Skip to main content
Hard difficultyMalware & Execution30-45 minutes
SIEMXDRFirewall

Cobalt Strike Beacon Detection & Investigation

When network or endpoint detection tools alert on periodic HTTP/HTTPS beaconing, named pipe creation, or process injection consistent with Cobalt Strike, investigate immediately. Cobalt Strike is the most commonly used post-exploitation framework by both penetration testers and threat actors. It was used in the SolarWinds SUNBURST attack (2020), the Colonial Pipeline ransomware (2021), and by APT29 (Cozy Bear) campaigns. Confirm the beacon, identify the C2 server, map all infected hosts, and contain before lateral movement begins.

Overview

Cobalt Strike is a commercial adversary simulation tool that has become the most abused post-exploitation framework in real-world attacks. Its beacon payload provides attackers with command and control, lateral movement, credential harvesting, and data exfiltration capabilities. Detecting Cobalt Strike beacons is critical because their presence typically means an attacker has already gained initial access and is preparing to escalate.

The SolarWinds supply chain attack (2020) used modified Cobalt Strike beacons, and the Colonial Pipeline DarkSide ransomware group used Cobalt Strike for pre-encryption operations. This playbook covers the unique indicators of Cobalt Strike beacons and the investigation workflow to contain them before the attacker achieves their objectives.

When You See This

  1. 1

    Network monitoring detects regular HTTP/HTTPS callback intervals (default 60 seconds) to an external IP or domain

  2. 2

    XDR alerts on named pipe creation with Cobalt Strike default patterns (\.pipemsagent_*)

  3. 3

    Process injection detected: legitimate process loading unexpected DLLs or exhibiting unusual memory patterns

  4. 4

    DNS beaconing to a domain with high query frequency and low TTL values

  5. 5

    EDR detects rundll32.exe or regsvr32.exe loading shellcode from unusual paths

Investigation Steps

  1. 1

    Confirm beaconing behavior in network traffic

    Analyze network connections from the suspected host. Cobalt Strike beacons have configurable but often identifiable patterns: regular callback intervals (with jitter), HTTP headers that mimic legitimate traffic but contain malleable C2 profiles, and consistent data sizes. Calculate the interval between connections to the suspect destination.

    SIEMFirewall
    index=firewall src_ip="suspect_host" dest_ip="suspect_c2" | sort _time | delta _time AS interval | stats avg(interval) as avg_beacon_interval, stdev(interval) as jitter, count by dest_ip, dest_port
    index=proxy src_ip="suspect_host" | stats count by url, http_method, bytes_out, bytes_in | where count > 50 | sort -count

    Decision Point

    If: Regular beaconing pattern confirmed with consistent intervals and jitter

    Yes → High confidence Cobalt Strike or similar C2. Proceed to endpoint analysis immediately.

    No → May be legitimate application behavior. Check the destination against threat intelligence before closing.

  2. 2

    Analyze the endpoint for beacon artifacts

    Examine the suspect host for Cobalt Strike artifacts: injected processes (typically svchost.exe, rundll32.exe, or explorer.exe with injected code), named pipe creation matching CS defaults, and unusual spawned processes. Check for in-memory-only execution patterns.

    XDR
    index=endpoint dest_host="suspect_host" (process_name="rundll32.exe" OR process_name="regsvr32.exe") | where NOT match(command_line, "known_legitimate_patterns") | table _time, process_name, command_line, parent_process_name, process_hash
    index=endpoint dest_host="suspect_host" EventCode=17 PipeName="\\*\\pipe\\msagent*" OR PipeName="\\*\\pipe\\MSSE-*" | table _time, PipeName, process_name
  3. 3

    Identify the C2 infrastructure

    Research the destination IP/domain. Check threat intelligence for known Cobalt Strike team servers. Examine the TLS certificate; Cobalt Strike defaults generate identifiable certificate patterns. Check if the domain was recently registered or uses bulletproof hosting.

    SIEMFirewall
    index=firewall OR index=proxy dest="suspect_c2" | stats dc(src_ip) as unique_sources, sum(bytes_out) as total_exfil by dest, dest_port | sort -unique_sources
  4. 4

    Search for additional infected hosts

    The critical step; one Cobalt Strike beacon usually means more. Search all endpoints for connections to the same C2 infrastructure. Check for lateral movement from the initially compromised host. A single beacon is concerning; multiple beacons across hosts means the attacker has been operating for some time.

    SIEMFirewallXDR
    index=firewall dest_ip="c2_server_ip" | stats count by src_ip | sort -count
    index=endpoint parent_process_name="beacon_process" | stats count by dest_host, process_name, command_line
  5. 5

    Contain and eradicate

    Isolate all infected hosts from the network simultaneously; if you isolate one at a time, the attacker may notice and accelerate their operations on remaining hosts. Block the C2 domain and IP at the firewall. Collect memory dumps before remediation for forensic analysis. Coordinate with incident response for full eradication.

    XDRFirewall

Common Mistakes

  1. 1

    Isolating only the first beacon host without searching for others; Cobalt Strike deployments typically involve multiple beacons

  2. 2

    Blocking the C2 domain without checking for DNS-based or SMB-based backup channels

  3. 3

    Not collecting memory dumps before isolating; Cobalt Strike beacons are often memory-resident only and evidence is lost on reboot

  4. 4

    Assuming the beacon was from a legitimate penetration test without verifying with the security team

Escalation Criteria

  • Any confirmed Cobalt Strike beacon; this indicates active post-exploitation operations

  • Multiple hosts beaconing to the same C2 infrastructure

  • Evidence of credential harvesting or lateral movement from beaconed hosts

Practice This Investigation

SOCSimulator provides hands-on training rooms where you work through real-world attack scenarios, including cobalt strike beacon detection & investigation investigations with live SIEM alerts. Build analyst muscle memory with zero consequences. Free forever.

12,000+ analysts trained
4.9/5 rating
Free forever tier

Frequently Asked Questions

Why is Cobalt Strike so commonly used by attackers?
Cobalt Strike provides a complete post-exploitation toolkit: command and control, lateral movement, credential harvesting, and data exfiltration, all in one package. Cracked copies are widely available, and its malleable C2 profiles can mimic legitimate traffic, making detection challenging. It was used in the SolarWinds attack, Colonial Pipeline ransomware, and by APT29, APT41, and FIN7.
How do I distinguish a real attack from a penetration test?
Always verify with your security team and any authorized penetration testing vendors before closing an alert. Legitimate pentesters typically register their testing IP ranges and time windows. If no authorized test is running, treat every Cobalt Strike beacon as a real threat.
How do I practice Cobalt Strike detection?
SOCSimulator includes scenarios with realistic C2 beaconing patterns that mimic Cobalt Strike traffic. Practice identifying beacons in SIEM and firewall logs under time pressure. Start free forever.
Technique

Application Layer Protocol (T1071) — Detection Training

Adversaries may communicate using OSI application layer protocols to avoid detection and network filtering by blending i…

Read more
Technique

Process Injection (T1055) — Detection Training

Adversaries may inject code into processes in order to evade process-based defenses as well as possibly elevate privileg…

Read more
Technique

Command and Scripting Interpreter (T1059) — Detection Training

Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries. These interfaces and la…

Read more
Technique

Ingress Tool Transfer (T1105) — Detection Training

Adversaries may transfer tools or other files from an external system into a compromised environment. Files may be copie…

Read more
Glossary

What is EDR? — SOC Glossary

Endpoint Detection and Response (EDR) is a security technology that continuously monitors endpoint activity, recording p…

Read more
Glossary

What is IOC? — SOC Glossary

An Indicator of Compromise (IOC) is an observable artifact, such as a file hash, IP address, domain name, URL, registry …

Read more
Glossary

What is Threat Hunting? — SOC Glossary

Threat hunting is the proactive, human-led process of searching through security telemetry to find hidden threats that e…

Read more
Glossary

What is TTPs? — SOC Glossary

Tactics, Techniques, and Procedures (TTPs) describe the behavioral patterns, methods, and operational processes threat a…

Read more
Career Path

SOC Analyst (Tier 2) Career Guide — Salary & Skills

Tier 2 SOC Analysts handle the investigations that Tier 1 escalates. You dig into multi-stage attacks, coordinate contai…

Read more
Career Path

Incident Responder Career Guide — Salary & Skills

Incident Responders lead the technical response when confirmed breaches happen. You coordinate containment, run forensic…

Read more
Comparison

SOCSimulator vs LetsDefend — Comparison

SOCSimulator wins on operational realism. You get multi-tool shift simulation with SLA pressure, noise injection, and al…

Read more
Comparison

SOCSimulator vs TryHackMe — Comparison

SOCSimulator is the better tool for dedicated SOC analyst preparation. TryHackMe is the better tool for broad cybersecur…

Read more

We use cookies to improve your experience and measure usage. Learn more