top of page
Search

How a Single Behavioral Indicator in SentinelOne Uncovered a Full Infostealer Attack

  • 1 hour ago
  • 2 min read

Okay, I know — another SentinelOne article. But hear me out. What I'm about to show you changed how you think about detection engineering, and I genuinely can't stop thinking about it.


If you've been following this series, you already know I covered the Detection Center in the last article.



Go check that one out if you haven't — link at the top.

But today?

We're going somewhere slightly different. We're talking about Indicators — and specifically, why they might be one of the most underrated features SentinelOne quietly ships with every agent deployment


-----------------------------------------------------------------------------------------------------------


Let's Start With What You Already Know


If you've spent any time with SentinelOne, you know about Deep Visibility. That's the data lake where S1 stores everything the agent captures — every process creation, network connection, file event — retained for as long as your subscription allows. It's basically a time machine for your endpoints.



You also know S1 has detection engines running under the hood. We touched on those into my SentinelOne series. But here's the thing I want to highlight today: those engines aren't just detecting threats — they're also tagging events with metadata. Specifically, they're attaching what SentinelOne calls Behavioral Indicators.


-----------------------------------------------------------------------------------------------------------


So What? Why Should I Care?

Here's the thing most people miss: you don't need a hash, a domain, or an IP address to write a detection rule. You can write a STAR Custom Rule using just an indicator name.

I know what you're thinking — "that's going to fire everywhere, false positives galore." And yes, you'll need to tune it. But let me show you how powerful this actually is with a real-world example.


That single line. That's it. No hashes, no IPs, no paths. Just an indicator name that SentinelOne's engine already stamps on suspicious events in Deep Visibility.

-----------------------------------------------------------------------------------------------------------


How This Actually Caught an Infostealer

This is where it gets real. A massive thank you to my friend Jeremy Jethro. He's the reason I'm writing this article.


An alert triggered. On the surface it looked completely unremarkable — Visual Studio activity, something most analysts would glance at and close as a false positive. But the alert was triggered based on a behavioral indicator, not a signature.

And Jeremy being Jeremy, he didn't just close it. He dug.

What he found underneath was a full infostealer execution chain. Here's a sanitized summary of what the timeline looked like:


The entire above chain — discovered because of one behavioral indicator that an analyst almost dismissed as a false positive.


-----------------------------------------------------------------------------------------------------------


The Real Lesson Here

SentinelOne — like every EDR — will miss detections sometimes. That's just reality. But here's the thing people get wrong: a missed detection doesn't mean missed data. Deep Visibility is capturing everything, every second, and the agent is silently tagging behavioral activity the whole time.

Your job as a detection engineer or threat hunter isn't to wait for an alert to fire. It's to build rules that surface what the engines are already seeing. Behavioral indicator-based STAR rules are exactly how you do that.



One note: there is a delay in STAR Custom Rule detection. I've written a full breakdown of that elsewhere but the delay doesn't mean you ignore it. It means you account for it.

-----------------------------------------------------------------------------------------------------------




 
 
 

Ready to discuss:

- Schedule a call for a consultation

- Message me via "Let's Chat" for quick questions

Let's connect!

Subscribe to our newsletter

Connect With Me:

  • LinkedIn
  • Medium

© 2023 by Cyberengage. All rights reserved.

bottom of page