heroui logo

Suspicious File Drop by Exchange

Sigma Rules

View Source
Summary
This rule detects suspicious file types that are dropped by Exchange components running on IIS (Internet Information Services). The detection is triggered when the file drop process is initiated by an instance of 'w3wp.exe', the main ISAPI extension for IIS applications running in a worker process. Specifically, it scrutinizes the command line used by the process for indications that it relates to Microsoft Exchange. The rule targets various file extensions commonly used in web-based attacks, such as .aspx, .asp, .ashx, .ps1, and executable types like .exe and .dll, which further showcases the potential malicious intent of the dropped files. The mechanism is set to enforce an 'all of selection' condition, ensuring only specific command and file type pairs are logged as suspicious. Given the nature of file drops in the context of Exchange vulnerabilities, this detection plays a crucial role in mitigating potential exploitation of the platform.
Categories
  • Windows
  • Endpoint
Data Sources
  • File
  • Process
Created: 2022-10-04