PUA - Chisel Tunneling Tool Execution
Detects usage of the Chisel tunneling tool via the commandline arguments
Sigma rule (View on GitHub)
1title: PUA - Chisel Tunneling Tool Execution
2id: 8b0e12da-d3c3-49db-bb4f-256703f380e5
3related:
4 - id: cf93e05e-d798-4d9e-b522-b0248dc61eaf
5 type: similar
6status: test
7description: Detects usage of the Chisel tunneling tool via the commandline arguments
8references:
9 - https://github.com/jpillora/chisel/
10 - https://arcticwolf.com/resources/blog/lorenz-ransomware-chiseling-in/
11 - https://blog.sekoia.io/lucky-mouse-incident-response-to-detection-engineering/
12author: Florian Roth (Nextron Systems)
13date: 2022-09-13
14modified: 2023-02-13
15tags:
16 - attack.command-and-control
17 - attack.t1090.001
18logsource:
19 category: process_creation
20 product: windows
21detection:
22 selection_img:
23 Image|endswith: '\chisel.exe'
24 selection_param1:
25 CommandLine|contains:
26 - 'exe client '
27 - 'exe server '
28 selection_param2:
29 CommandLine|contains:
30 - '-socks5'
31 - '-reverse'
32 - ' r:'
33 - ':127.0.0.1:'
34 - '-tls-skip-verify '
35 - ':socks'
36 condition: selection_img or all of selection_param*
37falsepositives:
38 - Some false positives may occur with other tools with similar commandlines
39level: high
References
Related rules
- HackTool - SharpChisel Execution
- RDP over Reverse SSH Tunnel WFP
- ADSI-Cache File Creation By Uncommon Tool
- APT User Agent
- APT40 Dropbox Tool User Agent