ProxyLogon MSExchange OabVirtualDirectory
Detects specific patterns found after a successful ProxyLogon exploitation in relation to a Commandlet invocation of Set-OabVirtualDirectory
Sigma rule (View on GitHub)
1title: ProxyLogon MSExchange OabVirtualDirectory
2id: 550d3350-bb8a-4ff3-9533-2ba533f4a1c0
3status: test
4description: Detects specific patterns found after a successful ProxyLogon exploitation in relation to a Commandlet invocation of Set-OabVirtualDirectory
5references:
6 - https://bi-zone.medium.com/hunting-down-ms-exchange-attacks-part-1-proxylogon-cve-2021-26855-26858-27065-26857-6e885c5f197c
7author: Florian Roth (Nextron Systems)
8date: 2021-08-09
9modified: 2023-01-23
10tags:
11 - attack.t1587.001
12 - attack.resource-development
13logsource:
14 product: windows
15 service: msexchange-management
16detection:
17 keywords_cmdlet:
18 '|all':
19 - 'OabVirtualDirectory'
20 - ' -ExternalUrl '
21 keywords_params:
22 - 'eval(request'
23 - 'http://f/<script'
24 - '"unsafe"};'
25 - 'function Page_Load()'
26 condition: keywords_cmdlet and keywords_params
27falsepositives:
28 - Unlikely
29level: critical
References
Related rules
- Conti Volume Shadow Listing
- Formbook Process Creation
- Mustang Panda Dropper
- PUA - CsExec Execution
- Potential Privilege Escalation To LOCAL SYSTEM