Statistical Model Detected C2 Beaconing Activity

A statistical model has identified command-and-control (C2) beaconing activity. Beaconing can help attackers maintain stealthy communication with their C2 servers, receive instructions and payloads, exfiltrate data and maintain persistence in a network.

Elastic rule (View on GitHub)

 1[metadata]
 2creation_date = "2023/09/22"
 3integration = ["beaconing", "endpoint", "network_traffic"]
 4maturity = "production"
 5min_stack_comments = "Beaconing package updates and support"
 6min_stack_version = "8.10.1"
 7updated_date = "2024/01/05"
 8
 9[rule]
10author = ["Elastic"]
11description = """
12A statistical model has identified command-and-control (C2) beaconing activity. Beaconing can help attackers maintain
13stealthy communication with their C2 servers, receive instructions and payloads, exfiltrate data and maintain
14persistence in a network.
15"""
16from = "now-1h"
17index = ["ml_beaconing.all"]
18language = "kuery"
19license = "Elastic License v2"
20name = "Statistical Model Detected C2 Beaconing Activity"
21setup = """## Setup
22
23The rule requires the Network Beaconing Identification integration assets to be installed, as well as network logs collected by the Elastic Defend or Network Packet Capture integrations.
24
25### Network Beaconing Identification Setup
26The Network Beaconing Identification integration consists of a statistical framework to identify C2 beaconing activity in network logs.
27
28#### Prerequisite Requirements:
29- Fleet is required for Network Beaconing Identification.
30- To configure Fleet Server refer to the [documentation](https://www.elastic.co/guide/en/fleet/current/fleet-server.html).
31- Network events collected by the [Elastic Defend](https://docs.elastic.co/en/integrations/endpoint) or [Network Packet Capture](https://docs.elastic.co/integrations/network_traffic) integration.
32- To install Elastic Defend, refer to the [documentation](https://www.elastic.co/guide/en/security/current/install-endpoint.html).
33- To add the Network Packet Capture integration to an Elastic Agent policy, refer to [this](https://www.elastic.co/guide/en/fleet/current/add-integration-to-policy.html) guide.
34
35#### The following steps should be executed to install assets associated with the Network Beaconing Identification integration:
36- Go to the Kibana homepage. Under Management, click Integrations.
37- In the query bar, search for Network Beaconing Identification and select the integration to see more details about it.
38- Under Settings, click "Install Network Beaconing Identification assets" and follow the prompts to install the assets.
39"""
40references = [
41    "https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html",
42    "https://docs.elastic.co/en/integrations/beaconing",
43    "https://www.elastic.co/security-labs/identifying-beaconing-malware-using-elastic",
44]
45risk_score = 21
46rule_id = "5397080f-34e5-449b-8e9c-4c8083d7ccc6"
47severity = "low"
48tags = ["Domain: Network", "Use Case: C2 Beaconing Detection", "Tactic: Command and Control"]
49type = "query"
50timestamp_override = "event.ingested"
51
52query = '''
53beacon_stats.is_beaconing: true and
54not process.name: ("WaAppAgent.exe" or "metricbeat.exe" or "packetbeat.exe" or "WindowsAzureGuestAgent.exe" or "HealthService.exe" or "Widgets.exe" or "lsass.exe" or "msedgewebview2.exe" or "MsMpEng.exe" or "OUTLOOK.EXE" or "msteams.exe" or "FileSyncHelper.exe" or "SearchProtocolHost.exe" or "Creative Cloud.exe" or "ms-teams.exe" or "ms-teamsupdate.exe" or "curl.exe" or "rundll32.exe" or "MsSense.exe" or "wermgr.exe" or "java" or "olk.exe" or "iexplore.exe" or "NetworkManager" or "packetbeat" or "Ssms.exe" or "NisSrv.exe" or "gamingservices.exe" or "appidcertstorecheck.exe" or "POWERPNT.EXE" or "miiserver.exe" or "Grammarly.Desktop.exe" or "SnagitEditor.exe" or "CRWindowsClientService.exe")
55'''
56
57
58[[rule.threat]]
59framework = "MITRE ATT&CK"
60[[rule.threat.technique]]
61id = "T1102"
62name = "Web Service"
63reference = "https://attack.mitre.org/techniques/T1102/"
64[[rule.threat.technique.subtechnique]]
65id = "T1102.002"
66name = "Bidirectional Communication"
67reference = "https://attack.mitre.org/techniques/T1102/002/"
68
69
70
71[rule.threat.tactic]
72id = "TA0011"
73name = "Command and Control"
74reference = "https://attack.mitre.org/tactics/TA0011/"

References

Related rules

to-top