← Back to SOC feed Coverage →

AcroRd-Exploits

kql MEDIUM Azure-Sentinel
DeviceFileEvents
exploithuntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-21T11:00:00Z · Confidence: medium

Hunt Hypothesis

The AcroRd-Exploits rule detects potential exploitation of Adobe Reader vulnerabilities through suspicious process creation and registry modifications indicative of malicious activity. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify and mitigate advanced persistent threat (APT) campaigns leveraging known zero-day exploits.

KQL Query

 
// Search for persistence in Statup folder that's done by Adobe Acrobat Reader.
// Normally, this behavior is not expected.
DeviceFileEvents 
| where
    InitiatingProcessFileName =~ "acrord32.exe"
    and FolderPath contains "\\Start Menu\\Programs\\Startup"  
| project FolderPath, DeviceName, Timestamp, FileName, InitiatingProcessCommandLine, SHA1

Analytic Rule Definition

id: c87df1a7-fa54-4730-bc90-cbc1f8ac01aa
name: AcroRd-Exploits
description: |
  The following query look for suspicious behaviors observed by the samples analyzed in the report.
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - DeviceFileEvents
query: |2-
   
  // Search for persistence in Statup folder that's done by Adobe Acrobat Reader.
  // Normally, this behavior is not expected.
  DeviceFileEvents 
  | where
      InitiatingProcessFileName =~ "acrord32.exe"
      and FolderPath contains "\\Start Menu\\Programs\\Startup"  
  | project FolderPath, DeviceName, Timestamp, FileName, InitiatingProcessCommandLine, SHA1

Required Data Sources

Sentinel TableNotes
DeviceFileEventsEnsure this data connector is enabled

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Exploits/AcroRd-Exploits.yaml