2019-01-16 22:36:31 +00:00
title : Webshell Detection With Command Line Keywords
2019-11-12 22:12:27 +00:00
id : bed2a484-9348-4143-8a8a-b801c979301c
2019-01-16 22:36:31 +00:00
description : Detects certain command line parameters often used during reconnaissance activity via web shells
2021-03-02 19:48:55 +00:00
author : Florian Roth, Jonhnathan Ribeiro, Anton Kutepov, oscd.community
2021-03-02 20:34:34 +00:00
references :
2019-10-26 07:14:48 +00:00
- https://www.fireeye.com/blog/threat-research/2013/08/breaking-down-the-china-chopper-web-shell-part-ii.html
2021-01-11 18:44:07 +00:00
- https://unit42.paloaltonetworks.com/bumblebee-webshell-xhunt-campaign/
2019-10-26 07:14:48 +00:00
date : 2017 /01/01
2021-03-02 19:48:55 +00:00
modified : 2021 /03/02
2019-10-26 07:14:48 +00:00
tags :
- attack.persistence
2020-06-16 20:46:08 +00:00
- attack.t1505.003
2021-01-11 18:44:07 +00:00
- attack.t1018
2021-01-11 20:08:20 +00:00
- attack.t1033
2021-01-11 18:44:07 +00:00
- attack.t1087
2020-08-29 16:22:09 +00:00
- attack.privilege_escalation # an old one
- attack.t1100 # an old one
2019-01-16 22:36:31 +00:00
logsource :
2019-03-01 23:14:20 +00:00
category : process_creation
product : windows
2019-01-16 22:36:31 +00:00
detection :
2021-03-02 19:48:55 +00:00
parent_is_web_server_process :
2020-11-28 16:35:50 +00:00
- ParentImage|endswith :
2020-10-15 22:58:37 +00:00
- '\w3wp.exe'
- '\php-cgi.exe'
- '\nginx.exe'
- '\httpd.exe'
2020-11-28 16:35:50 +00:00
- ParentImage|contains :
- '\apache'
- '\tomcat'
2021-03-02 19:48:55 +00:00
net_utility :
2020-11-28 17:25:09 +00:00
Image|endswith :
- '\net.exe'
2021-03-02 19:48:55 +00:00
- '\net1.exe'
CommandLine|contains :
- ' user '
- ' use '
- ' group '
ping_utility :
2020-11-28 17:25:09 +00:00
Image|endswith : '\ping.exe'
2021-03-02 19:48:55 +00:00
CommandLine|contains : ' -n '
change_dir :
CommandLine|contains :
- '&cd&echo' # china chopper web shell
- 'cd /d ' # https://www.computerhope.com/cdhlp.htm
wmic_utility :
Image|endswith : '\wmic.exe'
CommandLine|contains : ' /node:'
misc_discovery_binaries :
Image|endswith :
- '\whoami.exe'
- '\systeminfo.exe'
- '\quser.exe'
- '\ipconfig.exe'
- '\pathping.exe'
- '\tracert.exe'
- '\netstat.exe'
- '\schtasks.exe'
- '\vssadmin.exe'
- '\wevtutil.exe'
- '\tasklist.exe'
misc_discovery_commands :
CommandLine|contains :
- ' Test-NetConnection '
- 'dir \' # remote dir : dir \<redacted IP #3>\C$:\windows\temp\*.exe
condition : parent_is_web_server_process and (net_utility or ping_utility or change_dir or wmic_utility or misc_discovery_binaries or misc_discovery_commands)
2019-01-16 22:36:31 +00:00
fields :
2019-03-01 23:14:20 +00:00
- CommandLine
- ParentCommandLine
2019-01-16 22:36:31 +00:00
falsepositives :
2019-03-01 23:14:20 +00:00
- unknown
2019-01-16 22:36:31 +00:00
level : high