COLDSTEEL RAT Anonymous User Process Execution
Detects the creation of a process executing as user called "ANONYMOUS" seen used by the "MileStone2016" variant of COLDSTEEL
Sigma rule (View on GitHub)
1title: COLDSTEEL RAT Anonymous User Process Execution
2id: e01b6eb5-1eb4-4465-a165-85d40d874add
3status: test
4description: Detects the creation of a process executing as user called "ANONYMOUS" seen used by the "MileStone2016" variant of COLDSTEEL
5references:
6 - https://www.ncsc.gov.uk/static-assets/documents/malware-analysis-reports/cold-steel/NCSC-MAR-Cold-Steel.pdf
7author: Nasreddine Bencherchali (Nextron Systems)
8date: 2023-04-30
9tags:
10 - attack.persistence
11 - attack.defense-evasion
12 - detection.emerging-threats
13logsource:
14 category: process_creation
15 product: windows
16detection:
17 selection:
18 ParentImage|contains:
19 - '\Windows\System32\'
20 - '\AppData\'
21 User|contains: 'ANONYMOUS'
22 condition: selection
23falsepositives:
24 - Unknown
25level: high
References
Related rules
- COLDSTEEL Persistence Service Creation
- COLDSTEEL RAT Cleanup Command Execution
- COLDSTEEL RAT Service Persistence Execution
- OilRig APT Activity
- OilRig APT Registry Persistence