EXPLORE
← Back to Explore
sigmahighHunting

Suspicious External WebDAV Execution

Detects executables launched from external WebDAV shares using the WebDAV Explorer integration, commonly seen in initial access campaigns.

MITRE ATT&CK

initial-accessresource-development

Detection Query

selection_webdav:
  c-useragent|startswith: Microsoft-WebDAV-MiniRedir/
  cs-method: GET
selection_execution:
  c-uri|endswith:
    - .7z
    - .bat
    - .dat
    - .cmd
    - .exe
    - .js
    - .lnk
    - .ps1
    - .rar
    - .url
    - .vbe
    - .vbs
    - .zip
filter_main_local_ips:
  dst_ip|cidr:
    - 127.0.0.0/8
    - 10.0.0.0/8
    - 172.16.0.0/12
    - 192.168.0.0/16
    - 169.254.0.0/16
    - ::1/128
    - fe80::/10
    - fc00::/7
condition: all of selection_* and not 1 of filter_main_*

Author

Ahmed Farouk

Created

2024-05-10

Data Sources

proxy

Tags

attack.initial-accessattack.resource-developmentattack.t1584attack.t1566
Raw Content
title: Suspicious External WebDAV Execution
id: 1ae64f96-72b6-48b3-ad3d-e71dff6c6398
related:
    - id: 4c55738d-72d8-490e-a2db-7969654e375f
      type: similar
status: test
description: |
    Detects executables launched from external WebDAV shares using the WebDAV Explorer integration, commonly seen in initial access campaigns.
references:
    - https://dear-territory-023.notion.site/WebDav-Share-Testing-e4950fa0c00149c3aa430d779b9b1d0f?pvs=4
    - https://micahbabinski.medium.com/search-ms-webdav-and-chill-99c5b23ac462
    - https://www.trendmicro.com/en_no/research/24/b/cve202421412-water-hydra-targets-traders-with-windows-defender-s.html
    - https://www.trellix.com/en-us/about/newsroom/stories/research/beyond-file-search-a-novel-method.html
author: Ahmed Farouk
date: 2024-05-10
tags:
    - attack.initial-access
    - attack.resource-development
    - attack.t1584
    - attack.t1566
logsource:
    category: proxy
detection:
    selection_webdav:
        c-useragent|startswith: 'Microsoft-WebDAV-MiniRedir/'
        cs-method: 'GET'
    selection_execution:
        c-uri|endswith:
            - '.7z'
            - '.bat'
            - '.dat'
            - '.cmd'
            - '.exe'
            - '.js'
            - '.lnk'
            - '.ps1'
            - '.rar'
            - '.url'
            - '.vbe'
            - '.vbs'
            - '.zip'
    filter_main_local_ips:
        dst_ip|cidr:
            - '127.0.0.0/8'
            - '10.0.0.0/8'
            - '172.16.0.0/12'
            - '192.168.0.0/16'
            - '169.254.0.0/16'
            - '::1/128'  # IPv6 loopback
            - 'fe80::/10'  # IPv6 link-local addresses
            - 'fc00::/7'  # IPv6 private addresses
    condition: all of selection_* and not 1 of filter_main_*
falsepositives:
    - Unknown
level: high