Files
blue-team-tools/rules/windows/process_creation/win_webshell_detection.yml
T
2020-11-28 18:25:09 +01:00

51 lines
1.5 KiB
YAML

title: Webshell Detection With Command Line Keywords
id: bed2a484-9348-4143-8a8a-b801c979301c
description: Detects certain command line parameters often used during reconnaissance activity via web shells
author: Florian Roth, Jonhnathan Ribeiro, oscd.community
reference:
- https://www.fireeye.com/blog/threat-research/2013/08/breaking-down-the-china-chopper-web-shell-part-ii.html
date: 2017/01/01
modified: 2019/11/28
tags:
- attack.persistence
- attack.t1505.003
- attack.privilege_escalation # an old one
- attack.t1100 # an old one
logsource:
category: process_creation
product: windows
detection:
selection:
- ParentImage|endswith:
- '\w3wp.exe'
- '\php-cgi.exe'
- '\nginx.exe'
- '\httpd.exe'
- ParentImage|contains:
- '\apache'
- '\tomcat'
selection2:
Image|endswith:
- '\whoami.exe'
- '\systeminfo.exe'
selection3:
Image|endswith:
- '\net1.exe'
- '\net.exe'
CommandLine|contains: 'user'
selection4:
- CommandLine|contains|all:
- 'cd' # https://www.computerhope.com/cdhlp.htm
- '/d'
- CommandLine|contains: '&cd&echo'
selection5:
Image|endswith: '\ping.exe'
CommandLine|contains: '-n'
condition: selection and ( selection2 or selection3 or selection4 or selection5 )
fields:
- CommandLine
- ParentCommandLine
falsepositives:
- unknown
level: high