Suspicious File Created by ArcSOC.exe

Detects instances where the ArcGIS Server process ArcSOC.exe, which hosts REST services running on an ArcGIS server, creates a file with suspicious file type, indicating that it may be an executable, script file, or otherwise unusual.

Sigma rule (View on GitHub)

 1title: Suspicious File Created by ArcSOC.exe
 2id: e890acee-d488-420e-8f20-d9b19b3c3d43
 3status: experimental
 4description: |
 5    Detects instances where the ArcGIS Server process ArcSOC.exe, which hosts REST services running on an ArcGIS
 6    server, creates a file with suspicious file type, indicating that it may be an executable, script file,
 7    or otherwise unusual.    
 8references:
 9    - https://reliaquest.com/blog/threat-spotlight-inside-flax-typhoons-arcgis-compromise/
10    - https://enterprise.arcgis.com/en/server/12.0/administer/windows/inside-an-arcgis-server-site.htm
11author: Micah Babinski
12date: 2025-11-25
13tags:
14    - attack.defense-evasion
15    - attack.command-and-control
16    - attack.persistence
17    - attack.initial-access
18    - attack.t1127
19    - attack.t1105
20    - attack.t1133
21logsource:
22    category: file_event
23    product: windows
24detection:
25    selection:
26        Image|endswith: '\ArcSOC.exe'
27        TargetFilename|endswith:
28            - '.ahk'
29            - '.aspx'
30            - '.au3'
31            - '.bat'
32            - '.cmd'
33            - '.dll'
34            - '.exe'
35            - '.hta'
36            - '.js'
37            - '.ps1'
38            - '.py'
39            - '.vbe'
40            - '.vbs'
41            - '.wsf'
42    condition: selection
43falsepositives:
44    - Unlikely
45level: high

References

Related rules

to-top