Detection rules › Sigma

Cloudflared Tunnel Execution

Severity
medium
Author
Janantha Marasinghe, Nasreddine Bencherchali (Nextron Systems)
Source
upstream

Detects execution of the "cloudflared" tool to connect back to a tunnel. This was seen used by threat actors to maintain persistence and remote access to compromised networks.

MITRE ATT&CK coverage

TacticTechniques
Command & ControlT1090 Proxy, T1102 Web Service, T1572 Protocol Tunneling

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation
Security-Auditing4688A new process has been created.

Stages and Predicates

Stage 1: selection

or:
CommandLine|contains: '-config '
CommandLine|contains: '-credentials-contents '
CommandLine|contains: '-credentials-file '
CommandLine|contains: '-token '
CommandLine|contains: ' run '
CommandLine|contains: ' tunnel '

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
CommandLinematch
  • run corpus 2 (sigma 2)
  • tunnel corpus 3 (sigma 3)
  • -config corpus 3 (sigma 3)
  • -credentials-contents corpus 2 (sigma 2)
  • -credentials-file corpus 2 (sigma 2)
  • -token corpus 2 (sigma 2)