heroui logo

Operator Bloopers Cobalt Strike Modules

Sigma Rules

View Source
Summary
The "Operator Bloopers Cobalt Strike Modules" detection rule is designed to identify accidental execution of Cobalt Strike commands in the Windows command shell (CMD). It focuses specifically on monitoring process creation activities, targeting instances where commands associated with Cobalt Strike modules are entered. The detection strategy employs selective matching against both the executable name for the command prompt (Cmd.Exe) and the command line arguments for known Cobalt Strike invocations. These commands include a variety of attack techniques like User Hunter and Kerberoasting, among others. The rule aims for high confidence detection by conditioning that all defined selection criteria must be met, thereby reducing the potential for false positives. As these commands indicate malicious behavior typical of adversarial use of Cobalt Strike, the rule enhances operational security by flagging activities that could signify an attack in progress.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2022-05-06