SigmaHQ/rules/windows/process_creation/win_webshell_detection.yml

73 lines
2.3 KiB
YAML
Raw Normal View History

title: Webshell Detection With Command Line Keywords
2019-11-12 22:12:27 +00:00
id: bed2a484-9348-4143-8a8a-b801c979301c
description: Detects certain command line parameters often used during reconnaissance activity via web shells
2021-03-02 19:48:55 +00:00
author: Florian Roth, Jonhnathan Ribeiro, Anton Kutepov, oscd.community
references:
2019-10-26 07:14:48 +00:00
- https://www.fireeye.com/blog/threat-research/2013/08/breaking-down-the-china-chopper-web-shell-part-ii.html
- https://unit42.paloaltonetworks.com/bumblebee-webshell-xhunt-campaign/
2019-10-26 07:14:48 +00:00
date: 2017/01/01
2021-03-02 19:48:55 +00:00
modified: 2021/03/02
2019-10-26 07:14:48 +00:00
tags:
- attack.persistence
2020-06-16 20:46:08 +00:00
- attack.t1505.003
- attack.t1018
2021-01-11 20:08:20 +00:00
- attack.t1033
- attack.t1087
- attack.privilege_escalation # an old one
- attack.t1100 # an old one
logsource:
category: process_creation
product: windows
detection:
2021-03-02 19:48:55 +00:00
parent_is_web_server_process:
2020-11-28 16:35:50 +00:00
- ParentImage|endswith:
2020-10-15 22:58:37 +00:00
- '\w3wp.exe'
- '\php-cgi.exe'
- '\nginx.exe'
- '\httpd.exe'
2020-11-28 16:35:50 +00:00
- ParentImage|contains:
- '\apache'
- '\tomcat'
2021-03-02 19:48:55 +00:00
net_utility:
2020-11-28 17:25:09 +00:00
Image|endswith:
- '\net.exe'
2021-03-02 19:48:55 +00:00
- '\net1.exe'
CommandLine|contains:
- ' user '
- ' use '
- ' group '
ping_utility:
2020-11-28 17:25:09 +00:00
Image|endswith: '\ping.exe'
2021-03-02 19:48:55 +00:00
CommandLine|contains: ' -n '
change_dir:
CommandLine|contains:
- '&cd&echo' # china chopper web shell
- 'cd /d ' # https://www.computerhope.com/cdhlp.htm
wmic_utility:
Image|endswith: '\wmic.exe'
CommandLine|contains: ' /node:'
misc_discovery_binaries:
Image|endswith:
- '\whoami.exe'
- '\systeminfo.exe'
- '\quser.exe'
- '\ipconfig.exe'
- '\pathping.exe'
- '\tracert.exe'
- '\netstat.exe'
- '\schtasks.exe'
- '\vssadmin.exe'
- '\wevtutil.exe'
- '\tasklist.exe'
misc_discovery_commands:
CommandLine|contains:
- ' Test-NetConnection '
- 'dir \' # remote dir: dir \<redacted IP #3>\C$:\windows\temp\*.exe
condition: parent_is_web_server_process and (net_utility or ping_utility or change_dir or wmic_utility or misc_discovery_binaries or misc_discovery_commands)
fields:
- CommandLine
- ParentCommandLine
falsepositives:
- unknown
level: high