Operator Bloopers Cobalt Strike Commands
Detects use of Cobalt Strike commands accidentally entered in the CMD shell
Sigma rule (View on GitHub)
1title: Operator Bloopers Cobalt Strike Commands
2id: f127a4d7-5246-4e22-aa8d-a97d05e4f1a7
3status: experimental
4description: Detects use of Cobalt Strike commands accidentally entered in the CMD shell
5author: _pete_0, TheDFIRReport
6references:
7 - https://hstechdocs.helpsystems.com/manuals/cobaltstrike/current/userguide/content/cobalt-4-5-user-guide.pdf
8date: 2022/05/06
9modified: 2022/05/06
10logsource:
11 category: process_creation
12 product: windows
13detection:
14 selection:
15 CommandLine|contains:
16 - psinject
17 - spawnas
18 - socks
19 - make_token
20 - remote-exec
21 - rev2self
22 - shell
23 - dcsync
24 - upload
25 - sleep
26 - ls
27 - logonpasswords
28 - ps
29 - execute-assembly
30 - pth
31 - getsystem
32 Image|endswith:
33 - '\cmd.exe'
34 condition: selection
35fields:
36 - CommandLine
37falsepositives:
38 - Unknown
39level: high
40tags:
41 - attack.execution
42 - attack.t1059.003
References
Related rules
- Operator Bloopers Cobalt Strike Modules
- Command Shell Bypassing Security Controls
- Command Shell Obfuscated Commands
- Command Shell Unusual or Suspicious Process Ancestry
- Powershell Obfuscation and Escape Characters