
Summary
This detection rule targets suspicious file write activity performed by the MSExchangeMailboxReplication.exe process. Specifically, it focuses on the creation of .aspx and .asp files, which is atypical behavior for this process and may indicate an attempt to exploit vulnerabilities such as ProxyShell. The rule utilizes a high-level alert system due to the critical nature of anomalies associated with this process in environments where Microsoft Exchange is deployed. The linked reference provides further context about the implications of such actions in the context of ransomware families like BlackByte that leverage exploitation techniques against MS Exchange servers.
Categories
- Endpoint
- Windows
Data Sources
- File
Created: 2022-02-25