Skip to content

Commit e342920

Browse files
committed
Update windows_rundll32_webdav_with_network_connection.yml
1 parent 4801780 commit e342920

File tree

1 file changed

+41
-24
lines changed

1 file changed

+41
-24
lines changed

detections/endpoint/windows_rundll32_webdav_with_network_connection.yml

Lines changed: 41 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -14,28 +14,45 @@ description: The following analytic detects the execution of rundll32.exe with c
1414
indicate exploitation of CVE-2023-23397, a known vulnerability. If confirmed malicious,
1515
this could allow an attacker to establish unauthorized remote connections, potentially
1616
leading to data exfiltration or further network compromise.
17-
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
18-
as lastTime FROM datamodel=Endpoint.Processes where Processes.parent_process_name=svchost.exe
19-
`process_rundll32` Processes.process IN ("*\\windows\\system32\\davclnt.dll,*davsetcookie*",
20-
"*\\windows\\syswow64\\davclnt.dll,*davsetcookie*") by host _time span=1h
21-
by Processes.action Processes.dest Processes.original_file_name Processes.parent_process Processes.parent_process_exec
22-
Processes.parent_process_guid Processes.parent_process_id Processes.parent_process_name
23-
Processes.parent_process_path Processes.process Processes.process_exec Processes.process_guid Processes.process_hash
24-
Processes.process_id Processes.process_integrity_level Processes.process_name Processes.process_path
25-
Processes.user Processes.user_id Processes.vendor_product
26-
| `drop_dm_object_name(Processes)` | `security_content_ctime(firstTime)`
27-
| `security_content_ctime(lastTime)` | rename dest as src | join host process_id
28-
[ | tstats `security_content_summariesonly` count latest(All_Traffic.dest) as dest
29-
latest(All_Traffic.dest_ip) as dest_ip latest(All_Traffic.dest_port) as dest_port
30-
FROM datamodel=Network_Traffic.All_Traffic where All_Traffic.dest_port!=0 NOT (All_Traffic.dest_ip
31-
IN (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16))
32-
by host All_Traffic.action All_Traffic.app All_Traffic.bytes All_Traffic.bytes_in All_Traffic.bytes_out
33-
All_Traffic.dest All_Traffic.dest_ip All_Traffic.dest_port All_Traffic.dvc All_Traffic.protocol
34-
All_Traffic.protocol_version All_Traffic.src All_Traffic.src_ip All_Traffic.src_port
35-
All_Traffic.transport All_Traffic.user All_Traffic.vendor_product All_Traffic.direction
36-
All_Traffic.process_id
37-
| `drop_dm_object_name(All_Traffic)`] | `windows_rundll32_webdav_with_network_connection_filter`'
38-
how_to_implement: The detection is based on data that originates from Endpoint Detection
17+
search: |
18+
| tstats `security_content_summariesonly` count
19+
min(_time) as firstTime
20+
max(_time) as lastTime
21+
FROM datamodel=Endpoint.Processes where
22+
Processes.parent_process_name=svchost.exe
23+
`process_rundll32`
24+
Processes.process IN (
25+
"*\\windows\\system32\\davclnt.dll,*davsetcookie*",
26+
"*\\windows\\syswow64\\davclnt.dll,*davsetcookie*")
27+
by host _time span=1h
28+
Processes.action Processes.dest Processes.original_file_name Processes.parent_process
29+
Processes.parent_process_exec Processes.parent_process_guid Processes.parent_process_id
30+
Processes.parent_process_name Processes.parent_process_path Processes.process Processes.process_exec
31+
Processes.process_guid Processes.process_hash Processes.process_id Processes.process_integrity_level
32+
Processes.process_name Processes.process_path Processes.user Processes.user_id Processes.vendor_product
33+
| `drop_dm_object_name(Processes)`
34+
| `security_content_ctime(firstTime)`
35+
| `security_content_ctime(lastTime)`
36+
| rename dest as src
37+
| join host process_id
38+
[
39+
| tstats `security_content_summariesonly` count
40+
latest(All_Traffic.dest) as dest
41+
latest(All_Traffic.dest_ip) as dest_ip
42+
latest(All_Traffic.dest_port) as dest_port
43+
FROM datamodel=Network_Traffic.All_Traffic where
44+
All_Traffic.dest_port!=0
45+
NOT (All_Traffic.dest_ip IN (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16))
46+
by host All_Traffic.action All_Traffic.app All_Traffic.bytes All_Traffic.bytes_in All_Traffic.bytes_out
47+
All_Traffic.dest All_Traffic.dest_ip All_Traffic.dest_port All_Traffic.dvc All_Traffic.protocol
48+
All_Traffic.protocol_version All_Traffic.src All_Traffic.src_ip All_Traffic.src_port
49+
All_Traffic.transport All_Traffic.user All_Traffic.vendor_product All_Traffic.direction
50+
All_Traffic.process_id
51+
| `drop_dm_object_name(All_Traffic)`
52+
]
53+
| `windows_rundll32_webdav_with_network_connection_filter`
54+
how_to_implement: |
55+
The detection is based on data that originates from Endpoint Detection
3956
and Response (EDR) agents. These agents are designed to provide security-related
4057
telemetry from the endpoints where the agent is installed. To implement this search,
4158
you must ingest logs that contain the process GUID, process name, and parent process.
@@ -44,8 +61,8 @@ how_to_implement: The detection is based on data that originates from Endpoint D
4461
the EDR product. The logs must also be mapped to the `Processes` node of the `Endpoint`
4562
data model. Use the Splunk Common Information Model (CIM) to normalize the field
4663
names and speed up the data modeling process.
47-
known_false_positives: False positives will be present based on legitimate software,
48-
filtering may need to occur.
64+
known_false_positives: |
65+
False positives will be present based on legitimate software, filtering may need to occur.
4966
references:
5067
- https://strontic.github.io/xcyclopedia/library/davclnt.dll-0EA3050E7CC710526E330C413C165DA0.html
5168
- https://twitter.com/ACEResponder/status/1636116096506818562?s=20

0 commit comments

Comments
 (0)