SigmaHQ/rules/windows/sysmon/sysmon_cobaltstrike_process_injection.yml

22 lines
583 B
YAML
Raw Normal View History

title: CobaltStrike Process Injection
description: Detects a possible remote threat creation with certain characteristics which are typical for Cobalt Strike beacons
references:
- https://medium.com/@olafhartong/cobalt-strike-remote-threads-detection-206372d11d0f
2019-03-06 04:25:12 +00:00
tags:
- attack.defense_evasion
- attack.t1055
status: experimental
author: Olaf Hartong, Florian Roth
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 8
TargetProcessAddress: '*0B80'
condition: selection
falsepositives:
- unknown
level: high