Extract Credentials From IIS Application Pool Configuration Files

Detects the execution of appcmd.exe that is used to extract credentials from configuration files. IIS application pools can run as different users for security and isolation purposes. When a user is specified for the application pool, their credentials are stored in plaintext in the configuration file.

Sigma rule (View on GitHub)

 1title: Extract Credentials From IIS Application Pool Configuration Files
 2id: cf6cd798-1933-4eb1-9ab7-2c9acc237104
 3description: Detects the execution of appcmd.exe that is used to extract credentials from configuration files. IIS application pools can run as different users for security and isolation purposes. When a user is specified for the application pool, their credentials are stored in plaintext in the configuration file.
 4status: experimental
 5date: 2023/09/04
 6author: \@kostastsale
 7references:
 8    - https://github.com/mpgn/CrackMapExec/pull/62
 9logsource:
10    category: process_creation
11    product: windows
12detection:
13    selection1:
14        Image|endswith:
15            - '\appcmd.exe'
16        ParentImage|endswith:
17            - '\powershell.exe'
18            - '\cmd.exe'
19        CommandLine|contains|all:
20            - ' list '
21            - ' apppool '
22            - '/@t*:'
23    condition: selection1
24falsepositives:
25    - Unlikely
26level: high
27tags:
28    - attack.CredentialAccess
29    - attack.T1552.001

References

to-top