heroui logo

PUA - Chisel Tunneling Tool Execution

Sigma Rules

View Source
Summary
The 'PUA - Chisel Tunneling Tool Execution' detection rule is designed to identify potentially unwanted applications (PUAs) utilizing the Chisel tunneling tool via command-line arguments in Windows environments. Chisel allows for secure port forwarding as well as aiding in bypassing firewalls and NAT. Detection is based on monitoring specific attributes of processes that perform network tunneling using Chisel's executable. The rule triggers when the executable "chisel.exe" is called and examines command-line parameters indicative of its use (e.g., 'exe client', 'exe server', '-socks5', and '-reverse'). Given its intended use for compromise and evasion, the presence of such command-line arguments warrants high alert. The rule is categorized under process creation logs and reflects a high severity level due to the malicious context associated with tunneling tools. False positives may arise from legitimate software employing similar command-line structures, which necessitates careful consideration during investigations.
Categories
  • Endpoint
  • Windows
  • Network
Data Sources
  • Process
Created: 2022-09-13