Windows WMI backdoor exchange transport agent
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.Goal
Detects suspicious child process execution from Exchange Transport Service that may indicate WMI backdoor persistence mechanisms.
Strategy
This rule monitors Windows process creation events where @evt.id
is 4688
when the parent process @Event.EventData.Data.ParentProcessName
is EdgeTransport.exe
and excludes some legitimate child processes. The Exchange Transport Service typically has a limited set of legitimate child processes for normal mail flow operations. Attackers who compromise Exchange servers often establish persistence through WMI event subscriptions or transport agent modifications that cause the transport service to spawn additional processes for backdoor access or malicious code execution.
Triage and response
- Examine the specific child process spawned by
EdgeTransport.exe
on {{host}}
to determine if it represents legitimate Exchange functionality or malicious activity. - Review Exchange transport agent configurations and WMI event subscriptions to identify any unauthorized modifications or suspicious entries.
- Check Exchange server logs around the time of process creation for any transport agent loading events or configuration changes.
- Analyze the command-line arguments and process behavior of the spawned child process to understand its intended functionality.
- Verify if recent Exchange server maintenance, updates, or administrative changes could account for the unusual process execution pattern.