97 lines
3.1 KiB
YAML
97 lines
3.1 KiB
YAML
title: Shells Spawned by Web Servers
|
|
id: 8202070f-edeb-4d31-a010-a26c72ac5600
|
|
status: test
|
|
description: Detects web servers that spawn shell processes which could be the result of a successfully placed web shell or another attack
|
|
author: Thomas Patzke, Florian Roth, Zach Stanford @svch0st, Tim Shelton, Nasreddine Bencherchali (update)
|
|
date: 2019/01/16
|
|
modified: 2022/08/01
|
|
references:
|
|
- https://media.defense.gov/2020/Jun/09/2002313081/-1/-1/0/CSI-DETECT-AND-PREVENT-WEB-SHELL-MALWARE-20200422.PDF
|
|
tags:
|
|
- attack.persistence
|
|
- attack.t1505.003
|
|
- attack.t1190
|
|
logsource:
|
|
category: process_creation
|
|
product: windows
|
|
detection:
|
|
selection_webserver_image:
|
|
ParentImage|endswith:
|
|
- '\w3wp.exe'
|
|
- '\php-cgi.exe'
|
|
- '\nginx.exe'
|
|
- '\httpd.exe'
|
|
- '\caddy.exe'
|
|
- '\ws_TomcatService.exe'
|
|
- '\tomcat.exe'
|
|
- '\UMWorkerProcess.exe' # https://www.fireeye.com/blog/threat-research/2021/03/detection-response-to-exploitation-of-microsoft-exchange-zero-day-vulnerabilities.html
|
|
selection_webserver_characteristics_tomcat1:
|
|
ParentImage|endswith:
|
|
- '\java.exe'
|
|
- '\javaw.exe'
|
|
ParentImage|contains:
|
|
- '-tomcat-'
|
|
- '\tomcat'
|
|
selection_webserver_characteristics_tomcat2:
|
|
ParentImage|endswith:
|
|
- '\java.exe'
|
|
- '\javaw.exe'
|
|
ParentCommandLine|contains:
|
|
- 'catalina.jar'
|
|
- 'CATALINA_HOME'
|
|
- 'catalina.home'
|
|
anomaly_children:
|
|
Image|endswith:
|
|
- '\cmd.exe'
|
|
- '\sh.exe'
|
|
- '\bash.exe'
|
|
- '\powershell.exe'
|
|
- '\pwsh.exe'
|
|
- '\bitsadmin.exe'
|
|
- '\arp.exe'
|
|
- '\at.exe'
|
|
- '\certutil.exe'
|
|
- '\dsget.exe'
|
|
- '\dsquery.exe'
|
|
- '\find.exe'
|
|
- '\findstr.exe'
|
|
- '\fsutil.exe'
|
|
- '\hostname.exe'
|
|
- '\ipconfig.exe'
|
|
- '\nbtstat.exe'
|
|
- '\net.exe'
|
|
- '\net1.exe'
|
|
- '\netdom.exe'
|
|
- '\netsh.exe'
|
|
- '\netstat.exe'
|
|
- '\nltest.exe'
|
|
- '\nslookup.exe'
|
|
- '\ntdutil.exe'
|
|
- '\pathping.exe'
|
|
- '\ping.exe'
|
|
- '\qprocess.exe'
|
|
- '\query.exe'
|
|
- '\qwinsta.exe'
|
|
- '\reg.exe'
|
|
- '\rundll32.exe'
|
|
- '\sc.exe'
|
|
- '\schtasks.exe'
|
|
- '\systeminfo.exe'
|
|
- '\tasklist.exe'
|
|
- '\tracert.exe'
|
|
- '\ver.exe'
|
|
- '\vssadmin.exe'
|
|
- '\wevtutil.exe'
|
|
- '\whoami.exe'
|
|
- '\wmic.exe'
|
|
- '\wusa.exe'
|
|
false_positive1:
|
|
CommandLine|endswith: 'Windows\system32\cmd.exe /c C:\ManageEngine\ADManager "Plus\ES\bin\elasticsearch.bat -Enode.name=RMP-NODE1 -pelasticsearch-pid.txt'
|
|
condition: 1 of selection* and anomaly_children and not 1 of false_positive*
|
|
fields:
|
|
- CommandLine
|
|
- ParentCommandLine
|
|
falsepositives:
|
|
- Particular web applications may spawn a shell process legitimately
|
|
level: high
|