← Back to SOC feed Coverage →

wadhrama-credential-dump

kql MEDIUM Azure-Sentinel
DeviceRegistryEvents
backdoorcredential-thefthuntingmicrosoftofficialransomware
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-08T11:00:00Z · Confidence: medium

Hunt Hypothesis

The hypothesis is that the detection identifies potential credential dumping activity associated with the Wadhrama ransomware, which adversaries may use to maintain persistence and escalate privileges within a network. SOC teams should proactively hunt for this behavior in Azure Sentinel to detect and mitigate early-stage Wadhrama ransomware infections before significant damage occurs.

KQL Query

// Find use of Image File Execution Options (IFEO) in conjunction
// with a .bat file to dump credentials
DeviceRegistryEvents
| where Timestamp > ago(7d)
| where RegistryKey has "sethc" or RegistryKey has "utilman"

Analytic Rule Definition

id: 8348d279-c95f-4dbe-b952-65048dc06559
name: wadhrama-credential-dump
description: |
  This query was originally published in the threat analytics report, RDP ransomware persists as Wadhrama.
  The ransomware known as Wadhrama has been used in human-operated attacks that follow a particular pattern. The attackers often use Remote Desktop Protocol (RDP) to gain initial access to a device or network, exfiltrate credentials, and maintain persistance.
  The following query checks for possible Wadhrama-related activity, by detecting the technique these attackers have used in the past to dump credentials.
  Other techniques used by the group associated with Wadhrama are listed under See also.
  Reference - https://www.microsoft.com/wdsi/threats/malware-encyclopedia-description?Name=Ransom:Win32/Wadhrama
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - DeviceRegistryEvents
tactics:
- Credential Access
- Impact
query: |
  // Find use of Image File Execution Options (IFEO) in conjunction
  // with a .bat file to dump credentials
  DeviceRegistryEvents
  | where Timestamp > ago(7d)
  | where RegistryKey has "sethc" or RegistryKey has "utilman"

Required Data Sources

Sentinel TableNotes
DeviceRegistryEventsEnsure this data connector is enabled

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Credential Access/wadhrama-credential-dump.yaml