Operator Bloopers Cobalt Strike Modules

Detects use of Cobalt Strike module commands accidentally entered in the CMD shell

Sigma rule (View on GitHub)

 1title: Operator Bloopers Cobalt Strike Modules
 2id: 507249b7-7adc-4cda-8edd-8577b431bee3
 3status: experimental
 4description: Detects use of Cobalt Strike module commands accidentally entered in the CMD shell
 5author: _pete_0, TheDFIRReport
 6references:
 7  - https://hstechdocs.helpsystems.com/manuals/cobaltstrike/current/userguide/content/cobalt-4-5-user-guide.pdf
 8  - https://thedfirreport.com/2021/10/04/bazarloader-and-the-conti-leaks/
 9date: 2022/05/06
10modified: 2022/05/06
11logsource:
12  category: process_creation
13  product: windows
14detection:
15  selection:
16    CommandLine|contains:
17      - Invoke-UserHunter
18      - Invoke-ShareFinder
19      - Invoke-Kerberoast
20      - Invoke-SMBAutoBrute
21      - Invoke-Nightmare
22      - zerologon
23      - av_query
24    Image|endswith:
25      - '\cmd.exe'
26  condition: selection
27fields:
28  - CommandLine
29falsepositives:
30  - Unknown
31level: high
32tags:
33  - attack.execution
34  - attack.t1059.003

References

Related rules

to-top