Emerging Threathightest

Potential Atlassian Confluence CVE-2021-26084 Exploitation Attempt

Detects spawning of suspicious child processes by Atlassian Confluence server which may indicate successful exploitation of CVE-2021-26084

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Bhabesh RajCreated Wed Sep 08Updated Mon Feb 13245f92e3-c4da-45f1-9070-bc552e06db112021
Emerging Threat
Active Threat

Developed to detect an active or emerging threat. Prioritize investigation of any alerts and correlate with threat intelligence.

Log Source
WindowsProcess Creation
ProductWindows← raw: windows
CategoryProcess Creation← raw: process_creation

Events generated when a new process is spawned on the system. Covers command-line arguments, parent/child relationships, and process metadata.

Detection Logic
Detection Logic1 selector
detection:
    selection:
        # Monitor suspicious child processes spawned by Confluence
        ParentImage|endswith: '\Atlassian\Confluence\jre\bin\java.exe'
        CommandLine|contains:
            - 'certutil'
            - 'cmd /c'
            - 'cmd /k'
            - 'cscript'
            - 'curl'
            - 'ipconfig'
            - 'powershell'
            - 'pwsh'
            - 'regsvr32'
            - 'rundll32'
            - 'whoami'
            - 'wscript'
    condition: selection
False Positives
Unknown

False positive likelihood has not been assessed. Additional context may be needed during triage.

Rule Metadata
Rule ID
245f92e3-c4da-45f1-9070-bc552e06db11
Status
test
Level
high
Type
Emerging Threat
Created
Wed Sep 08
Modified
Mon Feb 13
Path
rules-emerging-threats/2021/Exploits/CVE-2021-26084/proc_creation_win_exploit_cve_2021_26084_atlassian_confluence.yml
Raw Tags
attack.initial-accessattack.executionattack.t1190attack.t1059cve.2021-26084detection.emerging-threats
View on GitHub