Name:Azure Automation Runbook Created id:178d696d-6dc6-4ee8-9d25-93fee34eaf5b version:8 date:2025-02-10 author:Mauricio Velazco, Splunk status:production type:TTP Description:The following analytic detects the creation of a new Azure Automation Runbook within an Azure tenant. It leverages Azure Audit events, specifically the Azure Activity log category, to identify when a new Runbook is created or updated. This activity is significant because adversaries with privileged access can use Runbooks to maintain persistence, escalate privileges, or execute malicious code. If confirmed malicious, this could lead to unauthorized actions such as creating Global Administrators, executing code on VMs, and compromising the entire Azure environment. Data_source:
-Azure Audit Create or Update an Azure Automation Runbook
search:`azure_audit` operationName.localizedValue="Create or Update an Azure Automation Runbook" object!=AzureAutomationTutorial* status.value=Succeeded | dedup object | rename claims.ipaddr as src, subscriptionId as vendor_account, operationName.localizedValue as operationName | stats count min(_time) as firstTime max(_time) as lastTime by dest user src vendor_account vendor_product object object_path | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)` | `azure_automation_runbook_created_filter`