Detection rules › Sigma

CobaltStrike Service Installations - Security

Severity
high
Author
Florian Roth (Nextron Systems), Wojciech Lesicki
Source
upstream

Detects known malicious service installs that appear in cases in which a Cobalt Strike beacon elevates privileges or lateral movement

MITRE ATT&CK coverage

TacticTechniques
ExecutionT1569.002 System Services: Service Execution
PersistenceT1543.003 Create or Modify System Process: Windows Service
Privilege EscalationT1543.003 Create or Modify System Process: Windows Service
Lateral MovementT1021.002 Remote Services: SMB/Windows Admin Shares

Event coverage

ProviderEvent IDTitle
Security-Auditing4697A service was installed in the system.

Stages and Predicates

Stage 1: event_id

Stage 2: 1 of selection1

ServiceFileName|contains: .exe
ServiceFileName|contains: 'ADMIN$'

Stage 3: 1 of selection2

ServiceFileName|contains: '%COMSPEC%'
ServiceFileName|contains: powershell
ServiceFileName|contains: start

Stage 4: 1 of selection3

ServiceFileName|contains: 'powershell -nop -w hidden -encodedcommand'

Stage 5: 1 of selection4

ServiceFileName|contains: 'IEX (New-Object Net.Webclient).DownloadString(''http://127.0.0.1:'

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
ServiceFileNamematch
  • %COMSPEC% corpus 2 (sigma 2)
  • .exe
  • ADMIN$
  • IEX (New-Object Net.Webclient).DownloadString('http://127.0.0.1:
  • powershell corpus 4 (sigma 4)
  • powershell -nop -w hidden -encodedcommand
  • start

Neighbors

Stricter alternatives (narrower than this rule)

The rules below may be useful if you find the current rule is too noisy / lacks specificity.