
Summary
This detection rule identifies when the `net use` command is executed to mount a WebDAV server, followed by the immediate execution of files from that mounted location, typically seen in malicious contexts such as file execution patterns utilized by malicious LNK files. The detection relies on monitoring process creation events on Windows systems, specifically looking for a command line that includes `net use http` indicating the file share being accessed via WebDAV, and then checking if a command to execute applications or scripts from that location follows shortly thereafter. The rule is designed to catch potentially suspicious behavior and alert security personnel to investigate further, especially given the potential for abuse in executing malicious payloads from an external WebDAV server. The parameters used in this rule specifically look for known executable file extensions as well as command-line patterns indicative of file execution after a network drive has been mounted.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2022-09-01