Files
hayabusa/rules/Sigma/win_susp_iss_module_install.yml
2021-11-14 11:00:56 +09:00

36 lines
1.1 KiB
YAML

title: IIS Native-Code Module Command Line Installation
author: Florian Roth
date: 2012/12/11
description: Detects suspicious IIS native-code module installations via command line
detection:
SELECTION_1:
EventID: 1
SELECTION_2:
Image: '*\appcmd.exe'
SELECTION_3:
CommandLine: '*install*'
SELECTION_4:
CommandLine: '*module*'
SELECTION_5:
CommandLine: '*/name:*'
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3 and SELECTION_4 and SELECTION_5)
falsepositives:
- Unknown as it may vary from organisation to arganisation how admins use to install
IIS modules
id: 9465ddf4-f9e4-4ebd-8d98-702df3a93239
level: medium
logsource:
category: process_creation
product: windows
modified: 2020/11/28
references:
- https://researchcenter.paloaltonetworks.com/2018/01/unit42-oilrig-uses-rgdoor-iis-backdoor-targets-middle-east/
status: experimental
tags:
- attack.persistence
- attack.t1505.003
- attack.t1100
yml_filename: win_susp_iss_module_install.yml
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/process_creation