Detection rules › Sigma

HackTool - Potential CobaltStrike Process Injection

Severity
high
Author
Olaf Hartong, Florian Roth (Nextron Systems), Aleksey Potapov, oscd.community
Source
upstream

Detects a potential remote threat creation with certain characteristics which are typical for Cobalt Strike beacons

MITRE ATT&CK coverage

TacticTechniques
Privilege EscalationT1055.001 Process Injection: Dynamic-link Library Injection
Defense EvasionT1055.001 Process Injection: Dynamic-link Library Injection

Event coverage

ProviderEvent IDTitle
Sysmon8CreateRemoteThread

Stages and Predicates

Stage 1: selection

or:
StartAddress|endswith: 0B80
StartAddress|endswith: 0C7C
StartAddress|endswith: 0C88

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
StartAddressends_with
  • 0B80
  • 0C7C
  • 0C88