1
1
name : Windows MOVEit Transfer Writing ASPX
2
2
id : c0ed2aca-5666-45b3-813f-ddfac3f3eda0
3
3
version : 7
4
- date : ' 2025-06-10 '
4
+ date : ' 2025-06-16 '
5
5
author : Michael Haag, Splunk
6
6
status : production
7
7
type : TTP
8
8
data_source :
9
- - Sysmon EventID 1 AND Sysmon EventID 11
9
+ - Sysmon EventID 11
10
10
description : The following analytic detects the creation of new ASPX files in the
11
11
MOVEit Transfer application's "wwwroot" directory. It leverages endpoint data on
12
12
process and filesystem activity to identify processes responsible for creating these
@@ -15,26 +15,26 @@ description: The following analytic detects the creation of new ASPX files in th
15
15
ASPX files. If confirmed malicious, this could lead to exfiltration of sensitive
16
16
data, including user credentials and file metadata, posing a severe risk to the
17
17
organization's security.
18
- search : ' | tstats `security_content_summariesonly` count FROM datamodel=Endpoint.Processes
19
- where Processes.process_name=System by _time span=1h by Processes.action Processes.dest Processes.original_file_name
20
- Processes.parent_process Processes.parent_process_exec Processes.parent_process_guid
21
- Processes.parent_process_id Processes.parent_process_name Processes.parent_process_path
22
- Processes.process Processes.process_exec Processes.process_guid Processes.process_hash
23
- Processes.process_id Processes.process_integrity_level Processes.process_name Processes.process_path
24
- Processes.user Processes.user_id Processes.vendor_product | `drop_dm_object_name(Processes)` | join process_guid, _time [|
25
- tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
26
- as lastTime FROM datamodel=Endpoint.Filesystem where Filesystem.file_path IN ("*\\MOVEitTransfer\\wwwroot\\*")
27
- Filesystem.file_name IN("*.aspx", "*.ashx", "*.asp*") OR Filesystem.file_name IN
28
- ("human2.aspx","_human2.aspx") by _time span=1h Filesystem.dest Filesystem.file_create_time
29
- Filesystem.file_name Filesystem.file_path | `drop_dm_object_name(Filesystem)` |
30
- fields _time dest file_create_time file_name file_path process_name process_path
31
- process] | dedup file_create_time | table dest file_create_time, file_name, file_path,
32
- process_name | `windows_moveit_transfer_writing_aspx_filter`'
33
- how_to_implement : To successfully implement this search you need to be ingesting information
18
+ search : |
19
+ | tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
20
+ as lastTime FROM datamodel=Endpoint.Filesystem where
21
+ Filesystem.file_path IN ("*\\MOVEitTransfer\\wwwroot\\*") AND
22
+ Filesystem.file_name IN("*.ashx", "*.asp*")
23
+ by Filesystem.action Filesystem.dest Filesystem.file_access_time Filesystem.file_create_time
24
+ Filesystem.file_hash Filesystem.file_modify_time Filesystem.file_name Filesystem.file_path
25
+ Filesystem.file_acl Filesystem.file_size Filesystem.process_guid Filesystem.process_id
26
+ Filesystem.user Filesystem.vendor_product
27
+ | `drop_dm_object_name(Filesystem)`
28
+ | `security_content_ctime(firstTime)`
29
+ | `security_content_ctime(lastTime)`
30
+ | `windows_moveit_transfer_writing_aspx_filter`
31
+ how_to_implement : |
32
+ To successfully implement this search you need to be ingesting information
34
33
on process that include the name of the process responsible for the changes from
35
34
your endpoints into the `Endpoint` datamodel in the `Processes` node and `Filesystem`
36
35
node.
37
- known_false_positives : The query is structured in a way that `action` (read, create)
36
+ known_false_positives : |
37
+ The query is structured in a way that `action` (read, create)
38
38
is not defined. Review the results of this query, filter, and tune as necessary.
39
39
It may be necessary to generate this query specific to your endpoint product.
40
40
references :
@@ -58,12 +58,14 @@ drilldown_searches:
58
58
earliest_offset : $info_min_time$
59
59
latest_offset : $info_max_time$
60
60
rba :
61
- message : The MOVEit application on $dest$ has written a new ASPX file to disk.
61
+ message : The MOVEit application on $dest$ has written a new ASPX file $file_name$ to disk.
62
62
risk_objects :
63
63
- field : dest
64
64
type : system
65
65
score : 100
66
- threat_objects : []
66
+ threat_objects :
67
+ - field : file_name
68
+ type : file_name
67
69
tags :
68
70
analytic_story :
69
71
- MOVEit Transfer Critical Vulnerability
0 commit comments