
Summary
This rule is designed to detect the execution of the Koadic hack tool by monitoring specific command line parameters used during the process creation on Windows systems. Koadic is known for its use in post-exploitation activities, including command and control operations that leverage the Windows command shell (cmd.exe). The detection logic focuses on checking if the command line of a process ends with 'cmd.exe' and if it contains key flags associated with Koadic's operation, specifically '/q', '/c', and the command 'chcp'. The presence of these patterns in command line execution indicates potential misuse of the Koadic tool, which should be investigated further due to its association with malicious activities.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2020-01-12