Windows Webshell Strings
Detects common commands used in Windows webshells
Sigma rule (View on GitHub)
1title: Windows Webshell Strings
2id: 7ff9db12-1b94-4a79-ba68-a2402c5d6729
3status: test
4description: Detects common commands used in Windows webshells
5references:
6 - https://bad-jubies.github.io/RCE-NOW-WHAT/
7 - https://m365internals.com/2022/10/07/hunting-in-on-premises-exchange-server-logs/
8author: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
9date: 2017-02-19
10modified: 2022-11-18
11tags:
12 - attack.persistence
13 - attack.t1505.003
14logsource:
15 category: webserver
16detection:
17 selection_method:
18 cs-method: 'GET'
19 selection_keywords:
20 # The "%20" is URL encoded version of the space
21 # The "%2B" is URL encoded version of the "+"
22 - '=whoami'
23 - '=net%20user'
24 - '=net+user'
25 - '=net%2Buser'
26 - '=cmd%20/c%'
27 - '=cmd+/c+'
28 - '=cmd%2B/c%'
29 - '=cmd%20/r%'
30 - '=cmd+/r+'
31 - '=cmd%2B/r%'
32 - '=cmd%20/k%'
33 - '=cmd+/k+'
34 - '=cmd%2B/k%'
35 - '=powershell%'
36 - '=powershell+'
37 - '=tasklist%'
38 - '=tasklist+'
39 - '=wmic%'
40 - '=wmic+'
41 - '=ssh%'
42 - '=ssh+'
43 - '=python%'
44 - '=python+'
45 - '=python3%'
46 - '=python3+'
47 - '=ipconfig'
48 - '=wget%'
49 - '=wget+'
50 - '=curl%'
51 - '=curl+'
52 - '=certutil'
53 - '=copy%20%5C%5C'
54 - '=dsquery%'
55 - '=dsquery+'
56 - '=nltest%'
57 - '=nltest+'
58 condition: all of selection_*
59fields:
60 - client_ip
61 - vhost
62 - url
63 - response
64falsepositives:
65 - Web sites like wikis with articles on os commands and pages that include the os commands in the URLs
66 - User searches in search boxes of the respective website
67level: high
References
Related rules
- CVE-2021-40539 Zoho ManageEngine ADSelfService Plus Exploit
- Certificate Request Export to Exchange Webserver
- Chopper Webshell Process Pattern
- DEWMODE Webshell Access
- Exchange Set OabVirtualDirectory ExternalUrl Property