heroui logo

WebDAV LNK Execution

Anvilogic Forge

View Source
Summary
The WebDAV LNK Execution rule is designed to detect instances where a malicious LNK file, hosted on a WebDAV server, has been executed by a user. Threat actors exploit WebDAV to place harmful payloads, which, when accessed via URL shortcuts, can result in remote code execution on the user's machine. This rule leverages Windows Sysmon logs to identify specific process executions related to this attack vector. By searching for instances where certain processes (like 'cmd.exe', 'powershell.exe', etc.) are initiated from an explorer context and are correlated with access to the DavWWWRoot directory, the detection rule helps security professionals identify potential threats arising from user execution of LNK files that could compromise system integrity. The rule utilizes Splunk logic format to extract and analyze relevant sysmon event data effectively.
Categories
  • Endpoint
  • Windows
Data Sources
  • File
  • Process
ATT&CK Techniques
  • T1059.001
  • T1204
  • T1059.003
  • T1059
Created: 2024-02-09