
Summary
This detection rule identifies potential backdoor activity within Microsoft Exchange Transport Agents by monitoring for specific WMI (Windows Management Instrumentation) event filters that could indicate malicious behavior. The rule focuses on processes related to the `EdgeTransport.exe` application, which is part of the Exchange transport layer responsible for sending and receiving mail. When the child process created has a parent image path ending with `EdgeTransport.exe`, it triggers the selection criteria, indicating potential exploitation if accompanied by WMI filters. The rule also includes filters to exclude legitimate processes that might normally interact with Exchange, such as `conhost.exe` and `OleConverter.exe`. If the selection criteria are met but the process fails to match one of the filtering conditions, the event is flagged as suspicious. It is essential for organizations using Microsoft Exchange to monitor for such activities, which could indicate attempts to maintain persistence or execute arbitrary code in a vulnerable system.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2019-10-11