
Summary
This rule is designed to detect the execution of executables that are launched from external WebDAV shares specifically when accessed via the WebDAV Explorer integration. This behavior is commonly observed in initial access campaigns that utilize WebDAV for delivering malicious payloads. The rule sets up criteria where the User-Agent string must start with 'Microsoft-WebDAV-MiniRedir/' and the HTTP method should be a 'GET.' Additionally, it checks if the requested URI ends with file extensions associated with executables and scripts including '.exe', '.bat', '.cmd', and others. The rule further filters out traffic that is internal by specifying a range of known local IP address blocks (e.g., 127.0.0.0/8, 192.168.0.0/16) which should not be part of the suspicious activity flagged. If these criteria are met, an alert will be triggered, indicating a potentially malicious executable being fetched from an external source.
Categories
- Web
- Cloud
- Network
Data Sources
- Web Credential
- Network Traffic
- File
Created: 2024-05-10