heroui logo

Silenttrinity Stager Msbuild Activity

Sigma Rules

View Source
Summary
The rule is designed to detect potential remote connections made to Silenttrinity command and control (C2) servers by monitoring network connections initiated by the msbuild.exe executable. Silenttrinity is a post-exploitation framework that enables attackers to remotely control compromised systems. This detection mechanism focuses on identifying instances where the msbuild.exe process is involved in network activity, specifically when it attempts to connect to a remote server over common web traffic ports like 80 (HTTP) and 443 (HTTPS). The rule applies a selection filter, specifying that the image used must end with \msbuild.exe, and it verifies that the connection was initiated. Given its potential to indicate exploitative behavior, the rule is classified with a high severity level, which warrants investigation. It aims to mitigate risks associated with malicious use of msbuild.exe by identifying patterns consistent with the operational behavior of Silenttrinity.
Categories
  • Windows
  • Network
Data Sources
  • Process
  • Network Traffic
Created: 2020-10-11