← Back to SOC feed Coverage →

Suspicious Creation with Colorcpl

sigma HIGH SigmaHQ
T1564
imFileEvent
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T03:05:59Z · Confidence: medium

Hunt Hypothesis

The hypothesis is that an adversary is leveraging the colorcpl.exe process to covertly copy malicious files into the system32 directory, potentially establishing persistence or executing payloads. SOC teams should proactively hunt for this behavior in Azure Sentinel to detect and mitigate advanced threats that exploit this technique to evade traditional detection methods.

Detection Rule

Sigma (Original)

title: Suspicious Creation with Colorcpl
id: e15b518d-b4ce-4410-a9cd-501f23ce4a18
status: test
description: Once executed, colorcpl.exe will copy the arbitrary file to c:\windows\system32\spool\drivers\color\
references:
    - https://twitter.com/eral4m/status/1480468728324231172?s=20
author: frack113
date: 2022-01-21
modified: 2023-01-05
tags:
    - attack.defense-evasion
    - attack.t1564
logsource:
    product: windows
    category: file_event
detection:
    selection:
        Image|endswith: '\colorcpl.exe'
    filter_ext:
        TargetFilename|endswith:
            - '.icm'
            - '.gmmp'
            - '.cdmp'
            - '.camp'
    condition: selection and not 1 of filter_*
falsepositives:
    - Unknown
level: high

KQL (Azure Sentinel)

imFileEvent
| where TargetFilePath endswith "\\colorcpl.exe" and (not((TargetFileName endswith ".icm" or TargetFileName endswith ".gmmp" or TargetFileName endswith ".cdmp" or TargetFileName endswith ".camp")))

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/file/file_event/file_event_win_susp_colorcpl.yml