Suspicious Windows Strings In URI
Detects suspicious Windows strings in URI which could indicate possible exfiltration or webshell communication
Sigma rule (View on GitHub)
1title: Suspicious Windows Strings In URI
2id: 9f6a34b4-2688-4eb7-a7f5-e39fef573d0e
3status: test
4description: Detects suspicious Windows strings in URI which could indicate possible exfiltration or webshell communication
5references:
6 - https://thedfirreport.com/2022/06/06/will-the-real-msiexec-please-stand-up-exploit-leads-to-data-exfiltration/
7author: Nasreddine Bencherchali (Nextron Systems)
8date: 2022-06-06
9modified: 2023-01-02
10tags:
11 - attack.persistence
12 - attack.exfiltration
13 - attack.t1505.003
14logsource:
15 category: webserver
16detection:
17 selection:
18 cs-uri-query|contains:
19 - '=C:/Users'
20 - '=C:/Program%20Files'
21 - '=C:/Windows'
22 - '=C%3A%5CUsers'
23 - '=C%3A%5CProgram%20Files'
24 - '=C%3A%5CWindows'
25 condition: selection
26falsepositives:
27 - Legitimate application and websites that use windows paths in their URL
28level: high
References
Related rules
- CVE-2021-40539 Zoho ManageEngine ADSelfService Plus Exploit
- Certificate Request Export to Exchange Webserver
- Chopper Webshell Process Pattern
- DEWMODE Webshell Access
- Exchange Set OabVirtualDirectory ExternalUrl Property