Detection rules › Sigma
Webshell Hacking Activity Patterns
Detects certain parent child patterns found in cases in which a web shell is used to perform certain credential dumping or exfiltration activities on a compromised system
MITRE ATT&CK coverage
| Tactic | Techniques |
|---|---|
| Persistence | T1505.003 Server Software Component: Web Shell |
| Discovery | T1018 Remote System Discovery, T1033 System Owner/User Discovery, T1087 Account Discovery |
Event coverage
| Provider | Event ID | Title |
|---|---|---|
| Sysmon | 1 | Process creation |
| Security-Auditing | 4688 | A new process has been created. |
Stages and Predicates
Stage 1: 1 of selection_webserver_image
or:
ParentImage|endswith: '\caddy.exe'
ParentImage|endswith: '\httpd.exe'
ParentImage|endswith: '\nginx.exe'
ParentImage|endswith: '\php-cgi.exe'
ParentImage|endswith: '\w3wp.exe'
ParentImage|endswith: '\ws_tomcatservice.exe'
Stage 2: 1 of selection_webserver_characteristics_tomcat1
or:
ParentImage|endswith: '\java.exe'
ParentImage|endswith: '\javaw.exe'
or:
ParentImage|contains: -tomcat-
ParentImage|contains: '\tomcat'
Stage 3: 1 of selection_webserver_characteristics_tomcat2
or:
CommandLine|contains: CATALINA_HOME
CommandLine|contains: catalina.jar
or:
ParentImage|endswith: '\java.exe'
ParentImage|endswith: '\javaw.exe'
Stage 4: 1 of selection_child_1
CommandLine|contains: comsvcs
CommandLine|contains: rundll32
Stage 5: 1 of selection_child_2
CommandLine|contains: ' -hp'
CommandLine|contains: ' -m'
CommandLine|contains: ' a '
Stage 6: 1 of selection_child_3
CommandLine|contains: ' /add'
CommandLine|contains: ' user '
CommandLine|contains: net
Stage 7: 1 of selection_child_4
CommandLine|contains: ' administrators '
CommandLine|contains: ' localgroup '
CommandLine|contains: '/add'
CommandLine|contains: net
Stage 8: 1 of selection_child_5
or:
Image|endswith: '\Nanodump.exe'
Image|endswith: '\adfind.exe'
Image|endswith: '\fsutil.exe'
Image|endswith: '\ldifde.exe'
Image|endswith: '\ntdsutil.exe'
Image|endswith: '\procdump.exe'
Image|endswith: '\vssadmin.exe'
Stage 9: 1 of selection_child_6
or:
CommandLine|contains: ' -NoP '
CommandLine|contains: ' -W Hidden '
CommandLine|contains: ' -decode '
CommandLine|contains: ' /decode '
CommandLine|contains: ' /ticket:'
CommandLine|contains: ' sekurlsa'
CommandLine|contains: '.dmp full'
CommandLine|contains: '.downloadfile('
CommandLine|contains: '.downloadstring('
CommandLine|contains: FromBase64String
CommandLine|contains: 'process call create'
CommandLine|contains: 'reg save '
CommandLine|contains: 'whoami /priv'
Indicators
Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.
| Field | Kind | Values |
|---|---|---|
CommandLine | match |
|
Image | ends_with |
|
ParentImage | ends_with |
|
ParentImage | match |
|