Detectionhightest

Suspicious Windows Strings In URI

Detects suspicious Windows strings in URI which could indicate possible exfiltration or webshell communication

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Nasreddine Bencherchali (Nextron Systems)Created Mon Jun 06Updated Mon Jan 029f6a34b4-2688-4eb7-a7f5-e39fef573d0eweb
Log Source
Web Server Log
CategoryWeb Server Log← raw: webserver

HTTP access logs from web servers capturing request paths, methods, and status codes.

Detection Logic
Detection Logic1 selector
detection:
    selection:
        cs-uri-query|contains:
            - '=C:/Users'
            - '=C:/Program%20Files'
            - '=C:/Windows'
            - '=C%3A%5CUsers'
            - '=C%3A%5CProgram%20Files'
            - '=C%3A%5CWindows'
    condition: selection
False Positives

Legitimate application and websites that use windows paths in their URL

Rule Metadata
Rule ID
9f6a34b4-2688-4eb7-a7f5-e39fef573d0e
Status
test
Level
high
Type
Detection
Created
Mon Jun 06
Modified
Mon Jan 02
Path
rules/web/webserver_generic/web_susp_windows_path_uri.yml
Raw Tags
attack.persistenceattack.exfiltrationattack.t1505.003
View on GitHub