Rare Connection to WebDAV Target via Rundll32
This rule identifies rare connection attempts to a Web Distributed Authoring and Versioning (WebDAV) resource, where attackers may inject WebDAV paths in files or features opened by a victim user to leak their NTLM credentials via forced authentication using rundll32.exe.
This detection rule identifies rare connection attempts to a Web Distributed Authoring and Versioning (WebDAV) resource. Attackers can inject WebDAV paths in files or features opened by a victim user to force authentication and leak their NTLM credentials. The rule focuses on the execution of rundll32.exe with command-line arguments indicative of WebDAV exploitation, specifically the use of DavSetCookie. The rule is designed to detect unusual WebDAV server destinations by excluding common legitimate services and private IP ranges. The rule is intended to detect credential access attempts facilitated by forced authentication.
Attack Chain
- The attacker crafts a malicious document or link containing a WebDAV path.
- The victim user opens the malicious document or clicks the link.
- The operating system attempts to access the specified WebDAV resource using
rundll32.exewith theDavSetCookieparameter. - The
rundll32.exeprocess initiates a connection to the attacker-controlled WebDAV server. - The victim’s system sends NTLM credentials to the attacker’s WebDAV server.
- The attacker captures the NTLM credentials.
- The attacker relays the captured NTLM credentials to authenticate to other systems.
Impact
Successful exploitation leads to the leakage of the victim’s NTLM credentials. This allows the attacker to potentially gain unauthorized access to other systems and resources within the network where the victim’s credentials are valid. The impact is credential access and lateral movement.
Recommendation
- Deploy the Sigma rule
Detect Rare WebDAV Destination via Rundll32to your SIEM and tune for your environment. - Enable process creation logging with command line monitoring to detect the execution of
rundll32.exewith WebDAV-related parameters. - Monitor network connections for unusual outbound traffic to WebDAV servers.
- Educate users about the risks of opening suspicious documents or clicking on untrusted links to prevent initial access.
Detection coverage 2
Detect Rare WebDAV Destination via Rundll32
mediumDetects a rare connection attempt to a WebDAV resource using rundll32.exe, which could indicate forced authentication and NTLM credential leakage (T1187, T1218.011).
Detect WebDAV Connection via Process CommandLine
lowDetects a rare connection attempt to a WebDAV resource via command line, which could indicate forced authentication and NTLM credential leakage (T1187, T1218.011).
Detection queries are available on the platform. Get full rules →