Skip to main content
Hard difficultyNetwork & Infrastructure30-45 minutes
SIEMXDRFirewall

Command and Control (C2) Traffic Investigation

When network monitoring detects periodic outbound connections to suspicious external hosts, unusual DNS patterns, or traffic matching known C2 signatures, investigate for command and control communications. The SolarWinds SUNBURST backdoor (discovered December 2020) communicated with its C2 via DNS queries to avsvmcloud.com, demonstrating that C2 can hide in normal-looking traffic for months. Identify the protocol, map all communicating hosts, and contain before the attacker can execute their objectives.

Overview

Command and control (C2) communications are the lifeline between an attacker and their implants inside your network. Without C2, the attacker cannot issue commands, exfiltrate data, or move laterally. Detecting and severing C2 is one of the most impactful actions a SOC analyst can take.

C2 channels vary widely: HTTP/HTTPS beaconing (Cobalt Strike, Metasploit), DNS tunneling (DNSMessenger, Iodine), social media dead drops, and even cloud services. The SolarWinds SUNBURST attack used DNS CNAME queries to communicate with its C2 for months before detection. This playbook covers identification and investigation of C2 regardless of protocol, focusing on behavioral patterns rather than signatures.

When You See This

  1. 1

    IDS/IPS alert matching known C2 framework signatures (Cobalt Strike, Metasploit, Sliver)

  2. 2

    Firewall logs show regular outbound connections to a single external IP at consistent intervals

  3. 3

    DNS analytics detect high-entropy domain queries or beaconing patterns to recently registered domains

  4. 4

    Network traffic analysis shows encrypted connections with unusual JA3/JA3S fingerprints

  5. 5

    Proxy logs show repeated connections to URLs not matching any known business application

Investigation Steps

  1. 1

    Characterize the suspicious traffic pattern

    Analyze the network connections to identify C2 behavioral indicators: regularity (beaconing), data size patterns, protocol anomalies, and destination reputation. Calculate the time interval between connections; C2 beacons typically have a base interval with jitter. SUNBURST used a 12-24 hour delay between DNS queries to appear as normal update checks.

    FirewallSIEM
    index=firewall dest_ip="suspect_ip" | sort _time | delta _time AS interval | stats avg(interval) as avg_interval_sec, stdev(interval) as jitter, count, sum(bytes_out) as total_out, sum(bytes_in) as total_in by src_ip, dest_ip, dest_port
    index=dns query="*.suspect-domain.com" | timechart span=1h count | where count > 0
  2. 2

    Research the destination infrastructure

    Check the destination IP/domain against multiple threat intelligence sources. Review WHOIS for recent registration, hosting provider reputation, and associated domains. Check TLS certificates for self-signed or recently issued certificates. In the SolarWinds case, the C2 domain avsvmcloud.com was registered years before the attack, demonstrating that domain age alone is not a reliable indicator.

    SIEMFirewall
    index=proxy dest_domain="suspect-domain.com" | stats count, values(url) as urls, values(http_user_agent) as agents by src_ip | sort -count

    Decision Point

    If: Destination matches known C2 infrastructure in threat intelligence

    Yes → Confirmed C2. Immediately identify all internal hosts communicating with this infrastructure and begin containment.

    No → Unknown destination; not in threat intel does not mean safe. Continue behavioral analysis and endpoint investigation.

  3. 3

    Identify the process responsible on the endpoint

    Correlate the network connections with endpoint process data to identify which process is generating the C2 traffic. Check if it is a legitimate process being abused (living-off-the-land) or a dropped binary. Examine the process tree to understand how the C2 implant was delivered.

    XDR
    index=endpoint dest_ip="suspect_c2_ip" | stats count by dest_host, process_name, process_path, process_hash, parent_process_name | sort -count
  4. 4

    Map all affected hosts

    Search for any other internal host communicating with the same C2 infrastructure. Also search for the same process hash, named pipes, or other IOCs across the entire endpoint fleet. In sophisticated attacks, the attacker deploys different C2 channels to different hosts as redundancy.

    SIEMFirewallXDR
    index=firewall dest_ip IN ("c2_ip_1","c2_ip_2") OR dest_domain IN ("c2_domain_1","c2_domain_2") | stats count by src_ip | sort -count
    index=endpoint process_hash="c2_process_hash" | stats count by dest_host, process_path
  5. 5

    Sever the C2 channel and contain

    Block the C2 destination at the firewall and DNS sinkhole level. Isolate all hosts with confirmed C2 communication. Important: block simultaneously; if you block the domain first, the attacker may receive an alert and accelerate their operations or switch to a backup channel. Coordinate with incident response for full containment.

    FirewallXDR

Common Mistakes

  1. 1

    Blocking the C2 domain immediately without first identifying all affected hosts; you lose visibility into the full scope

  2. 2

    Assuming C2 uses only one protocol; sophisticated attackers often have HTTP, DNS, and SMB-based backup channels

  3. 3

    Not checking for the same C2 indicators across the entire network; one beacon typically means more

  4. 4

    Treating the C2 as the primary threat rather than investigating what the attacker has already done through the C2 channel

Escalation Criteria

  • Any confirmed C2 communication; indicates active compromise

  • C2 traffic has been occurring for days or weeks (indicating undetected long-term access)

  • Multiple hosts communicating with the same C2 infrastructure

Practice This Investigation

SOCSimulator provides hands-on training rooms where you work through real-world attack scenarios, including command and control (c2) traffic investigation investigations with live SIEM alerts. Build analyst muscle memory with zero consequences. Free forever.

12,000+ analysts trained
4.9/5 rating
Free forever tier

Frequently Asked Questions

How did SolarWinds SUNBURST hide its C2 communications?
SUNBURST encoded data in DNS CNAME queries to avsvmcloud.com, mimicking legitimate SolarWinds update checks. It used a 12-24 hour delay between queries, stayed dormant for 2 weeks after installation, and checked for security tools before activating. The domain was registered years in advance. This made it nearly invisible to standard network monitoring.
What is beaconing and how do I detect it?
Beaconing is regular, periodic communication between a compromised host and an attacker C2 server. Detect it by analyzing outbound connection intervals; calculate the standard deviation of time between connections to each external destination. Low standard deviation (consistent timing) with jitter is a strong C2 indicator.
How do I practice C2 detection?
SOCSimulator includes scenarios with realistic C2 beaconing patterns across HTTP, DNS, and encrypted channels. Practice detecting and investigating C2 traffic in firewall and SIEM logs. Start free forever.
Technique

Application Layer Protocol (T1071) — Detection Training

Adversaries may communicate using OSI application layer protocols to avoid detection and network filtering by blending i…

Read more
Technique

Protocol Tunneling (T1572) — Detection Training

Adversaries may tunnel network communications to and from a victim system within a separate protocol to avoid detection …

Read more
Technique

Ingress Tool Transfer (T1105) — Detection Training

Adversaries may transfer tools or other files from an external system into a compromised environment. Files may be copie…

Read more
Glossary

What is IDS? — SOC Glossary

An Intrusion Detection System (IDS) monitors network traffic or host activity for signs of malicious behavior, policy vi…

Read more
Glossary

What is IPS? — SOC Glossary

An Intrusion Prevention System (IPS) is an active network security control deployed inline that inspects traffic in real…

Read more
Glossary

What is NDR? — SOC Glossary

Network Detection and Response (NDR) is a security platform that passively monitors network traffic using machine learni…

Read more
Career Path

Security Engineer Career Guide — Salary & Skills

Security Engineers build and maintain the infrastructure that SOC analysts depend on. You deploy SIEMs, configure firewa…

Read more
Career Path

SOC Analyst (Tier 1) Career Guide — Salary & Skills

Tier 1 SOC Analysts are the front line. You monitor alert queues, triage incoming detections, classify them as true or f…

Read more
Comparison

SOCSimulator vs LetsDefend — Comparison

SOCSimulator wins on operational realism. You get multi-tool shift simulation with SLA pressure, noise injection, and al…

Read more
Comparison

SOCSimulator vs TryHackMe — Comparison

SOCSimulator is the better tool for dedicated SOC analyst preparation. TryHackMe is the better tool for broad cybersecur…

Read more
Playbook

Phishing Email Investigation — Investigation Playbook

When a phishing email is reported or detected, investigate by analyzing email headers for spoofing indicators, inspectin…

Read more
Playbook

Brute Force Attack Investigation — Investigation Playbook

When authentication logs show repeated failed login attempts against one or more accounts, investigate by identifying th…

Read more

We use cookies to improve your experience and measure usage. Learn more