Skip to content
Threat Feed
high advisory

NorthStar C2 Agent Execution Detection

This brief details detection strategies for NorthStar C2 agent execution on Windows endpoints, an open-source command and control framework used for penetration testing and red teaming.

NorthStar C2 is an open-source command and control (C2) framework designed for red teaming and penetration testing, developed by Engin Demirbilek. The framework includes a server-side GUI web application for managing sessions and a client-side stager for communicating with the C2 server. This brief focuses on detecting the execution of the NorthStar C2 agent, specifically the initial stager (NorthstarStager.exe) and the persistent agent (SystemHealthCheck.exe) on Windows systems. Identifying these processes is crucial for defenders to detect and respond to potential unauthorized use of the NorthStar C2 framework within their environment. This detection is based on identifying specific process names and original file names associated with NorthStar C2 components.

Attack Chain

  1. The attacker gains initial access to the target system through unspecified means.
  2. The attacker deploys the NorthStar C2 stager (NorthstarStager.exe) onto the target system.
  3. The stager is executed, initiating communication with the C2 server.
  4. The stager establishes a session with the server-side GUI web application of the NorthStar C2 framework.
  5. The attacker deploys and executes the persistent agent (SystemHealthCheck.exe) on the target.
  6. The persistent agent establishes a persistent communication channel with the C2 server.
  7. The attacker uses the C2 channel to execute arbitrary commands on the compromised system.
  8. The attacker performs actions on objectives, such as lateral movement, data exfiltration, or further exploitation.

Impact

Successful execution of NorthStar C2 agents can lead to full system compromise, allowing attackers to perform unauthorized actions, exfiltrate sensitive data, and establish a persistent presence within the network. While NorthStar C2 is intended for legitimate penetration testing, its misuse can have severe consequences, potentially impacting confidentiality, integrity, and availability of critical systems and data. Undetected NorthStar C2 activity can lead to prolonged attacker dwell time and increased potential for damage.

Recommendation

  • Deploy the Sigma rule Detect NorthStar Stager Execution to your SIEM to detect the initial execution of NorthstarStager.exe based on process name and original file name.
  • Deploy the Sigma rule Detect NorthStar Persistent Agent Execution to your SIEM to detect the execution of SystemHealthCheck.exe.
  • Enable process creation logging with file metadata, specifically original file name, to enhance detection capabilities for NorthStar C2 agents.
  • Review and filter alerts generated by these rules to reduce false positives, especially in environments where authorized penetration testing activities are conducted.

Detection coverage 2

Detect NorthStar Stager Execution

high

Detects the execution of the NorthstarStager.exe process, which is part of the NorthStar C2 framework.

sigma tactics: command_and_control techniques: T1071.001 sources: process_creation, windows

Detect NorthStar Persistent Agent Execution

high

Detects the execution of the SystemHealthCheck.exe process, which is part of the NorthStar C2 framework.

sigma tactics: command_and_control techniques: T1071.001 sources: process_creation, windows

Detection queries are kept inside the platform. Get full rules →

Indicators of compromise

2

file_name

TypeValue
file_nameNorthstarStager.exe
file_nameSystemHealthCheck.exe