
Summary
This detection rule is designed to identify instances of Amazon Web Services (AWS) where an EC2 instance has been started within the last two hours. It employs AWS CloudTrail logs to monitor and trigger alerts based on specific events. The use of CloudTrail allows tracking changes in the state of AWS resources, in this case, the event of 'StartInstances' related to EC2 services. The logic utilizes Snowflake SQL syntax, querying the relevant CloudTrail logs for entries where the event name matches 'StartInstances' within a two-hour window prior to the current system date and time. This detection is relevant for identifying potential misuse or unauthorized starts of cloud instances, an action often associated with malicious activities such as maintaining persistence or executing further attacks. The rule may specifically relate to a threat actor identified in the description, named GUI-vil, hinting at the contextual use of this detection in monitoring for specific threat behaviors.
Categories
- Cloud
- AWS
Data Sources
- Cloud Service
- Cloud Storage
- Application Log
ATT&CK Techniques
- T1578
Created: 2024-02-09