← Back to SOC feed Coverage →

This is a patched CMD. This is the CMD that RoyalCli uses.

yara LOW Yara-Rules
community
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Yara-Rules →
Retrieved: 2026-05-19T11:00:00Z · Confidence: medium

Hunt Hypothesis

The detection identifies the use of a modified CMD executable associated with the RoyalCli tool, which may indicate the presence of a compromised or malicious command-line interface. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential adversary activity leveraging custom or patched command-line tools for persistence or execution.

YARA Rule

rule clean_apt15_patchedcmd{
	meta:
		author = "Ahmed Zaki"
		description = "This is a patched CMD. This is the CMD that RoyalCli uses."
		reference = "https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2018/march/apt15-is-alive-and-strong-an-analysis-of-royalcli-and-royaldns/"
		sha256 = "90d1f65cfa51da07e040e066d4409dc8a48c1ab451542c894a623bc75c14bf8f"
	strings:
	    $ = "eisableCMD" wide
	    $ = "%WINDOWS_COPYRIGHT%" wide
	    $ = "Cmd.Exe" wide
	    $ = "Windows Command Processor" wide
	condition:
        	all of them
}

Deployment Notes

This YARA rule can be deployed in the following contexts:

References

False Positive Guidance

Original source: https://github.com/Yara-Rules/rules/blob/main/malware/APT_APT15.yar