heroui logo

Windows PowerShell IIS Components WebGlobalModule Usage

Splunk Security Content

View Source
Summary
This analytic rule is designed to detect suspicious PowerShell activity involving the usage of specific IIS cmdlets that could be indicative of an attack or misuse of privileges within a Windows environment. By monitoring EventCode 4104 from PowerShell Script Block Logging, the detection focuses on the use of 'New-WebGlobalModule', 'Enable-WebGlobalModule', and 'Set-WebGlobalModule'. These commands enable attackers to manipulate IIS configurations, potentially allowing them to bypass security measures and persist within the network. The rule tracks occurrences of these cmdlets, providing insight into possible security incidents that can lead to unauthorized access or web server manipulation. If malicious actions are confirmed, they could result in serious risks, including privilege escalation and changes to web server behaviors. The implementation requires configuring necessary logging settings on endpoints and providing appropriate response measures for identified threats.
Categories
  • Endpoint
Data Sources
  • Pod
  • Container
  • User Account
  • Process
  • File
  • Command
ATT&CK Techniques
  • T1505.004
  • T1505
Created: 2024-11-13