COLDSTEEL RAT Anonymous User Process Execution

Detects the creation of a process executing as user called "ANONYMOUS" seen used by the "MileStone2016" variant of COLDSTEEL

Sigma rule (View on GitHub)

 1title: COLDSTEEL RAT Anonymous User Process Execution
 2id: e01b6eb5-1eb4-4465-a165-85d40d874add
 3status: test
 4description: Detects the creation of a process executing as user called "ANONYMOUS" seen used by the "MileStone2016" variant of COLDSTEEL
 5references:
 6    - https://www.ncsc.gov.uk/static-assets/documents/malware-analysis-reports/cold-steel/NCSC-MAR-Cold-Steel.pdf
 7author: Nasreddine Bencherchali (Nextron Systems)
 8date: 2023-04-30
 9tags:
10    - attack.persistence
11    - attack.defense-evasion
12    - detection.emerging-threats
13logsource:
14    category: process_creation
15    product: windows
16detection:
17    selection:
18        ParentImage|contains:
19            - '\Windows\System32\'
20            - '\AppData\'
21        User|contains: 'ANONYMOUS'
22    condition: selection
23falsepositives:
24    - Unknown
25level: high

References

Related rules

to-top