rule: extended webshell rule with tomcat.exe

This commit is contained in:
Florian Roth
2020-03-04 14:25:57 +01:00
parent f98ad7a8df
commit 6bbb166f3d
@@ -4,6 +4,7 @@ status: experimental
description: Web servers that spawn shell processes could be the result of a successfully placed web shell or an other attack
author: Thomas Patzke
date: 2019/01/16
modified: 2020/03/03
logsource:
category: process_creation
product: windows
@@ -14,6 +15,7 @@ detection:
- '*\httpd.exe'
- '*\nginx.exe'
- '*\php-cgi.exe'
- '*\tomcat.exe'
Image:
- '*\cmd.exe'
- '*\sh.exe'