
Summary
This rule is designed to detect suspicious activity patterns related to web shell usage on compromised Windows systems. Web shells are malicious scripts that allow remote control of a server, often used to perform unauthorized actions such as credential dumping or data exfiltration. The detection focuses on identifying instances where known web server parent processes, such as Caddy, Apache, Nginx, PHP, IIS, and Tomcat, spawn child processes with specific command line arguments indicative of such malicious behavior. Detected patterns include unusual Windows commands and common tools used in credential dumping, such as 'rundll32', 'ntdsutil.exe', or 'procdump.exe'. The detection uses a combination of parent-child process relationships and command line content to trigger alerts when they meet defined criteria, flagging high-level threats based on the defined pattern matching.
Categories
- Web
- Windows
- Cloud
Data Sources
- Process
Created: 2022-03-17