S0154 CobaltStrike NamedPipe
S0154 - Cobalt Strike: NamedPipe¶
DESCRIPTION¶
Cobalt Strike is a famous Pen Test tool that is used by pen testers as well as attackers alike to compromise an environment. CobaltStrike uses named pipes for communication between processes. Default beacon configs use pipes in the format "MSSE-x-server", where "x" is a number from 1 to 4 characters.
Example:
"MSSE-x-server", where "x" is a number from 1 to 4 characters
Related
CobaltStrike
Reference:
https://github.com/SigmaHQ/sigma/blob/dcfb4c5c28431dcdc1d26ed4e008945965afd8ed/rules/windows/pipe_created/pipe_created_mal_cobaltstrike.yml#L4
https://twitter.com/d4rksystem/status/1357010969264873472
https://labs.f-secure.com/blog/detecting-cobalt-strike-default-modules-via-named-pipe-analysis
https://github.com/SigmaHQ/sigma/issues/253
https://blog.cobaltstrike.com/2021/02/09/learn-pipe-fitting-for-all-of-your-offense-projects
https://redcanary.com/threat-detection-report/threats/cobalt-strike
https://github.com/Azure/Azure-Sentinel/blob/master/Hunting%20Queries/Microsoft%20365%20Defender/Command%20and%20Control/C2-NamedPipe.yaml
ATT&CK TACTICS¶
Data Source(s): Named Pipe
SENTINEL RULE QUERY¶
Triage¶
- Remove the comment "//" in 'summarize' statement in above KQL to assist in analysis and removing data duplicates.
- Inspect named pipe pattern if matching "MSSE-x-server"
- Examine the InitiatingProcessFolderPath folder location, and check for any mistype on service name
VERSION¶
Version 2.1 (date: 08/11/2023)