COLDSTEEL RAT Cleanup Command Execution
Detects the creation of a "rundll32" process from the ColdSteel persistence service to initiate the cleanup command by calling one of its own exports. This functionality is not present in "MileStone2017" and some "MileStone2016" samples
Sigma rule (View on GitHub)
1title: COLDSTEEL RAT Cleanup Command Execution
2id: 88516f06-ebe0-47ad-858e-ae9fd060ddea
3status: test
4description: Detects the creation of a "rundll32" process from the ColdSteel persistence service to initiate the cleanup command by calling one of its own exports. This functionality is not present in "MileStone2017" and some "MileStone2016" samples
5references:
6 - https://www.ncsc.gov.uk/static-assets/documents/malware-analysis-reports/cold-steel/NCSC-MAR-Cold-Steel.pdf
7author: Nasreddine Bencherchali (Nextron Systems)
8date: 2023-04-30
9tags:
10 - attack.persistence
11 - attack.defense-evasion
12 - detection.emerging-threats
13logsource:
14 category: process_creation
15 product: windows
16detection:
17 selection:
18 ParentImage|endswith: '\svchost.exe'
19 ParentCommandLine|contains:
20 - ' -k msupdate'
21 - ' -k msupdate2'
22 - ' -k alg'
23 Image|endswith: '\rundll32.exe'
24 CommandLine|contains:
25 - 'UpdateDriverForPlugAndPlayDevicesW'
26 - 'ServiceMain'
27 - 'DiUninstallDevice'
28 condition: selection
29falsepositives:
30 - Unlikely
31level: critical
References
Related rules
- COLDSTEEL Persistence Service Creation
- COLDSTEEL RAT Anonymous User Process Execution
- COLDSTEEL RAT Service Persistence Execution
- OilRig APT Activity
- OilRig APT Registry Persistence