Skip to content

Commit 41974bf

Browse files
committed
[New] Rare Connection to WebDAV Target
#2649
1 parent 97e6d8b commit 41974bf

File tree

1 file changed

+79
-0
lines changed

1 file changed

+79
-0
lines changed
Lines changed: 79 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,79 @@
1+
[metadata]
2+
creation_date = "2025/04/28"
3+
integration = ["endpoint", "system", "windows", "m365_defender", "crowdstrike"]
4+
maturity = "production"
5+
updated_date = "2025/04/28"
6+
7+
[rule]
8+
author = ["Elastic"]
9+
description = """
10+
Identifies rare connection attempts to a Web Distributed Authoring and Versioning (WebDAV) resource. Attackers may inject
11+
WebDAV paths in files or features opened by a victim user to leak their NTLM credentials via forced authentication.
12+
"""
13+
from = "now-9m"
14+
language = "esql"
15+
license = "Elastic License v2"
16+
name = "Rare Connection to WebDAV Target"
17+
note = """## Triage and analysis
18+
19+
### Investigating Rare Connection to WebDAV Target
20+
21+
### Possible investigation steps
22+
23+
- Examine the reputation of the destination domain or IP address.
24+
- Verify if the target user opened any attachments or clicked pointing to the same target within seconds from the alert timestamp.
25+
- Correlate the findings with other security logs and alerts to identify any patterns or additional indicators of compromise related to the potential relay attack.
26+
27+
### False positive analysis
28+
29+
- User accessing legit WebDAV resources.
30+
31+
### Response and remediation
32+
33+
- Conduct a password reset for the target account that may have been compromised or are at risk, ensuring the use of strong, unique passwords.
34+
- Verify whether other users were targeted but did not open the lure..
35+
- Escalate the incident to the security operations center (SOC) or incident response team for further investigation and to determine the full scope of the breach.
36+
- Conduct a post-incident review to identify any gaps in security controls and update policies or procedures to prevent recurrence, ensuring lessons learned are applied to improve overall security posture."""
37+
references = ["https://attack.mitre.org/techniques/T1187/"]
38+
risk_score = 47
39+
rule_id = "6756ee27-9152-479b-9b73-54b5bbda301c"
40+
severity = "medium"
41+
tags = [
42+
"Domain: Endpoint",
43+
"OS: Windows",
44+
"Use Case: Threat Detection",
45+
"Tactic: Credential Access",
46+
"Data Source: Elastic Defend",
47+
"Data Source: Windows Security Event Logs",
48+
"Data Source: Microsoft Defender for Endpoint",
49+
"Data Source: Crowdstrike",
50+
"Resources: Investigation Guide",
51+
]
52+
timestamp_override = "event.ingested"
53+
type = "esql"
54+
55+
query = '''
56+
FROM logs-*
57+
| WHERE event.category == "process" and event.type == "start" and process.name == "rundll32.exe" and process.command_line like "*DavSetCookie*"
58+
| keep host.id, process.command_line, user.name
59+
| grok process.command_line """(?<target>DavSetCookie .* http)"""
60+
| eval webdav_target = REPLACE(target, "(DavSetCookie | http)", "")
61+
| where webdav_target is not null and webdav_target rlike """(([a-zA-Z0-9-]+\.)+[a-zA-Z]{2,3}(@SSL.*)*|(\d{1,3}\.){3}\d{1,3})""" and not webdav_target in ("www.google.com@SSL", "www.elastic.co@SSL") and not webdav_target rlike """(10\.(\d{1,3}\.){2}\d{1,3}|172\.(1[6-9]|2\d|3[0-1])\.(\d{1,3}\.)\d{1,3}|192\.168\.(\d{1,3}\.)\d{1,3})"""
62+
| stats total = count(*), unique_count_host = count_distinct(host.id), hosts = VALUES(host.id), users = VALUES(user.name) by webdav_target
63+
| where unique_count_host == 1 and total <= 3
64+
'''
65+
66+
67+
[[rule.threat]]
68+
framework = "MITRE ATT&CK"
69+
[[rule.threat.technique]]
70+
id = "T1187"
71+
name = "Forced Authentication"
72+
reference = "https://attack.mitre.org/techniques/T1187/"
73+
74+
75+
[rule.threat.tactic]
76+
id = "TA0006"
77+
name = "Credential Access"
78+
reference = "https://attack.mitre.org/tactics/TA0006/"
79+

0 commit comments

Comments
 (0)