Potential COLDSTEEL RAT Windows User Creation

Detects creation of a new user profile with a specific username, seen being used by some variants of the COLDSTEEL RAT.

Sigma rule (View on GitHub)

 1title: Potential COLDSTEEL RAT Windows User Creation
 2id: 95214813-4c7a-4a50-921b-ee5c538e1d16
 3status: experimental
 4description: Detects creation of a new user profile with a specific username, seen being used by some variants of the COLDSTEEL RAT.
 5references:
 6    - https://www.ncsc.gov.uk/static-assets/documents/malware-analysis-reports/cold-steel/NCSC-MAR-Cold-Steel.pdf
 7author: Nasreddine Bencherchali (Nextron Systems)
 8date: 2023/05/02
 9modified: 2023/08/17
10tags:
11    - attack.persistence
12    - detection.emerging_threats
13logsource:
14    category: registry_set
15    product: windows
16detection:
17    selection:
18        TargetObject|contains|all:
19            - '\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList\S-1-5-21-'
20            - '\ProfileImagePath'
21        Details|contains:
22            - 'ANONYMOUS'
23            - '_DomainUser_'
24    condition: selection
25falsepositives:
26    - Unknown
27level: high

References

Related rules

to-top