CobaltStrike Service Installations - Security

Detects known malicious service installs that appear in cases in which a Cobalt Strike beacon elevates privileges or lateral movement

Sigma rule (View on GitHub)

 1title: CobaltStrike Service Installations - Security
 2id: d7a95147-145f-4678-b85d-d1ff4a3bb3f6
 3related:
 4    - id: 5a105d34-05fc-401e-8553-272b45c1522d
 5      type: derived
 6status: test
 7description: Detects known malicious service installs that appear in cases in which a Cobalt Strike beacon elevates privileges or lateral movement
 8references:
 9    - https://www.sans.org/webcasts/119395
10    - https://www.crowdstrike.com/blog/getting-the-bacon-from-cobalt-strike-beacon/
11    - https://thedfirreport.com/2021/08/29/cobalt-strike-a-defenders-guide/
12author: Florian Roth (Nextron Systems), Wojciech Lesicki
13date: 2021-05-26
14modified: 2022-11-27
15tags:
16    - attack.persistence
17    - attack.execution
18    - attack.privilege-escalation
19    - attack.lateral-movement
20    - attack.t1021.002
21    - attack.t1543.003
22    - attack.t1569.002
23logsource:
24    product: windows
25    service: security
26    definition: The 'System Security Extension' audit subcategory need to be enabled to log the EID 4697
27detection:
28    event_id:
29        EventID: 4697
30    selection1:
31        ServiceFileName|contains|all:
32            - 'ADMIN$'
33            - '.exe'
34    selection2:
35        ServiceFileName|contains|all:
36            - '%COMSPEC%'
37            - 'start'
38            - 'powershell'
39    selection3:
40        ServiceFileName|contains: 'powershell -nop -w hidden -encodedcommand'
41    selection4:
42        ServiceFileName|base64offset|contains: "IEX (New-Object Net.Webclient).DownloadString('http://127.0.0.1:"
43    condition: event_id and 1 of selection*
44falsepositives:
45    - Unknown
46level: high

References

Related rules

to-top