← Back to SOC feed Coverage →

snip3-detectsanboxie-function-call

kql MEDIUM Azure-Sentinel
DeviceEvents
backdoorhuntingmicrosoftofficialpowershell
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-07T11:00:00Z · Confidence: medium

Hunt Hypothesis

Snip3 malware may attempt to execute sandbox detection functions to evade analysis environments. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential Snip3 infections and prevent lateral movement and data exfiltration.

KQL Query

DeviceEvents
| where ActionType == "PowerShellCommand" 
| where AdditionalFields == "{\"Command\":\"DetectSandboxie\"}"

Analytic Rule Definition

id: 32664c67-34d7-4c7a-88cd-c48b55b7ef91
name: snip3-detectsanboxie-function-call
description: |
  Snip3 is a family of related remote access trojans. Although the malware in this family contain numerous small variations, they all exhibit similar behaviors and techniques.
  The following query looks for a function call to a method named DetectSandboxie. This method is used in RevengeRAT and AsyncRAT instances involved in a campaign targeting the aviation industry, first observed in 2021. It has also been associated in the past other malware, such as WannaCry and QuasarRAT. Individual PowerShell functions can be detected in the same way in some instances, though care should be taken to ensure that the command name is unique -- otherwise, this query may return many false positives.
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - DeviceEvents
tactics:
- Execution
- Defense evasion
query: |
  DeviceEvents
  | where ActionType == "PowerShellCommand" 
  | where AdditionalFields == "{\"Command\":\"DetectSandboxie\"}"

Required Data Sources

Sentinel TableNotes
DeviceEventsEnsure this data connector is enabled

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Campaigns/snip3-detectsanboxie-function-call.yaml