Detection of IIS HTTP Logging Disabled via AppCmd.exe
This analytic detects the use of AppCmd.exe to disable HTTP logging on IIS servers, allowing adversaries to evade detection by removing evidence of their actions.
This detection identifies the use of AppCmd.exe to disable HTTP logging on Internet Information Services (IIS) servers. The technique is significant as adversaries can use it to erase traces of their malicious activities. The detection focuses on process execution events logged by Endpoint Detection and Response (EDR) agents. By disabling HTTP logging, attackers can operate undetected, making it difficult to trace their actions and respond effectively to intrusions. The references indicate this technique has been observed in campaigns attributed to threat actors like OilRig, where IIS backdoors are used.
Attack Chain
- Initial access to the system via exploitation of a vulnerability or compromised credentials.
- Attacker gains a foothold on the IIS server.
- The attacker executes
appcmd.exeto modify IIS settings. appcmd.exeis executed with parameters to disable HTTP logging, such ashttploggingordontlog:true.- The command modifies the IIS configuration, preventing HTTP request logs from being recorded.
- The attacker performs malicious actions on the compromised server (e.g., web shell deployment, data theft).
- With HTTP logging disabled, the attacker’s activities are not recorded in standard IIS logs, hindering forensic analysis.
- The attacker maintains persistence and continues to exploit the compromised system.
Impact
Successful execution of this attack can lead to a significant reduction in visibility into attacker activities on IIS servers. The lack of HTTP logs hinders incident response efforts, making it difficult to identify the scope and nature of the compromise. This could lead to prolonged attacker presence, further data exfiltration, or deployment of malicious software. This technique is a common step to evade defenses.
Recommendation
- Deploy the Sigma rule
Detect IIS HTTP Logging Disabled via AppCmd.exeto your SIEM and tune for your environment. - Enable Sysmon process creation logging (Event ID 1) to capture command-line arguments of
appcmd.exe. - Monitor process execution events for
appcmd.exewith command-line arguments related tohttploggingordontlog:true. - Investigate any instances of
appcmd.exebeing executed by non-administrator accounts or unusual parent processes. - Review IIS configuration regularly for any unauthorized changes to HTTP logging settings.
Detection coverage 2
Detect IIS HTTP Logging Disabled via AppCmd.exe
highDetects the execution of appcmd.exe to disable HTTP logging on IIS servers
Detect IIS HTTP Logging Configuration Change via AppCmd.exe
mediumDetects the execution of appcmd.exe to modify HTTP logging configuration on IIS servers
Detection queries are kept inside the platform. Get full rules →