CVE-2023-21554原始查询利用略有不同的字段
2023-4-15 14:9:16 Author: Ots安全(查看原文) 阅读量:61 收藏

点击蓝字,关注我们

识别具有服务和侦听端口的主机:

MDE

DeviceNetworkEvents| where Timestamp > ago(30d)| where ActionType == "ListeningConnectionCreated"| where LocalPort == "1801"| where InitiatingProcessVersionInfoOriginalFileName has "MQSVC"| summarize by DeviceName

Sentinel

DeviceNetworkEvents| where TimeGenerated > ago(30d)| where ActionType == "ListeningConnectionCreated"| where LocalPort == "1801"| where InitiatingProcessVersionInfoOriginalFileName has "MQSVC"| summarize by DeviceName

Look for possible exploitation of CVE-2023-21554

//possible exploitation of CVE-2023-21554//if successful look for a a follow-up outbound connection to the same external IP or to a possible secondary C2 connection. This would likely result in a child process being spawned from mqsvc.exe that should also be investigated. On the external facing infra this will likely materialise in a webshell or similar.DeviceNetworkEvents| where InitiatingProcessFileName =~ "mqsvc.exe" and LocalPort == 1801 and ActionType == 'InboundConnectionAccepted'

Look for child processes spawned by mqsvc.exe

DeviceProcessEvents| where ( InitiatingProcessFileName has "mqsvc.exe" and isnotempty(FileName) ) or (InitiatingProcessParentFileName has "mqsvc.exe" and isnotempty(InitiatingProcessFileName) )

可以使用Chat GPT进行解析以上内容更快速了解相关利用!

点击此处“阅读全文”查看更多内容

文章来源: http://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247497261&idx=3&sn=3b1b34cb98e4631688c10176a1333ffa&chksm=9badbf66acda367070e395aaadd31af4b86e89d3e1154fef9fdf9ebfdc9ce5453d5af5045646#rd
如有侵权请联系:admin#unsafe.sh