Process execution with a suspicious command line indicative of the Spring4Shell exploit

Cortex XDR Analytics Alert Reference by Alert name

Product
Cortex XDR
Last date published
2024-10-08
Category
Analytics Alert Reference
Order
Alert name

Synopsis

Activation Period

14 Days

Training Period

30 Days

Test Period

N/A (single event)

Deduplication Period

1 Day

Required Data

  • Requires:
    • XDR Agent

Detection Modules

Detector Tags

ATT&CK Tactic

Initial Access (TA0001)

ATT&CK Technique

Exploit Public-Facing Application (T1190)

Severity

High

Description

A process was run with a suspicious command line, potentially exploiting the Spring4Shell vulnerability.

Attacker's Goals

Gain the ability to execute code remotely or drop malware.

Investigative actions

Check that the executed process command line is not compromised.