AZT302.1 - Unmanaged Scripting: Automation Account Hybrid Worker Group#
By utilizing an Automation Account configured with a Hybrid Worker Group, an attacker can execute Azure commands on any Azure VM within that Hybrid Worker Group.
Resource
Automation Account
Actions
- Microsoft.Automation/automationAccounts/runbooks/draft/write
- Microsoft.Automation/automationAccounts/runbooks/write
- Microsoft.Automation/automationAccounts/runbooks/publish/action
- Microsoft.Automation/automationAccounts/jobs/write
Examples
Detections
Detection Details#
It is recommended to turn on verbose logging for Automation Accounts. Note that the listed query requires Azure Diagnostics turned on for the resource.
Logs#
Data Source | Operation Name | Action/On-Disk Location | Log Provider |
---|---|---|---|
Resource | Create an Azure Automation job | Microsoft.Automation/automationAccounts/jobs/write | AzureActivity |
Resource | Publish an Azure Automation runbook draft | Microsoft.Automation/automationAccounts/runbooks/publish/action | AzureActivity |
Resource | Write an Azure Automation runbook draft | Microsoft.Automation/automationAccounts/runbooks/draft/write | AzureActivity |
Resource | Create or Update an Azure Automation Runbook | Microsoft.Automation/automationAccounts/runbooks/write | AzureActivity |
On Target Resource File (Windows) | File Creation | C:\Packages\Plugins\Microsoft.Azure.Automation.HybridWorker.HybridWorkerForWindows\0.1.0.18\Status | Event |
Queries#
Platform | Query |
---|---|
Log Analytics | AzureDiagnostics | where ResourceType == 'AUTOMATIONACCOUNTS' and RunOn_s != '' |
Azure Monitor Alert#
Additional Resources
https://docs.microsoft.com/en-us/azure/automation/automation-runbook-execution