Skip to content

Commit

Permalink
updating search
Browse files Browse the repository at this point in the history
  • Loading branch information
patel-bhavin committed Dec 23, 2024
1 parent 458bf0c commit cf80368
Showing 1 changed file with 14 additions and 12 deletions.
26 changes: 14 additions & 12 deletions detections/endpoint/detect_exchange_web_shell.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Detect Exchange Web Shell
id: 8c14eeee-2af1-4a4b-bda8-228da0f4862a
version: '8'
date: '2024-11-28'
version: 10
date: '2024-12-12'
author: Michael Haag, Shannon Davis, David Dorsey, Splunk
status: production
type: TTP
Expand All @@ -16,16 +16,18 @@ description: The following analytic identifies the creation of suspicious .aspx
data_source:
- Sysmon EventID 1 AND Sysmon EventID 11
search: '| tstats `security_content_summariesonly` count FROM datamodel=Endpoint.Processes
where Processes.process_name=System by _time span=1h Processes.process_id Processes.process_name
Processes.dest Processes.user | `drop_dm_object_name(Processes)` | join process_guid,
_time [| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
as lastTime FROM datamodel=Endpoint.Filesystem where Filesystem.file_path IN ("*\\HttpProxy\\owa\\auth\\*",
"*\\inetpub\\wwwroot\\aspnet_client\\*", "*\\HttpProxy\\OAB\\*") Filesystem.file_name
IN( "*.aspx", "*.ashx") by _time span=1h Filesystem.user Filesystem.dest Filesystem.file_create_time
Filesystem.file_name Filesystem.file_path | `drop_dm_object_name(Filesystem)` |
fields _time dest user file_create_time file_name file_path process_name process_path
process] | dedup file_create_time | table dest user file_create_time, file_name,
file_path, process_name | `detect_exchange_web_shell_filter`'
where Processes.process_name=System by _time span=1h Processes.process_guid Processes.process_name Processes.process
Processes.dest Processes.user
| `drop_dm_object_name(Processes)`
| join process_guid, _time
[| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
as lastTime FROM datamodel=Endpoint.Filesystem where Filesystem.file_path IN ("*\\HttpProxy\\owa\\auth\\*",
"*\\inetpub\\wwwroot\\aspnet_client\\*", "*\\HttpProxy\\OAB\\*") Filesystem.file_name
IN( "*.aspx", "*.ashx") by _time span=1h Filesystem.process_guid Filesystem.user Filesystem.dest Filesystem.file_create_time
Filesystem.file_name Filesystem.file_path
| `drop_dm_object_name(Filesystem)` ]
| dedup file_create_time
| table _time dest user file_create_time file_name file_path process_name process process_guid | `detect_exchange_web_shell_filter`'
how_to_implement: To successfully implement this search you need to be ingesting information
on process that include the name of the process responsible for the changes from
your endpoints into the `Endpoint` datamodel in the `Processes` node and `Filesystem`
Expand Down

0 comments on commit cf80368

Please sign in to comment.