Detection rules › Sigma

Operator Bloopers Cobalt Strike Commands

Severity
high
Author
_pete_0, TheDFIRReport
Source
upstream

Detects use of Cobalt Strike commands accidentally entered in the CMD shell

MITRE ATT&CK coverage

TacticTechniques
ExecutionT1059.003 Command and Scripting Interpreter: Windows Command Shell

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation

Stages and Predicates

Stage 1: all of selection_img

or:
Image|endswith: '\cmd.exe'
OriginalFileName: Cmd.Exe

Stage 2: all of selection_cli

or:
CommandLine|contains: dcsync
CommandLine|contains: execute-assembly
CommandLine|contains: getsystem
CommandLine|contains: logonpasswords
CommandLine|contains: make_token
CommandLine|contains: psinject
CommandLine|contains: remote-exec
CommandLine|contains: rev2self
CommandLine|contains: spawnas
or:
CommandLine|startswith: 'c:\windows\system32\cmd.exe'
CommandLine|startswith: 'cmd '
CommandLine|startswith: cmd.exe

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
CommandLinematch
  • dcsync
  • execute-assembly
  • getsystem
  • logonpasswords
  • make_token
  • psinject
  • remote-exec
  • rev2self
  • spawnas
CommandLinestarts_with
  • c:\windows\system32\cmd.exe
  • cmd
  • cmd.exe
Imageends_with
  • \cmd.exe corpus 92 (sigma 92)
OriginalFileNameeq
  • Cmd.Exe corpus 32 (sigma 30, splunk 2)