Added search(-ms)/WebDAV rules

This commit is contained in:
Micah Babinski
2023-08-04 17:37:54 -07:00
parent 4735f5bb62
commit 8d16ed2cc2
3 changed files with 103 additions and 0 deletions
@@ -0,0 +1,39 @@
title: Search-ms and WebDAV Indicators in URL
id: 5039f3d2-406a-4c1a-9350-7a5a85dc84c2
status: experimental
description: Detects URL pattern used by search(-ms)/WebDAV initial access campaign.
references:
- https://www.trellix.com/en-us/about/newsroom/stories/research/beyond-file-search-a-novel-method.html
- https://micahbabinski.medium.com/search-ms-webdav-and-chill-99c5b23ac462
author: Micah Babinski
date: 2023/07/31
modified: 2023/08/04
tags:
- attack.initial_access
- attack.t1584
- attack.t1566
logsource:
category: proxy
detection:
selection_search_ms:
c-uri|contains|all:
- 'search' # matches on search:query= or search-ms:query=
- ':query='
- 'webdav'
selection_search_term:
c-uri|contains:
- 'invoice'
- 'payment'
- 'notice'
- 'agreement'
# add others!
filter:
dst_ip:
- '127.0.0.0/8'
- '10.0.0.0/8'
- '172.16.0.0/12'
- '192.168.0.0/16'
condition: all of selection_* and not filter
falsepositives:
- Legitimate use of search-ms/search URI protocol
level: high
@@ -0,0 +1,33 @@
title: WebDAV Temporary Local File Creation
id: 4c55738d-72d8-490e-a2db-7969654e375f
status: experimental
description: Detects the creation of WebDAV temporary files with suspicious extensions
references:
- https://www.trellix.com/en-us/about/newsroom/stories/research/beyond-file-search-a-novel-method.html
- https://micahbabinski.medium.com/search-ms-webdav-and-chill-99c5b23ac462
author: Micah Babinski
date: 2023/07/31
modified: 2023/08/04
tags:
- attack.initial_access
- attack.t1584
- attack.t1566
logsource:
product: windows
category: file_event
detection:
selection_1:
TargetFilename|contains: 'AppData\Local\Temp\TfsStore\Tfs_DAV'
selection_2:
TargetFilename|endswith:
- '.vbs'
- '.ps1'
- '.lnk'
- '.zip'
- '.ico'
- '.bat'
- '.js'
condition: all of selection_*
falsepositives:
- Legitimate use of WebDAV in an environment
level: low
@@ -0,0 +1,31 @@
title: Suspicious WebDAV LNK Execution
id: 1412aa78-a24c-4abd-83df-767dfb2c5bbe
related:
- f0507c0f-a3a2-40f5-acc6-7f543c334993
status: experimental
description: Detects possible execution via LNK file accessed on a WebDAV server.
references:
- https://www.trellix.com/en-us/about/newsroom/stories/research/beyond-file-search-a-novel-method.html
- https://micahbabinski.medium.com/search-ms-webdav-and-chill-99c5b23ac462
author: Micah Babinski
date: 2023/07/31
tags:
- attack.execution
- attack.t1059.001
- attack.t1204
logsource:
category: process_creation
product: windows
detection:
selection_img:
ParentImage|endswith: '\explorer.exe'
Image|endswith:
- '\wscript.exe'
- '\cscript.exe'
- '\cmd.exe'
selection_cmd:
CommandLine|contains: '\DavWWWRoot\'
condition: all of selection_*
falsepositives:
- Unknown
level: high