01-05
tags:
    - attack.defense-evasion
    - attack.t1027
logsource:
    product: windows
    category: file_event
detection:
    selection:
        TargetFilename|endswith:
            - '\gthread-3.6.dll'
            - '\sigcmm-2.4.dll'
            - '\Windows\Temp\tmp.bat'
    condition: selection
falsepositives:
    - Unknown
level: high

KQL (Azure Sentinel)

imFileEvent
| where TargetFileName endswith "\\gthread-3.6.dll" or TargetFileName endswith "\\sigcmm-2.4.dll" or TargetFileName endswith "\\Windows\\Temp\\tmp.bat"

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/file/file_event/file_event_win_redmimicry_winnti_filedrop.yml