heroui logo

Executable from Webdav

Sigma Rules

View Source
Summary
This rule aims to detect instances of executable files being accessed through WebDAV protocols, which is a method commonly exploited by advanced persistent threat groups such as APT29 for command and control purposes. It utilizes logs from the Zeek network monitoring tool, particularly focusing on HTTP service requests. The detection logic involves inspecting the user agent in the request to check for 'WebDAV' references and verifying that the requested resource is an executable file based on its MIME type or file extension. By correlating these parameters, the rule identifies potential unauthorized executable downloads via WebDAV, which can be indicative of malicious activity. This detection is grounded in practical scenarios simulated during the APT29 detection hackathon, thus providing a realistic threat detection mechanism for security operations. The rule's configuration allows it to balance false positive rates by concentrating on specific indicators associated with legitimate WebDAV access not typically relating to executables.
Categories
  • Network
  • Endpoint
  • Web
Data Sources
  • Web Credential
  • Network Traffic
Created: 2020-05-01