LoFP LoFP / t1505

t1505

TitleTags
admin activity
administrative activity
baseline your environment before production. it is possible build systems using iis will spawn cmd.exe to perform a software build. filter as needed.
crazy web applications
false positives are present when the values are set to 1 for utf and lookup. it's possible to raise this to ttp (direct notable) if removal of other_lookups occur and score is raised to 2 (down from 4).
false positives may be present based on developers or third party utilities adding items to the gac.
false positives may be present if gacutil.exe is utilized day to day by developers. filter as needed.
false positives may be present only if scripts or administrators are disabling logging. filter as needed by parent process or other.
false positives may be present until properly tuned. filter as needed.
false positives may be present when updates or an administrator adds a new module to iis. monitor and filter as needed.
false positives will be present until all module failures are resolved or reviewed.
inventory and monitoring activity
it is possible administrators or scripts may run these commands, filtering may be required.
legitimate administrative use
legitimate administrator activity
legitimate administrator or developer creating legitimate executable files in a web application folder
legitimate administrators may run these commands
legitimate application and websites that use windows paths in their url
legitimate applications
legitimate installations of exchange transportagents. assemblypath is a good indicator for this.
legitimate os functions called by vendor applications, baseline the environment and filter before enabling. recommend throttle by dest/process_name
network monitoring or management products may have a web server component that runs shell commands as part of normal behavior.
particular web applications may spawn a shell process legitimately
security audits, maintenance, and network administrative scripts may trigger this alert when run under web processes.
the jsp file names are static names used in current proof of concept code. =
the query is structured in a way that `action` (read, create) is not defined. review the results of this query, filter, and tune as necessary. it may be necessary to generate this query specific to your endpoint product.
this analytic is meant to assist with hunting modules across a fleet of iis servers. filter and modify as needed.
tune based on assets if possible, or restrict to known confluence servers. remove the ${ for a more broad query. to identify more exec, remove everything up to the last parameter (runtime().exec) for a broad query.
unknown as it may vary from organisation to organisation how admins use to install iis modules
unlikely
user searches in search boxes of the respective website
vulnerability scanners
web applications that invoke linux command line tools
web applications that use the same url parameters as regeorg
web sites like wikis with articles on os commands and pages that include the os commands in the urls