heroui logo

Web Shell Detection: Script Process Child of Common Web Processes

Elastic Detection Rules

View Source
Summary
The 'Web Shell Detection: Script Process Child of Common Web Processes' rule is designed to identify potentially malicious activity involving web server processes that spawn script or command-line interface programs. This behavior can indicate an attacker's use of a web shell—a script uploaded onto vulnerable web servers that allows unauthorized access to system commands and functions. The rule triggers when certain processes, such as 'w3wp.exe' (IIS worker process) or 'httpd.exe' (Apache server), create child processes like 'cmd.exe' or 'powershell.exe'. False positives may arise from legitimate system maintenance scripts or administrative tasks, and the rule includes comprehensive guidelines for triage and incident response should an alert be triggered. The analysis of spawned processes, monitoring of related alerts, and investigation of command lines executed by the processes are critical steps in the incident response process. The rule is aligned with the MITRE ATT&CK framework, particularly focusing on techniques related to persistence, initial access, and command execution, tying into broader network security strategies.
Categories
  • Endpoint
  • Windows
  • Web
Data Sources
  • Process
  • Windows Registry
  • Application Log
  • Network Traffic
ATT&CK Techniques
  • T1505
  • T1505.003
  • T1190
  • T1059
  • T1059.001
  • T1059.003
  • T1059.005
  • T1047
Created: 2021-08-24