heroui logo

MS Exchange Mailbox Replication service writing Active Server Pages

Splunk Security Content

View Source
Summary
The analytic rule focuses on detecting the suspicious creation of .aspx files by the MSExchangeMailboxReplication.exe process, which is unusual behavior for this service. This activity is indicative of potential exploitation attempts related to Microsoft Exchange vulnerabilities, specifically those exploited by the HAFNIUM group using ProxyShell tactics. The detection is accomplished by monitoring relevant Sysmon events, specifically Event ID 1 (Process Creation) and Event ID 11 (File Created), to track processes and file system changes. If malicious behavior is confirmed, attackers could execute arbitrary code and maintain persistence, necessitating swift investigation and remediation to safeguard Exchange server environments.
Categories
  • Endpoint
  • Cloud
Data Sources
  • File
  • Process
ATT&CK Techniques
  • T1505
  • T1505.003
  • T1190
  • T1133
Created: 2024-11-13