Operator Bloopers Cobalt Strike Modules

Detects use of Cobalt Strike module commands accidentally entered in the CMD shell

Sigma rule (View on GitHub)

 1title: Operator Bloopers Cobalt Strike Modules
 2id: 507249b7-7adc-4cda-8edd-8577b431bee3
 3status: experimental
 4description: Detects use of Cobalt Strike module commands accidentally entered in the CMD shell
 5author: _pete_0, TheDFIRReport
 6references:
 7    - https://hstechdocs.helpsystems.com/manuals/cobaltstrike/current/userguide/content/cobalt-4-5-user-guide.pdf
 8    - https://thedfirreport.com/2021/10/04/bazarloader-and-the-conti-leaks/
 9date: 2022-05-06
10modified: 2022-05-06
11logsource:
12    category: process_creation
13    product: windows
14detection:
15    selection:
16        Image|endswith: '\cmd.exe'
17        CommandLine|contains:
18            - Invoke-UserHunter
19            - Invoke-ShareFinder
20            - Invoke-Kerberoast
21            - Invoke-SMBAutoBrute
22            - Invoke-Nightmare
23            - zerologon
24            - av_query
25    condition: selection
26fields:
27    - CommandLine
28falsepositives:
29    - Unknown
30level: high
31tags:
32    - attack.execution
33    - attack.t1059.003
yaml

References

Related rules

to-top