Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
| Attribute | Value |
|---|---|
| Publisher | Microsoft Corporation |
| Support Tier | Microsoft |
| Support Link | https://support.microsoft.com/ |
| Categories | domains |
| Version | 3.0.4 |
| Author | Microsoft - support@microsoft.com |
| First Published | 2022-05-22 |
| Solution Folder | Web Shells Threat Protection |
| Marketplace | Azure Marketplace · Popularity: 🟡 Low (46%) |
| Pre-requisites | Microsoft Defender XDR, Windows Security Events, Azure Web Application Firewall (WAF) |
The Web Shells Threat Protection solution contains security content that helps proactive and reactive detection of Web Shells used by attackers. Web Shells are malicious scripts that attackers use to compromise internet facing servers. These are commonly used as a backdoor into the targeted web applications and servers. Microsoft Security Research has highlighted the threat, usage and detection of Web Shells in an enterprise environment in the following blogs:
For details on the required solutions, see the Pre-requisites section below.
Keywords: WebDAV, SysAid, Mercury, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, SUPERNOVA, SpringShell, CVE-2022-22965
This solution depends on 3 other solution(s):
| Solution |
|---|
| Azure Web Application Firewall (WAF) |
| Microsoft Defender XDR |
| Windows Security Events |
This solution does not include its own data connectors but uses connectors from dependency solutions:
This solution queries 4 table(s) from its content items:
| Table | Used By Content |
|---|---|
AzureDiagnostics |
Hunting |
DeviceFileEvents |
Analytics, Hunting |
SecurityEvent |
Analytics |
W3CIISLog |
Analytics, Hunting |
The following 1 table(s) are used internally by this solution's content items:
| Table | Used By Content |
|---|---|
SecurityAlert |
Analytics |
This solution includes 9 content item(s):
| Content Type | Count |
|---|---|
| Hunting Queries | 6 |
| Analytic Rules | 3 |
| Name | Severity | Tactics | Tables Used |
|---|---|---|---|
| Identify SysAid Server web shell creation | High | InitialAccess | DeviceFileEventsSecurityEvent |
| Malicious web application requests linked with Microsoft Defender for Endpoint (formerly Microsoft Defender ATP) alerts | Medium | Persistence | W3CIISLogInternal use: SecurityAlert |
| SUPERNOVA webshell | High | Persistence, CommandAndControl | W3CIISLog |
| Name | Tactics | Tables Used |
|---|---|---|
| Exchange IIS Worker Dropping Webshells | Execution, Persistence | DeviceFileEvents |
| Possible Webshell usage attempt related to SpringShell(CVE-2022-22965) | Execution | AzureDiagnostics |
| Possible webshell drop | Initial access, Execution, Persistence | DeviceFileEvents |
| UMWorkerProcess Creating Webshell | Execution, Persistence, Exploit | DeviceFileEvents |
| Web Shell Activity | Persistence, InitialAccess | W3CIISLog |
| Webshell Detection | Persistence, PrivilegeEscalation | W3CIISLog |
| Version | Date Modified (DD-MM-YYYY) | Change History |
|---|---|---|
| 3.0.4 | 10-06-2024 | Added missing AMA Data Connector reference in Analytic rules |
| 3.0.3 | 12-04-2024 | Updated Entity Mapping and Query of Analytic Rule Supernovawebshell.yaml and MaliciousAlertLinkedWebRequests.yaml |
| 3.0.2 | 22-02-2024 | Tagged for dependent Solutions for deployment |
| 3.0.1 | 25-10-2023 | Changes for rebranding from Microsoft 365 Defender to Microsoft Defender XDR |
| 3.0.0 | 12-07-2023 | Updated Hunting Queries descriptions to meet the 255 character limit. |
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊