← Back to SOC feed Coverage →

Ransomware hits healthcare - Turning off System Restore

kql MEDIUM Azure-Sentinel
DeviceProcessEvents
huntingmicrosoftofficialransomware
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-05T23:00:00Z · Confidence: medium

Hunt Hypothesis

Adversaries may disable System Restore to prevent data recovery and hinder forensic analysis, which is a common tactic in ransomware attacks. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential ransomware activity early and mitigate impact on critical healthcare systems.

KQL Query

DeviceProcessEvents  
| where Timestamp > ago(7d)  
// Pivoting for rundll32  
and InitiatingProcessFileName =~ 'rundll32.exe'   
// Looking for empty command line   
and isnotempty(InitiatingProcessCommandLine)  
// Looking for schtasks.exe as the created process  
and FileName in~ ('schtasks.exe')  
// Disabling system restore   
and ProcessCommandLine has 'Change' and ProcessCommandLine has 'SystemRestore' 
and ProcessCommandLine has 'disable'

Analytic Rule Definition

id: c6387bdd-c0ee-4b88-bbc2-3897586ecdda
name: Ransomware hits healthcare - Turning off System Restore
description: |
  Find attempts to stop System Restore and.
  Prevent the system from creating restore points.
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - DeviceProcessEvents
query: |
  DeviceProcessEvents  
  | where Timestamp > ago(7d)  
  // Pivoting for rundll32  
  and InitiatingProcessFileName =~ 'rundll32.exe'   
  // Looking for empty command line   
  and isnotempty(InitiatingProcessCommandLine)  
  // Looking for schtasks.exe as the created process  
  and FileName in~ ('schtasks.exe')  
  // Disabling system restore   
  and ProcessCommandLine has 'Change' and ProcessCommandLine has 'SystemRestore' 
  and ProcessCommandLine has 'disable'

Required Data Sources

Sentinel TableNotes
DeviceProcessEventsEnsure this data connector is enabled

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Campaigns/Ransomware hits healthcare - Turning off System Restore.yaml