Skip to content

Conversation

@mbabinski
Copy link
Contributor

Summary of the Pull Request

These rules pertain to the ArcSOC.exe process component of ArcGIS Server. My research indicates that they would be the initiating process of malicious activities as outlined in this recent threat report from ReliaQuest: https://reliaquest.com/blog/threat-spotlight-inside-flax-typhoons-arcgis-compromise/

Changelog

new: ArcSOC.exe Creating Suspicious Files
new: Suspicious ArcSOC.exe Child Process

Example Log Event

Fixed Issues

SigmaHQ Rule Creation Conventions

  • If your PR adds new rules, please consider following and applying these conventions

@github-actions github-actions bot added Rules Review Needed The PR requires review Windows Pull request add/update windows related rules labels Nov 25, 2025
@nasbench nasbench added this to the Sigma-January-Release milestone Nov 26, 2025
Copy link
Member

@nasbench nasbench left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for this PR @mbabinski. Below are some open questions and suggestions.

mbabinski and others added 3 commits November 28, 2025 14:26
Updated the description for clarity and added 'wmic.exe' to the list of suspicious child processes.
Copy link
Member

@nasbench nasbench left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM.

@nasbench
Copy link
Member

nasbench commented Dec 2, 2025

@mbabinski qq for you. Do you happen to have an .evtx file containing logs of this chain.
In case you were not aware, we started enforcing a regression test that is linked to a rule and that will determine its status.

Are you able to generate or provide such evtx?

Copy link
Member

@frack113 frack113 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@@ -0,0 +1,44 @@
title: Suspicious File Created by ArcSOC.exe
id: e890acee-d488-420e-8f20-d9b19b3c3d43
status: experimental
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Waiting for possible log

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hey @nasbench, unfortunately I don't have access to ArcGIS Server - if I did I would create a server object extension that does something benign like just runs whoami. I reached out to people at ReliaQuest and Esri trying to get more information and specific log entries related to the intrusion but sadly I did not hear back.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Review Needed The PR requires review Rules Windows Pull request add/update windows related rules

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants