Files
blue-team-tools/rules/windows/sysmon/sysmon_webshell_creation_detect.yml
T

46 lines
1.3 KiB
YAML
Raw Normal View History

title: Windows webshell creation
2019-11-12 23:12:27 +01:00
id: 39f1f9f2-9636-45de-98f6-a4046aa8e4b9
status: experimental
description: Posible webshell file creation on a static web site
references:
- PT ESC rule and personal experience
author: Beyu Denis, oscd.community
date: 2019/10/22
2019-11-04 19:23:52 +03:00
modified: 2019/11/04
tags:
- attack.persistence
- attack.t1100
level: critical
logsource:
product: windows
service: sysmon
detection:
2019-11-04 19:23:52 +03:00
selection_1:
EventID: 11
2019-11-04 19:23:52 +03:00
selection_2:
TargetFilename|contains: '\inetpub\wwwroot\'
selection_3:
TargetFilename|contains:
- '.asp'
- '.ashx'
- '.ph'
selection_4:
TargetFilename|contains:
- '\www\'
- '\htdocs\'
- '\html\'
selection_5:
TargetFilename|contains: '.ph'
selection_6:
- TargetFilename|contains|all:
- '\'
- '.jsp'
- TargetFilename|contains|all:
- '\cgi-bin\'
- '.pl'
condition: selection_1 and ( selection_2 and selection_3 ) or
selection_1 and ( selection_4 and selection_5 ) or
selection_1 and selection_6
falsepositives:
2019-11-04 19:23:52 +03:00
- Legitimate administrator or developer creating legitimate executable files in a web application folder