Windows WMI backdoor exchange transport agent

This rule is part of a beta feature. To learn more, contact Support.
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detects suspicious child process execution from Exchange Transport Service that may indicate WMI backdoor persistence mechanisms.

Strategy

This rule monitors Windows process creation events where @evt.id is 4688 when the parent process @Event.EventData.Data.ParentProcessName is EdgeTransport.exe and excludes some legitimate child processes. The Exchange Transport Service typically has a limited set of legitimate child processes for normal mail flow operations. Attackers who compromise Exchange servers often establish persistence through WMI event subscriptions or transport agent modifications that cause the transport service to spawn additional processes for backdoor access or malicious code execution.

Triage and response

  • Examine the specific child process spawned by EdgeTransport.exe on {{host}} to determine if it represents legitimate Exchange functionality or malicious activity.
  • Review Exchange transport agent configurations and WMI event subscriptions to identify any unauthorized modifications or suspicious entries.
  • Check Exchange server logs around the time of process creation for any transport agent loading events or configuration changes.
  • Analyze the command-line arguments and process behavior of the spawned child process to understand its intended functionality.
  • Verify if recent Exchange server maintenance, updates, or administrative changes could account for the unusual process execution pattern.