Suspicious File Write to SharePoint Layouts Directory
Detects suspicious file writes to SharePoint layouts directory which could indicate webshell activity or post-exploitation. This behavior has been observed in the exploitation of SharePoint vulnerabilities such as CVE-2025-49704, CVE-2025-49706 or CVE-2025-53770.
Sigma rule (View on GitHub)
1title: Suspicious File Write to SharePoint Layouts Directory
2id: 1f0489be-b496-4ddf-b3a9-5900f2044e9c
3status: experimental
4description: |
5 Detects suspicious file writes to SharePoint layouts directory which could indicate webshell activity or post-exploitation.
6 This behavior has been observed in the exploitation of SharePoint vulnerabilities such as CVE-2025-49704, CVE-2025-49706 or CVE-2025-53770.
7references:
8 - https://unit42.paloaltonetworks.com/microsoft-sharepoint-cve-2025-49704-cve-2025-49706-cve-2025-53770/
9 - https://www.microsoft.com/en-us/security/blog/2025/07/22/disrupting-active-exploitation-of-on-premises-sharepoint-vulnerabilities/
10author: Swachchhanda Shrawan Poudel (Nextron Systems)
11date: 2025-07-24
12tags:
13 - attack.initial-access
14 - attack.t1190
15 - attack.persistence
16 - attack.t1505.003
17logsource:
18 product: windows
19 category: file_event
20detection:
21 selection:
22 Image|endswith:
23 - '\cmd.exe'
24 - '\powershell_ise.exe'
25 - '\powershell.exe'
26 - '\pwsh.exe'
27 - '\w3wp.exe'
28 TargetFilename|startswith:
29 - 'C:\Program Files\Common Files\Microsoft Shared\Web Server Extensions\'
30 - 'C:\Program Files (x86)\Common Files\Microsoft Shared\Web Server Extensions\'
31 TargetFilename|contains:
32 - '\15\TEMPLATE\LAYOUTS\'
33 - '\16\TEMPLATE\LAYOUTS\'
34 TargetFilename|endswith:
35 - '.asax'
36 - '.ascx'
37 - '.ashx'
38 - '.asmx'
39 - '.asp'
40 - '.aspx'
41 - '.bat'
42 - '.cmd'
43 - '.cer'
44 - '.config'
45 - '.hta'
46 - '.js'
47 - '.jsp'
48 - '.jspx'
49 - '.php'
50 - '.ps1'
51 - '.vbs'
52 condition: selection
53falsepositives:
54 - Unknown
55level: high
References
Related rules
- Potential SAP NetViewer Webshell Command Execution
- Suspicious Process By Web Server Process
- Suspicious Child Process Of SQL Server
- Suspicious File Drop by Exchange
- Suspicious MSExchangeMailboxReplication ASPX Write