
Summary
The detection rule titled 'Suspicious Execution from a WebDav Share' aims to identify malicious attempts to execute Windows scripts sourced from a remote WebDav share. This behavior is indicative of adversaries using remote shares to execute scripts, potentially evading file dropping onto victim systems. The rule utilizes an EQL (Event Query Language) query that filters for process executions linked to specific Windows process names and command-line arguments associated with possible malicious activity. The rule triggers on various Windows processes that might be used for executing commands and dynamically checks if these processes are interacting with a WebDav server. The investigation steps outlined include verifying the legitimacy of the WebDav server, analyzing the executed processes, and checking user account permissions to better understand the incident context. The risk score assigned to this rule is 73, indicating a high level of threat severity. Incident response recommendations focus on containing the event, investigating credential exposures, and improving detection mechanisms.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- Network Traffic
- Application Log
- User Account
ATT&CK Techniques
- T1204
- T1204.002
- T1021
- T1021.002
- T1570
Created: 2025-08-19