Potential MOVEit Transfer CVE-2023-34362 Exploitation - File Activity

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects file indicators of potential exploitation of MOVEit CVE-2023-34362.

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "File Created or Modified" AND ((FILENAME contains "\MOVEit Transfer\wwwroot\,\MOVEitTransfer\wwwroot" OR OBJECTNAME contains "\MOVEit Transfer\wwwroot\,\MOVEitTransfer\wwwroot") AND (FILENAME endswith ".7z,.bat,.dll,.exe,.ps1,.rar,.vbe,.vbs,.zip" OR OBJECTNAME endswith ".7z,.bat,.dll,.exe,.ps1,.rar,.vbe,.vbs,.zip")) OR (FILENAME endswith "\MOVEit Transfer\wwwroot\_human2.aspx.lnk,\MOVEit Transfer\wwwroot\_human2.aspx,\MOVEit Transfer\wwwroot\human2.aspx.lnk,\MOVEit Transfer\wwwroot\human2.aspx,\MOVEitTransfer\wwwroot\_human2.aspx.lnk,\MOVEitTransfer\wwwroot\_human2.aspx,\MOVEitTransfer\wwwroot\human2.aspx.lnk,\MOVEitTransfer\wwwroot\human2.aspx" OR OBJECTNAME endswith "\MOVEit Transfer\wwwroot\_human2.aspx.lnk,\MOVEit Transfer\wwwroot\_human2.aspx,\MOVEit Transfer\wwwroot\human2.aspx.lnk,\MOVEit Transfer\wwwroot\human2.aspx,\MOVEitTransfer\wwwroot\_human2.aspx.lnk,\MOVEitTransfer\wwwroot\_human2.aspx,\MOVEitTransfer\wwwroot\human2.aspx.lnk,\MOVEitTransfer\wwwroot\human2.aspx") OR (CREATIONUTCTIME startswith "2023-03- ,2023-04- ,2023-05- ,2023-06- " AND ((FILENAME contains "\Windows\Microsoft.net\Framework64\v" AND FILENAME contains "\Temporary ASP.NET Files" AND FILENAME contains "App_Web_") OR (OBJECTNAME contains "\Windows\Microsoft.net\Framework64\v" AND OBJECTNAME contains "\Temporary ASP.NET Files" AND OBJECTNAME contains "App_Web_")) AND (FILENAME endswith ".dll" OR OBJECTNAME endswith ".dll")) select Action1.HOSTNAME,Action1.MESSAGE,Action1.USERNAME,Action1.DOMAIN,Action1.OBJECTNAME,Action1.FILENAME,Action1.PROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Windows

Author

Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)