Exchange Worker Process Making Remote Call

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This query dynamically identifies Exchange servers and then looks for instances where the IIS worker process initiates a call out to a remote URL using either cmd.exe or powershell.exe. This behaviour was described as post-compromise behaviour following exploitation of CVE-2022-41040 and CVE-2022-41082, this pattern of activity was use to download additional tools to the server. This suspicious activity is generic.

Attribute Value
Type Analytic Rule
Solution Standalone Content
ID 2c701f94-783c-4cd4-bc9b-3b3334976090
Severity Medium
Kind Scheduled
Tactics Execution
Techniques T1059.001, T1059.003
Required Connectors AzureMonitor(IIS), MicrosoftThreatProtection
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
W3CIISLog ?

Associated Connectors

The following connectors provide data for this content item:

Connector Solution
ESI-Opt5ExchangeIISLogs Microsoft Exchange Security - Exchange On-Premises

Solutions: Microsoft Exchange Security - Exchange On-Premises


Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Analytic Rules