Detection rules › Kusto Query Language

Identify SysAid Server web shell creation

Author
Microsoft Security Research
Source
upstream

'This query looks for potential webshell creation by the threat actor Mercury after the sucessful exploitation of SysAid server. Reference: https://www.microsoft.com/security/blog/2022/08/25/mercury-leveraging-log4j-2-vulnerabilities-in-unpatched-systems-to-target-israeli-organizations/'

MITRE ATT&CK coverage

TacticTechniques
Initial AccessT1190 Exploit Public-Facing Application

Event coverage

ProviderEvent IDTitle
Security-Auditing4663An attempt was made to access an object.
Security-Auditing4688A new process has been created.

Stages and Predicates

Stage 1: source

<union>

Stage 2: union

union of 3 branches

Stage 3: extend

Stage 4: extend

Stage 5: extend