heroui logo

Windows IIS Components Add New Module

Splunk Security Content

View Source
Summary
The detection rule for monitoring IIS module installations aims to identify the execution of AppCmd.exe, a command-line utility in Windows that allows administrators to manage IIS settings. By analyzing command-line executions and process names through EDR data, this rule raises alerts when AppCmd.exe is used in conjunction with terms indicative of module installation, suggesting potential malicious activity. The installation of unauthorized modules can often indicate attempts to deploy webshells or backdoors, which can lead to serious threats such as persistence, data exfiltration, and financial fraud. This rule captures relevant events across key data sources like Sysmon and CrowdStrike, enhancing visibility into endpoint activities that could signify security breaches.
Categories
  • Endpoint
Data Sources
  • Pod
  • Container
  • User Account
  • Windows Registry
  • Script
  • Image
  • Web Credential
  • Named Pipe
  • Certificate
  • WMI
  • Cloud Storage
  • Internet Scan
  • Persona
  • Group
  • Application Log
  • Logon Session
  • Instance
  • Sensor Health
  • File
  • Drive
  • Snapshot
  • Command
  • Kernel
  • Driver
  • Volume
  • Cloud Service
  • Malware Repository
  • Network Share
  • Network Traffic
  • Scheduled Job
  • Firmware
  • Active Directory
  • Service
  • Domain Name
  • Process
  • Firewall
  • Module
ATT&CK Techniques
  • T1505.004
  • T1505
Created: 2024-11-13