Suspicious File Execution From Internet Hosted WebDav Share
Detects the execution of the "net use" command to mount a WebDAV server and then immediately execute some content in it. As seen being used in malicious LNK files
Sigma rule (View on GitHub)
1title: Suspicious File Execution From Internet Hosted WebDav Share
2id: f0507c0f-a3a2-40f5-acc6-7f543c334993
3status: test
4description: Detects the execution of the "net use" command to mount a WebDAV server and then immediately execute some content in it. As seen being used in malicious LNK files
5references:
6 - https://twitter.com/ShadowChasing1/status/1552595370961944576
7 - https://www.virustotal.com/gui/file/a63376ee1dba76361df73338928e528ca5b20171ea74c24581605366dcaa0104/behavior
8author: pH-T (Nextron Systems)
9date: 2022-09-01
10modified: 2023-02-21
11tags:
12 - attack.execution
13 - attack.t1059.001
14logsource:
15 category: process_creation
16 product: windows
17detection:
18 selection_img:
19 - Image|contains: '\cmd.exe'
20 - OriginalFileName: 'Cmd.EXE'
21 selection_base:
22 CommandLine|contains|all:
23 - ' net use http'
24 - '& start /b '
25 - '\DavWWWRoot\'
26 selection_ext:
27 CommandLine|contains:
28 - '.exe '
29 - '.dll '
30 - '.bat '
31 - '.vbs '
32 - '.ps1 '
33 condition: all of selection_*
34falsepositives:
35 - Unknown
36level: high
References
Related rules
- AWS EC2 Startup Shell Script Change
- Alternate PowerShell Hosts - PowerShell Module
- Bad Opsec Powershell Code Artifacts
- BloodHound Collection Files
- Certificate Exported Via PowerShell