LoFP LoFP / t1505

t1505

TitleTags
admin activity
administrative activity
crazy web applications
inventory and monitoring activity
legitimate administrative use
legitimate administrator activity
legitimate administrator or developer creating legitimate executable files in a web application folder
legitimate administrators may run these commands
legitimate application and websites that use windows paths in their url
legitimate applications
legitimate installations of exchange transportagents. assemblypath is a good indicator for this.
network monitoring or management products may have a web server component that runs shell commands as part of normal behavior.
particular web applications may spawn a shell process legitimately
security audits, maintenance, and network administrative scripts may trigger this alert when run under web processes.
tune based on assets if possible, or restrict to known confluence servers. remove the ${ for a more broad query. to identify more exec, remove everything up to the last parameter (runtime().exec) for a broad query.
unknown as it may vary from organisation to organisation how admins use to install iis modules
unlikely
user searches in search boxes of the respective website
vulnerability scanners
web applications that invoke linux command line tools
web applications that use the same url parameters as regeorg
web sites like wikis with articles on os commands and pages that include the os commands in the urls