New AHQ
This commit is contained in:
Родитель
521879eed2
Коммит
1131b9c54e
|
@ -52,6 +52,7 @@ This query can be used to detect the following attack techniques and tactics ([s
|
|||
* [Exchange PowerShell snap-in being loaded](../Exfiltration/exchange-powershell-snapin-loaded.md)
|
||||
* [Powercat exploitation tool downloaded](../Delivery/powercat-download.md)
|
||||
* [Exchange vulnerability creating web shells via UMWorkerProcess](../Execution/umworkerprocess-creating-webshell.md)
|
||||
* [Exchange Server IIS dropping web shells and other artifacts](../Execution/exchange-iis-worker-dropping-webshell.md)
|
||||
* [Exchange vulnerability launching subprocesses through UMWorkerProcess](../Execution/umworkerprocess-unusual-subprocess-activity.md)
|
||||
* [Base64-encoded Nishang commands for loading reverse shell](../Execution/reverse-shell-nishang-base64.md)
|
||||
|
||||
|
|
|
@ -50,6 +50,7 @@ This query can be used to detect the following attack techniques and tactics ([s
|
|||
* [7-ZIP used by attackers to prepare data for exfiltration](../Exfiltration/7-zip-prep-for-exfiltration.md)
|
||||
* [Exchange PowerShell snap-in being loaded](../Exfiltration/exchange-powershell-snapin-loaded.md)
|
||||
* [Exchange vulnerability creating web shells via UMWorkerProcess](../Execution/umworkerprocess-creating-webshell.md)
|
||||
* [Exchange Server IIS dropping web shells and other artifacts](../Execution/exchange-iis-worker-dropping-webshell.md)
|
||||
* [Exchange vulnerability launching subprocesses through UMWorkerProcess](../Execution/umworkerprocess-unusual-subprocess-activity.md)
|
||||
* [Base64-encoded Nishang commands for loading reverse shell](../Execution/reverse-shell-nishang-base64.md)
|
||||
|
||||
|
|
|
@ -0,0 +1,68 @@
|
|||
# Exchange Server IIS dropping web shells and other artifacts
|
||||
|
||||
This query was originally published in the threat analytics report, "Exchange Server zero-days exploited in the wild".
|
||||
|
||||
In early March 2021, Microsoft released [patches](https://msrc-blog.microsoft.com/2021/03/02/multiple-security-updates-released-for-exchange-server/) for four different zero-day vulnerabilities affecting Microsoft Exchange Server. The vulnerabilities were being used in a coordinated attack. For more information on the vulnerabilities, visit the following links:
|
||||
|
||||
* [CVE-2021-26855](https://nvd.nist.gov/vuln/detail/CVE-2021-26855)
|
||||
* [CVE-2021-26857](https://nvd.nist.gov/vuln/detail/CVE-2021-26857)
|
||||
* [CVE-2021-26858](https://nvd.nist.gov/vuln/detail/CVE-2021-26858)
|
||||
* [CVE-2021-27065](https://nvd.nist.gov/vuln/detail/CVE-2021-27065)
|
||||
|
||||
The following query checks for the IIS worker process in Exchange Server dropping files that appear to be the web shells and other threat artifacts observed in known attacks.
|
||||
|
||||
More queries related to this threat can be found under the [See also](#See-also) section of this page.
|
||||
|
||||
## Query
|
||||
|
||||
```Kusto
|
||||
DeviceFileEvents
|
||||
| where InitiatingProcessFileName == 'w3wp.exe' | where InitiatingProcessCommandLine contains "MSExchange"
|
||||
| where FolderPath has_any ("\\wwwroot\\", "HttpProxy\\owa\\","\\Temporary ASP.NET Files\\")
|
||||
| where not(FolderPath has_any("\\tmp\\","\\dl3\\"))
|
||||
| where FolderPath !endswith ".log" | where FolderPath !endswith ".json"
|
||||
| where FolderPath !endswith ".ini"
|
||||
| where FolderPath !endswith ".vb"
|
||||
| where FolderPath !endswith '.tmp'
|
||||
| where FolderPath !endswith '.xml'
|
||||
| where FolderPath !endswith '.js'
|
||||
```
|
||||
|
||||
## Category
|
||||
|
||||
This query can be used to detect the following attack techniques and tactics ([see MITRE ATT&CK framework](https://attack.mitre.org/)) or security configuration states.
|
||||
|
||||
| Technique, tactic, or state | Covered? (v=yes) | Notes |
|
||||
|------------------------|----------|-------|
|
||||
| Initial access | | |
|
||||
| Execution | v | |
|
||||
| Persistence | v | |
|
||||
| Privilege escalation | | |
|
||||
| Defense evasion | | |
|
||||
| Credential Access | | |
|
||||
| Discovery | | |
|
||||
| Lateral movement | | |
|
||||
| Collection | | |
|
||||
| Command and control | | |
|
||||
| Exfiltration | | |
|
||||
| Impact | | |
|
||||
| Vulnerability | | |
|
||||
| Exploit | | |
|
||||
| Misconfiguration | | |
|
||||
| Malware, component | | |
|
||||
| Ransomware | | |
|
||||
|
||||
## See also
|
||||
|
||||
* [Reverse shell loaded using Nishang Invoke-PowerShellTcpOneLine technique](./reverse-shell-nishang.md)
|
||||
* [Procdump dumping LSASS credentials](../Credential%20Access/procdump-lsass-credentials.md)
|
||||
* [7-ZIP used by attackers to prepare data for exfiltration](../Exfiltration/7-zip-prep-for-exfiltration.md)
|
||||
* [Exchange PowerShell snap-in being loaded](../Exfiltration/exchange-powershell-snapin-loaded.md)
|
||||
* [Powercat exploitation tool downloaded](../Delivery/powercat-download.md)
|
||||
* [Exchange vulnerability creating web shells via UMWorkerProcess](./umworkerprocess-creating-webshell.md)
|
||||
* [Exchange vulnerability launching subprocesses through UMWorkerProcess](./umworkerprocess-unusual-subprocess-activity.md)
|
||||
* [Base64-encoded Nishang commands for loading reverse shell](./reverse-shell-nishang-base64.md)
|
||||
|
||||
## Contributor info
|
||||
|
||||
**Contributor:** Microsoft 365 Defender team
|
|
@ -57,6 +57,7 @@ This query can be used to detect the following attack techniques and tactics ([s
|
|||
* [Exchange PowerShell snap-in being loaded](../Exfiltration/exchange-powershell-snapin-loaded.md)
|
||||
* [Powercat exploitation tool downloaded](../Delivery/powercat-download.md)
|
||||
* [Exchange vulnerability creating web shells via UMWorkerProcess](./umworkerprocess-creating-webshell.md)
|
||||
* [Exchange Server IIS dropping web shells and other artifacts](./exchange-iis-worker-dropping-webshell.md)
|
||||
* [Exchange vulnerability launching subprocesses through UMWorkerProcess](./umworkerprocess-unusual-subprocess-activity.md)
|
||||
|
||||
## Contributor info
|
||||
|
|
|
@ -51,6 +51,7 @@ This query can be used to detect the following attack techniques and tactics ([s
|
|||
* [Exchange PowerShell snap-in being loaded](../Exfiltration/exchange-powershell-snapin-loaded.md)
|
||||
* [Powercat exploitation tool downloaded](../Delivery/powercat-download.md)
|
||||
* [Exchange vulnerability creating web shells via UMWorkerProcess](./umworkerprocess-creating-webshell.md)
|
||||
* [Exchange Server IIS dropping web shells and other artifacts](./exchange-iis-worker-dropping-webshell.md)
|
||||
* [Exchange vulnerability launching subprocesses through UMWorkerProcess](./umworkerprocess-unusual-subprocess-activity.md)
|
||||
* [Base64-encoded Nishang commands for loading reverse shell](./reverse-shell-nishang-base64.md)
|
||||
|
||||
|
|
|
@ -55,9 +55,11 @@ This query can be used to detect the following attack techniques and tactics ([s
|
|||
* [7-ZIP used by attackers to prepare data for exfiltration](../Exfiltration/7-zip-prep-for-exfiltration.md)
|
||||
* [Exchange PowerShell snap-in being loaded](../Exfiltration/exchange-powershell-snapin-loaded.md)
|
||||
* [Powercat exploitation tool downloaded](../Delivery/powercat-download.md)
|
||||
* [Exchange Server IIS dropping web shells and other artifacts](./exchange-iis-worker-dropping-webshell.md)
|
||||
* [Exchange vulnerability launching subprocesses through UMWorkerProcess](./umworkerprocess-unusual-subprocess-activity.md)
|
||||
* [Base64-encoded Nishang commands for loading reverse shell](./reverse-shell-nishang-base64.md)
|
||||
|
||||
|
||||
## Contributor info
|
||||
|
||||
**Contributor:** Microsoft 365 Defender team
|
||||
|
|
|
@ -53,6 +53,7 @@ This query can be used to detect the following attack techniques and tactics ([s
|
|||
* [Exchange PowerShell snap-in being loaded](../Exfiltration/exchange-powershell-snapin-loaded.md)
|
||||
* [Powercat exploitation tool downloaded](../Delivery/powercat-download.md)
|
||||
* [Exchange vulnerability creating web shells via UMWorkerProcess](./umworkerprocess-creating-webshell.md)
|
||||
* [Exchange Server IIS dropping web shells and other artifacts](./exchange-iis-worker-dropping-webshell.md)
|
||||
* [Base64-encoded Nishang commands for loading reverse shell](./reverse-shell-nishang-base64.md)
|
||||
|
||||
## Contributor info
|
||||
|
|
|
@ -50,6 +50,7 @@ This query can be used to detect the following attack techniques and tactics ([s
|
|||
* [Exchange PowerShell snap-in being loaded](./exchange-powershell-snapin-loaded.md)
|
||||
* [Powercat exploitation tool downloaded](../Delivery/powercat-download.md)
|
||||
* [Exchange vulnerability creating web shells via UMWorkerProcess](../Execution/umworkerprocess-creating-webshell.md)
|
||||
* [Exchange Server IIS dropping web shells and other artifacts](../Execution/exchange-iis-worker-dropping-webshell.md)
|
||||
* [Exchange vulnerability launching subprocesses through UMWorkerProcess](../Execution/umworkerprocess-unusual-subprocess-activity.md)
|
||||
* [Base64-encoded Nishang commands for loading reverse shell](../Execution/reverse-shell-nishang-base64.md)
|
||||
|
||||
|
|
|
@ -51,6 +51,7 @@ This query can be used to detect the following attack techniques and tactics ([s
|
|||
* [7-ZIP used by attackers to prepare data for exfiltration](./7-zip-prep-for-exfiltration.md)
|
||||
* [Powercat exploitation tool downloaded](../Delivery/powercat-download.md)
|
||||
* [Exchange vulnerability creating web shells via UMWorkerProcess](../Execution/umworkerprocess-creating-webshell.md)
|
||||
* [Exchange Server IIS dropping web shells and other artifacts](../Execution/exchange-iis-worker-dropping-webshell.md)
|
||||
* [Exchange vulnerability launching subprocesses through UMWorkerProcess](../Execution/umworkerprocess-unusual-subprocess-activity.md)
|
||||
* [Base64-encoded Nishang commands for loading reverse shell](../Execution/reverse-shell-nishang-base64.md)
|
||||
|
||||
|
|
Загрузка…
Ссылка в новой задаче