heroui logo

HackTool - Stracciatella Execution

Sigma Rules

View Source
Summary
The detection rule focuses on identifying the execution of Stracciatella, a HackTool that utilizes a PowerShell runspace within a C# environment, specifically adapting the SharpPick technique. This detection applies when traditional security measures such as AMSI (Antimalware Scan Interface), ETW (Event Tracing for Windows), and Script Block Logging are disabled. The rule leverages specific characteristics of the PE (Portable Executable) metadata associated with the Stracciatella executable to trigger alerts. The selection conditions for detection are based on the executable's name, original file name, description tag, and specific SHA256 hashes tied to known malicious instances of Stracciatella. This enables organizations to maintain vigilant defense against evasion tactics employed by sophisticated attackers, especially within Windows environments where process creation is critical for threat detection. The severity level is set to high, reflecting the significant risk implicated by the use of such tools in a cyber attack. False positives are unlikely, enhancing the reliability of the detection.
Categories
  • Windows
  • Endpoint
  • Other
Data Sources
  • Process
Created: 2023-04-17