Detection rules › Sigma

HackTool - Covenant PowerShell Launcher

Severity
high
Author
Florian Roth (Nextron Systems), Jonhnathan Ribeiro, oscd.community
Source
upstream

Detects suspicious command lines used in Covenant luanchers

MITRE ATT&CK coverage

TacticTechniques
ExecutionT1059.001 Command and Scripting Interpreter: PowerShell
Defense EvasionT1564.003 Hide Artifacts: Hidden Window

Event coverage

ProviderEvent IDTitle
Sysmon1Process creation
Security-Auditing4688A new process has been created.

Stages and Predicates

Stage 1: 1 of selection_1

or:
CommandLine|contains: -Command
CommandLine|contains: -EncodedCommand
CommandLine|contains: -Nop
CommandLine|contains: -Sta
CommandLine|contains: -Window
CommandLine|contains: Hidden

Stage 2: 1 of selection_2

or:
CommandLine|contains: '-EncodedCommand cwB2ACAAbwAgA'
CommandLine|contains: GruntHTTP
CommandLine|contains: 'mshta file.hta'
CommandLine|contains: 'sv o (New-Object IO.MemorySteam);sv d '

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
CommandLinematch
  • -Command
  • -EncodedCommand
  • -EncodedCommand cwB2ACAAbwAgA
  • -Nop
  • -Sta
  • -Window
  • GruntHTTP
  • Hidden
  • mshta file.hta
  • sv o (New-Object IO.MemorySteam);sv d