
Summary
This rule detects occurrences of remote PowerShell commands being executed via POST requests, specifically targeting the exploitation patterns associated with the OWASSRF vulnerabilities (CVE-2022-41080 and CVE-2022-41082). It indicates potential initial access attempts by threat actors, particularly those linked to the Magic Hound group, which has multiple aliases including APT35 and Charming Kitten. The detection mechanism utilizes web application firewall (WAF) logs to identify POST requests that contain 'powershell' commands, suggesting malicious activity. The logic used is implemented in Splunk and aggregates relevant attributes such as time, host, user agent, and various IP addresses, which helps in pinpointing potentially harmful activities. The rule leverages statistical aggregation functions to monitor these request patterns over time, enabling administrators to identify unusual spikes or patterns indicative of an exploit attempt. The inclusion of a reference from CrowdStrike enhances the contextual understanding of the vulnerabilities in question.
Categories
- Web
- Cloud
- Application
Data Sources
- Web Credential
- Application Log
- Network Traffic
ATT&CK Techniques
- T1059.001
- T1133
- T1190
Created: 2024-02-09