Potential CobaltStrike Service Installations - Registry
Last updated on:
In this page
About the rule
Rule Type
Standard
Rule Description
Detects known malicious service installs that appear in cases in which a Cobalt Strike beacon elevates privileges or lateral movement.
Severity
Trouble
Rule Requirement
Criteria
Action1: actionname = "Registry value modified" AND ((OBJECTNAME contains "\System\CurrentControlSet\Services" OR (OBJECTNAME endswith "\System\CurrentControlSet" AND OBJECTVALUENAME startswith "Services")) OR ((OBJECTNAME contains "\System\ControlSet" AND OBJECTNAME contains "\Services") OR ((OBJECTNAME contains "\Services" OR OBJECTVALUENAME contains "\Services") OR (OBJECTNAME endswith "\System" AND OBJECTVALUENAME startswith "ControlSet")))) AND ((INFORMATION contains "ADMIN$" AND INFORMATION contains ".exe") OR (INFORMATION contains "%COMSPEC%" AND INFORMATION contains "start" AND INFORMATION contains "powershell")) select Action1.HOSTNAME,Action1.MESSAGE,Action1.OBJECTNAME,Action1.PROCESSNAME,Action1.PREVVAL,Action1.CHANGES
Detection
Execution Mode
realtime
Log Sources
Windows
Author
Wojciech Lesicki


