Identify SysAid Server web shell creation

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This query looks for potential webshell creation by the threat actor Mercury after the sucessful exploitation of SysAid server. Reference: https://www.microsoft.com/security/blog/2022/08/25/mercury-leveraging-log4j-2-vulnerabilities-in-unpatched-systems-to-target-israeli-organizations/

Attribute Value
Type Analytic Rule
Solution Web Shells Threat Protection
ID 50eb4cbd-188f-44f4-b964-bab84dcdec10
Severity High
Kind Scheduled
Tactics InitialAccess
Techniques T1190
Required Connectors SecurityEvents, WindowsSecurityEvents, MicrosoftThreatProtection
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Selection Criteria Transformations Ingestion API Lake-Only
DeviceFileEvents ?
SecurityEvent EventID in "4663,4688" ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules · Back to Web Shells Threat Protection