Detectionhightest
Suspicious Windows Strings In URI
Detects suspicious Windows strings in URI which could indicate possible exfiltration or webshell communication
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Nasreddine Bencherchali (Nextron Systems)Created Mon Jun 06Updated Mon Jan 029f6a34b4-2688-4eb7-a7f5-e39fef573d0eweb
Log Source
Web Server Log
CategoryWeb Server Log← raw: webserver
HTTP access logs from web servers capturing request paths, methods, and status codes.
Detection Logic
Detection Logic1 selector
detection:
selection:
cs-uri-query|contains:
- '=C:/Users'
- '=C:/Program%20Files'
- '=C:/Windows'
- '=C%3A%5CUsers'
- '=C%3A%5CProgram%20Files'
- '=C%3A%5CWindows'
condition: selectionFalse Positives
Legitimate application and websites that use windows paths in their URL
References
MITRE ATT&CK
Sub-techniques
Rule Metadata
Rule ID
9f6a34b4-2688-4eb7-a7f5-e39fef573d0e
Status
test
Level
high
Type
Detection
Created
Mon Jun 06
Modified
Mon Jan 02
Path
rules/web/webserver_generic/web_susp_windows_path_uri.yml
Raw Tags
attack.persistenceattack.exfiltrationattack.t1505.003