Added search(-ms)/WebDAV rules
This commit is contained in:
@@ -0,0 +1,39 @@
|
||||
title: Search-ms and WebDAV Indicators in URL
|
||||
id: 5039f3d2-406a-4c1a-9350-7a5a85dc84c2
|
||||
status: experimental
|
||||
description: Detects URL pattern used by search(-ms)/WebDAV initial access campaign.
|
||||
references:
|
||||
- https://www.trellix.com/en-us/about/newsroom/stories/research/beyond-file-search-a-novel-method.html
|
||||
- https://micahbabinski.medium.com/search-ms-webdav-and-chill-99c5b23ac462
|
||||
author: Micah Babinski
|
||||
date: 2023/07/31
|
||||
modified: 2023/08/04
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1584
|
||||
- attack.t1566
|
||||
logsource:
|
||||
category: proxy
|
||||
detection:
|
||||
selection_search_ms:
|
||||
c-uri|contains|all:
|
||||
- 'search' # matches on search:query= or search-ms:query=
|
||||
- ':query='
|
||||
- 'webdav'
|
||||
selection_search_term:
|
||||
c-uri|contains:
|
||||
- 'invoice'
|
||||
- 'payment'
|
||||
- 'notice'
|
||||
- 'agreement'
|
||||
# add others!
|
||||
filter:
|
||||
dst_ip:
|
||||
- '127.0.0.0/8'
|
||||
- '10.0.0.0/8'
|
||||
- '172.16.0.0/12'
|
||||
- '192.168.0.0/16'
|
||||
condition: all of selection_* and not filter
|
||||
falsepositives:
|
||||
- Legitimate use of search-ms/search URI protocol
|
||||
level: high
|
||||
@@ -0,0 +1,33 @@
|
||||
title: WebDAV Temporary Local File Creation
|
||||
id: 4c55738d-72d8-490e-a2db-7969654e375f
|
||||
status: experimental
|
||||
description: Detects the creation of WebDAV temporary files with suspicious extensions
|
||||
references:
|
||||
- https://www.trellix.com/en-us/about/newsroom/stories/research/beyond-file-search-a-novel-method.html
|
||||
- https://micahbabinski.medium.com/search-ms-webdav-and-chill-99c5b23ac462
|
||||
author: Micah Babinski
|
||||
date: 2023/07/31
|
||||
modified: 2023/08/04
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1584
|
||||
- attack.t1566
|
||||
logsource:
|
||||
product: windows
|
||||
category: file_event
|
||||
detection:
|
||||
selection_1:
|
||||
TargetFilename|contains: 'AppData\Local\Temp\TfsStore\Tfs_DAV'
|
||||
selection_2:
|
||||
TargetFilename|endswith:
|
||||
- '.vbs'
|
||||
- '.ps1'
|
||||
- '.lnk'
|
||||
- '.zip'
|
||||
- '.ico'
|
||||
- '.bat'
|
||||
- '.js'
|
||||
condition: all of selection_*
|
||||
falsepositives:
|
||||
- Legitimate use of WebDAV in an environment
|
||||
level: low
|
||||
@@ -0,0 +1,31 @@
|
||||
title: Suspicious WebDAV LNK Execution
|
||||
id: 1412aa78-a24c-4abd-83df-767dfb2c5bbe
|
||||
related:
|
||||
- f0507c0f-a3a2-40f5-acc6-7f543c334993
|
||||
status: experimental
|
||||
description: Detects possible execution via LNK file accessed on a WebDAV server.
|
||||
references:
|
||||
- https://www.trellix.com/en-us/about/newsroom/stories/research/beyond-file-search-a-novel-method.html
|
||||
- https://micahbabinski.medium.com/search-ms-webdav-and-chill-99c5b23ac462
|
||||
author: Micah Babinski
|
||||
date: 2023/07/31
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1059.001
|
||||
- attack.t1204
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection_img:
|
||||
ParentImage|endswith: '\explorer.exe'
|
||||
Image|endswith:
|
||||
- '\wscript.exe'
|
||||
- '\cscript.exe'
|
||||
- '\cmd.exe'
|
||||
selection_cmd:
|
||||
CommandLine|contains: '\DavWWWRoot\'
|
||||
condition: all of selection_*
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
Reference in New Issue
Block a user