Potential COLDSTEEL RAT Windows User Creation
Detects creation of a new user profile with a specific username, seen being used by some variants of the COLDSTEEL RAT.
Sigma rule (View on GitHub)
1title: Potential COLDSTEEL RAT Windows User Creation
2id: 95214813-4c7a-4a50-921b-ee5c538e1d16
3status: test
4description: Detects creation of a new user profile with a specific username, seen being used by some variants of the COLDSTEEL RAT.
5references:
6 - https://www.ncsc.gov.uk/static-assets/documents/malware-analysis-reports/cold-steel/NCSC-MAR-Cold-Steel.pdf
7author: Nasreddine Bencherchali (Nextron Systems)
8date: 2023-05-02
9modified: 2023-08-17
10tags:
11 - attack.persistence
12 - detection.emerging-threats
13logsource:
14 category: registry_set
15 product: windows
16detection:
17 selection:
18 TargetObject|contains|all:
19 - '\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\S-1-5-21-'
20 - '\ProfileImagePath'
21 Details|contains:
22 - 'ANONYMOUS'
23 - '_DomainUser_'
24 condition: selection
25falsepositives:
26 - Unknown
27level: high
References
Related rules
- COLDSTEEL Persistence Service Creation
- COLDSTEEL RAT Anonymous User Process Execution
- COLDSTEEL RAT Cleanup Command Execution
- COLDSTEEL RAT Service Persistence Execution
- CVE-2021-40539 Zoho ManageEngine ADSelfService Plus Exploit