COLDSTEEL Persistence Service Creation
Detects the creation of new services potentially related to COLDSTEEL RAT
Sigma rule (View on GitHub)
1title: COLDSTEEL Persistence Service Creation
2id: 3ced239c-7285-4b54-99c4-8525b69293f7
3status: test
4description: Detects the creation of new services potentially related to COLDSTEEL RAT
5references:
6 - https://www.ncsc.gov.uk/static-assets/documents/malware-analysis-reports/cold-steel/NCSC-MAR-Cold-Steel.pdf
7author: Nasreddine Bencherchali (Nextron Systems)
8date: 2023-05-02
9tags:
10 - attack.defense-evasion
11 - attack.persistence
12 - detection.emerging-threats
13logsource:
14 product: windows
15 service: system
16detection:
17 selection:
18 Provider_Name: 'Service Control Manager'
19 EventID: 7045
20 ServiceName:
21 - 'Name'
22 - 'msupdate'
23 - 'msupdate2'
24 ImagePath|contains: '\Windows\System32\svchost.exe'
25 condition: selection
26falsepositives:
27 - Unlikely
28level: high
References
Related rules
- COLDSTEEL RAT Anonymous User Process Execution
- COLDSTEEL RAT Cleanup Command Execution
- COLDSTEEL RAT Service Persistence Execution
- OilRig APT Activity
- OilRig APT Registry Persistence