
Summary
This analytic rule identifies instances where a shell (PowerShell.exe or Cmd.exe) is spawned from W3WP.exe, the IIS worker process. The detection is crucial as it signifies potential webshell activity, often linked with exploitation attempts, such as the HAFNIUM group targeting Exchange servers. The rule leverages data from various sources including Sysmon EventID 1 and Windows Event Log Security 4688, focusing on process creation events with W3WP.exe as the parent process. The potential consequences of this behavior, if confirmed as malicious, include unauthorized command execution, system compromise, data exfiltration, and lateral movement within networks. Known false positives should be accounted for by baselining environments prior to implementation.
Categories
- Endpoint
Data Sources
- Pod
- Container
- User Account
- Windows Registry
- Script
- Image
- Web Credential
- Named Pipe
- Certificate
- WMI
- Cloud Storage
- Internet Scan
- Persona
- Group
- Application Log
- Logon Session
- Instance
- Sensor Health
- File
- Drive
- Snapshot
- Command
- Kernel
- Driver
- Volume
- Cloud Service
- Malware Repository
- Network Share
- Network Traffic
- Scheduled Job
- Firmware
- Active Directory
- Service
- Domain Name
- Process
- Firewall
- Module
ATT&CK Techniques
- T1505
- T1505.003
Created: 2024-11-13