heroui logo

Cloudflared Portable Execution

Sigma Rules

View Source
Summary
This rule detects the execution of the "cloudflared" binary (the daemon for Cloudflare Tunnel) from locations that are not standard, which could indicate malicious activity such as command and control operations. The detection logic identifies instances where the `cloudflared.exe` is executed, but the execution does not occur from recognized installation directories typically found in `C:\Program Files\` or `C:\Program Files (x86)\`. This approach helps to identify potentially unauthorized or suspicious use of this tool which can be employed by attackers to bypass traditional network security measures. By focusing the filter on non-standard paths, it aims to highlight potential misuse in environments where this application should not be running from a portable state. It is essential for incident response teams to monitor such alerts in their systems, particularly regarding the integrity of network connections and tunneling activities being leveraged in their infrastructures.
Categories
  • Cloud
  • Windows
Data Sources
  • Process
Created: 2023-12-20