Cobalt Strike Beacon Detection & Investigation
When network or endpoint detection tools alert on periodic HTTP/HTTPS beaconing, named pipe creation, or process injection consistent with Cobalt Strike, investigate immediately. Cobalt Strike is the most commonly used post-exploitation framework by both penetration testers and threat actors. It was used in the SolarWinds SUNBURST attack (2020), the Colonial Pipeline ransomware (2021), and by APT29 (Cozy Bear) campaigns. Confirm the beacon, identify the C2 server, map all infected hosts, and contain before lateral movement begins.
Overview
Cobalt Strike is a commercial adversary simulation tool that has become the most abused post-exploitation framework in real-world attacks. Its beacon payload provides attackers with command and control, lateral movement, credential harvesting, and data exfiltration capabilities. Detecting Cobalt Strike beacons is critical because their presence typically means an attacker has already gained initial access and is preparing to escalate.
The SolarWinds supply chain attack (2020) used modified Cobalt Strike beacons, and the Colonial Pipeline DarkSide ransomware group used Cobalt Strike for pre-encryption operations. This playbook covers the unique indicators of Cobalt Strike beacons and the investigation workflow to contain them before the attacker achieves their objectives.
When You See This
- 1
Network monitoring detects regular HTTP/HTTPS callback intervals (default 60 seconds) to an external IP or domain
- 2
XDR alerts on named pipe creation with Cobalt Strike default patterns (\.pipemsagent_*)
- 3
Process injection detected: legitimate process loading unexpected DLLs or exhibiting unusual memory patterns
- 4
DNS beaconing to a domain with high query frequency and low TTL values
- 5
EDR detects rundll32.exe or regsvr32.exe loading shellcode from unusual paths
Investigation Steps
- 1
Confirm beaconing behavior in network traffic
Analyze network connections from the suspected host. Cobalt Strike beacons have configurable but often identifiable patterns: regular callback intervals (with jitter), HTTP headers that mimic legitimate traffic but contain malleable C2 profiles, and consistent data sizes. Calculate the interval between connections to the suspect destination.
SIEMFirewallindex=firewall src_ip="suspect_host" dest_ip="suspect_c2" | sort _time | delta _time AS interval | stats avg(interval) as avg_beacon_interval, stdev(interval) as jitter, count by dest_ip, dest_port
index=proxy src_ip="suspect_host" | stats count by url, http_method, bytes_out, bytes_in | where count > 50 | sort -count
Decision Point
If: Regular beaconing pattern confirmed with consistent intervals and jitter
Yes → High confidence Cobalt Strike or similar C2. Proceed to endpoint analysis immediately.
No → May be legitimate application behavior. Check the destination against threat intelligence before closing.
- 2
Analyze the endpoint for beacon artifacts
Examine the suspect host for Cobalt Strike artifacts: injected processes (typically svchost.exe, rundll32.exe, or explorer.exe with injected code), named pipe creation matching CS defaults, and unusual spawned processes. Check for in-memory-only execution patterns.
XDRindex=endpoint dest_host="suspect_host" (process_name="rundll32.exe" OR process_name="regsvr32.exe") | where NOT match(command_line, "known_legitimate_patterns") | table _time, process_name, command_line, parent_process_name, process_hash
index=endpoint dest_host="suspect_host" EventCode=17 PipeName="\\*\\pipe\\msagent*" OR PipeName="\\*\\pipe\\MSSE-*" | table _time, PipeName, process_name
- 3
Identify the C2 infrastructure
Research the destination IP/domain. Check threat intelligence for known Cobalt Strike team servers. Examine the TLS certificate; Cobalt Strike defaults generate identifiable certificate patterns. Check if the domain was recently registered or uses bulletproof hosting.
SIEMFirewallindex=firewall OR index=proxy dest="suspect_c2" | stats dc(src_ip) as unique_sources, sum(bytes_out) as total_exfil by dest, dest_port | sort -unique_sources
- 4
Search for additional infected hosts
The critical step; one Cobalt Strike beacon usually means more. Search all endpoints for connections to the same C2 infrastructure. Check for lateral movement from the initially compromised host. A single beacon is concerning; multiple beacons across hosts means the attacker has been operating for some time.
SIEMFirewallXDRindex=firewall dest_ip="c2_server_ip" | stats count by src_ip | sort -count
index=endpoint parent_process_name="beacon_process" | stats count by dest_host, process_name, command_line
- 5
Contain and eradicate
Isolate all infected hosts from the network simultaneously; if you isolate one at a time, the attacker may notice and accelerate their operations on remaining hosts. Block the C2 domain and IP at the firewall. Collect memory dumps before remediation for forensic analysis. Coordinate with incident response for full eradication.
XDRFirewall
Common Mistakes
- 1
Isolating only the first beacon host without searching for others; Cobalt Strike deployments typically involve multiple beacons
- 2
Blocking the C2 domain without checking for DNS-based or SMB-based backup channels
- 3
Not collecting memory dumps before isolating; Cobalt Strike beacons are often memory-resident only and evidence is lost on reboot
- 4
Assuming the beacon was from a legitimate penetration test without verifying with the security team
Escalation Criteria
Any confirmed Cobalt Strike beacon; this indicates active post-exploitation operations
Multiple hosts beaconing to the same C2 infrastructure
Evidence of credential harvesting or lateral movement from beaconed hosts
Practice This Investigation
SOCSimulator provides hands-on training rooms where you work through real-world attack scenarios, including cobalt strike beacon detection & investigation investigations with live SIEM alerts. Build analyst muscle memory with zero consequences. Free forever.
Frequently Asked Questions
- Why is Cobalt Strike so commonly used by attackers?
- Cobalt Strike provides a complete post-exploitation toolkit: command and control, lateral movement, credential harvesting, and data exfiltration, all in one package. Cracked copies are widely available, and its malleable C2 profiles can mimic legitimate traffic, making detection challenging. It was used in the SolarWinds attack, Colonial Pipeline ransomware, and by APT29, APT41, and FIN7.
- How do I distinguish a real attack from a penetration test?
- Always verify with your security team and any authorized penetration testing vendors before closing an alert. Legitimate pentesters typically register their testing IP ranges and time windows. If no authorized test is running, treat every Cobalt Strike beacon as a real threat.
- How do I practice Cobalt Strike detection?
- SOCSimulator includes scenarios with realistic C2 beaconing patterns that mimic Cobalt Strike traffic. Practice identifying beacons in SIEM and firewall logs under time pressure. Start free forever.
Related SOC Training Resources
Application Layer Protocol (T1071) — Detection Training
Adversaries may communicate using OSI application layer protocols to avoid detection and network filtering by blending i…
Read more TechniqueProcess Injection (T1055) — Detection Training
Adversaries may inject code into processes in order to evade process-based defenses as well as possibly elevate privileg…
Read more TechniqueCommand and Scripting Interpreter (T1059) — Detection Training
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries. These interfaces and la…
Read more TechniqueIngress Tool Transfer (T1105) — Detection Training
Adversaries may transfer tools or other files from an external system into a compromised environment. Files may be copie…
Read more GlossaryWhat is EDR? — SOC Glossary
Endpoint Detection and Response (EDR) is a security technology that continuously monitors endpoint activity, recording p…
Read more GlossaryWhat is IOC? — SOC Glossary
An Indicator of Compromise (IOC) is an observable artifact, such as a file hash, IP address, domain name, URL, registry …
Read more GlossaryWhat is Threat Hunting? — SOC Glossary
Threat hunting is the proactive, human-led process of searching through security telemetry to find hidden threats that e…
Read more GlossaryWhat is TTPs? — SOC Glossary
Tactics, Techniques, and Procedures (TTPs) describe the behavioral patterns, methods, and operational processes threat a…
Read more Career PathSOC Analyst (Tier 2) Career Guide — Salary & Skills
Tier 2 SOC Analysts handle the investigations that Tier 1 escalates. You dig into multi-stage attacks, coordinate contai…
Read more Career PathIncident Responder Career Guide — Salary & Skills
Incident Responders lead the technical response when confirmed breaches happen. You coordinate containment, run forensic…
Read more ComparisonSOCSimulator vs LetsDefend — Comparison
SOCSimulator wins on operational realism. You get multi-tool shift simulation with SLA pressure, noise injection, and al…
Read more ComparisonSOCSimulator vs TryHackMe — Comparison
SOCSimulator is the better tool for dedicated SOC analyst preparation. TryHackMe is the better tool for broad cybersecur…
Read more