heroui logo

Potential CobaltStrike Service Installations - Registry

Sigma Rules

View Source
Summary
This detection rule focuses on identifying potential Cobalt Strike service installations by analyzing changes in the Windows registry. Cobalt Strike is a well-known penetration testing tool that can be used maliciously for privilege escalation and lateral movement within a network. The rule investigates specific registry paths that are commonly modified during a Cobalt Strike attack, including `\System\CurrentControlSet\Services` and related control sets. When services are installed that reference suspicious details (like `ADMIN$` or `.exe` files), or when command execution indicators through PowerShell are detected in the registry settings, there is a potential indication of malicious activity related to Cobalt Strike. The selection criteria for this rule require all specified conditions (i.e., modifications to key registry paths alongside certain details) to be met, which helps to minimize false positives. The high level of this rule underscores the criticality of detecting these types of modifications, as they could signify an active compromise in the environment.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
Created: 2021-06-29