Potential COLDSTEEL Persistence Service DLL Load
Detects a suspicious DLL load by an "svchost" process based on location and name that might be related to ColdSteel RAT. This DLL location and name has been seen used by ColdSteel as the service DLL for its persistence mechanism
Sigma rule (View on GitHub)
1title: Potential COLDSTEEL Persistence Service DLL Load
2id: 1d7a57da-02e0-4f7f-92b1-c7b486ccfed5
3status: test
4description: |
5 Detects a suspicious DLL load by an "svchost" process based on location and name that might be related to ColdSteel RAT. This DLL location and name has been seen used by ColdSteel as the service DLL for its persistence mechanism
6references:
7 - https://www.ncsc.gov.uk/static-assets/documents/malware-analysis-reports/cold-steel/NCSC-MAR-Cold-Steel.pdf
8author: Nasreddine Bencherchali (Nextron Systems)
9date: 2023-05-02
10tags:
11 - attack.persistence
12 - attack.defense-evasion
13 - detection.emerging-threats
14logsource:
15 product: windows
16 category: image_load
17detection:
18 selection:
19 Image|endswith: '\svchost.exe'
20 ImageLoaded|endswith: '\AppData\Roaming\newdev.dll'
21 condition: selection
22falsepositives:
23 - Unlikely
24level: high
References
Related rules
- COLDSTEEL Persistence Service Creation
- COLDSTEEL RAT Anonymous User Process Execution
- COLDSTEEL RAT Cleanup Command Execution
- COLDSTEEL RAT Service Persistence Execution
- OilRig APT Activity