title: Shells spawned by Web Servers status: experimental description: Web servers that spawn shell processes could be the result of a successfully placed web shell or an other attack author: Thomas Patzke logsource: product: windows service: sysmon detection: selection: EventID: 1 ParentImage: - '*\w3wp.exe' - '*\httpd.exe' - '*\nginx.exe' - '*\php-cgi.exe' Image: - '*\cmd.exe' - '*\sh.exe' - '*\bash.exe' - '*\powershell.exe' condition: selection fields: - CommandLine - ParentCommandLine falsepositives: - Particular web applications may spawn a shell process legitimately level: high