Detection rules › Sigma
Suspicious Process By Web Server Process
Detects potentially suspicious processes being spawned by a web server process which could be the result of a successfully placed web shell or exploitation
MITRE ATT&CK coverage
| Tactic | Techniques |
|---|---|
| Initial Access | T1190 Exploit Public-Facing Application |
| Persistence | T1505.003 Server Software Component: Web Shell |
Event coverage
| Provider | Event ID | Title |
|---|---|---|
| Sysmon | 1 | Process creation |
Stages and Predicates
Stage 1: 1 of selection_webserver_image
or:
ParentImage|endswith: '\UMWorkerProcess.exe'
ParentImage|endswith: '\caddy.exe'
ParentImage|endswith: '\httpd.exe'
ParentImage|endswith: '\nginx.exe'
ParentImage|endswith: '\php-cgi.exe'
ParentImage|endswith: '\php.exe'
ParentImage|endswith: '\tomcat.exe'
ParentImage|endswith: '\w3wp.exe'
ParentImage|endswith: '\ws_TomcatService.exe'
Stage 2: 1 of selection_webserver_characteristics_tomcat1
or:
ParentImage|endswith: '\java.exe'
ParentImage|endswith: '\javaw.exe'
or:
ParentImage|contains: -tomcat-
ParentImage|contains: '\tomcat'
Stage 3: 1 of selection_webserver_characteristics_tomcat2
or:
ParentCommandLine|contains: CATALINA_HOME
ParentCommandLine|contains: catalina.home
ParentCommandLine|contains: catalina.jar
or:
ParentImage|endswith: '\java.exe'
ParentImage|endswith: '\javaw.exe'
Stage 4: selection_anomaly_children
or:
Image|endswith: '\arp.exe'
Image|endswith: '\at.exe'
Image|endswith: '\bash.exe'
Image|endswith: '\bitsadmin.exe'
Image|endswith: '\certutil.exe'
Image|endswith: '\cmd.exe'
Image|endswith: '\cscript.exe'
Image|endswith: '\dsget.exe'
Image|endswith: '\hostname.exe'
Image|endswith: '\nbtstat.exe'
Image|endswith: '\net.exe'
Image|endswith: '\net1.exe'
Image|endswith: '\netdom.exe'
Image|endswith: '\netsh.exe'
Image|endswith: '\nltest.exe'
Image|endswith: '\ntdsutil.exe'
Image|endswith: '\powershell.exe'
Image|endswith: '\powershell_ise.exe'
Image|endswith: '\pwsh.exe'
Image|endswith: '\qprocess.exe'
Image|endswith: '\query.exe'
Image|endswith: '\qwinsta.exe'
Image|endswith: '\reg.exe'
Image|endswith: '\rundll32.exe'
Image|endswith: '\sc.exe'
Image|endswith: '\sh.exe'
Image|endswith: '\wmic.exe'
Image|endswith: '\wscript.exe'
Image|endswith: '\wusa.exe'
Stage 5: not 1 of filter_main_*
or:
CommandLine|endswith: 'Windows\system32\cmd.exe /c C:\ManageEngine\ADManager "Plus\ES\bin\elasticsearch.bat -Enode.name=RMP-NODE1 -pelasticsearch-pid.txt'
ParentImage|endswith: '\java.exe'
CommandLine|contains: 'ADManager Plus'
CommandLine|contains: 'sc query'
ParentImage|endswith: '\java.exe'
Indicators
Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.
| Field | Kind | Values |
|---|---|---|
CommandLine | ends_with |
|
CommandLine | match |
|
Image | ends_with |
|
ParentCommandLine | match |
|
ParentImage | ends_with |
|
ParentImage | match |
|