heroui logo

Chopper Webshell Process Pattern

Sigma Rules

View Source
Summary
The "Chopper Webshell Process Pattern" rule is designed to detect malicious activities associated with the China Chopper webshells, particularly tiny ASPX webshells. This detection mechanism looks for specific patterns in process executions on Windows systems, focusing on instances where certain command lines and images are used during the execution of processes. Specifically, the rule targets processes that are initiated by \w3wp.exe, the IIS worker process for web applications, as this is a common entry point for webshells. The detection criteria involve monitoring for known command line patterns typically associated with webshell activities, such as commands that reveal information about the system (like `ipconfig`, `quser`, and `whoami`). By establishing these conditions, the rule aims to identify potential unauthorized persistence and exploitation attempts in a Windows environment, thus enabling faster incident response and remediation against threats that leverage these techniques.
Categories
  • Web
  • Endpoint
  • Windows
Data Sources
  • Process
  • Application Log
Created: 2022-10-01