DET0068 Detection Strategy for T1505.004 - Malicious IIS Components
| Item |
Value |
| ID |
DET0068 |
| Version |
1.0 |
| Created |
21 October 2025 |
| Last Modified |
21 October 2025 |
Technique Detected: T1505.004 (IIS Components)
Analytics
Windows
AN0184
Adversary installs or modifies IIS components (ISAPI filters, extensions, or modules) using DLL files registered via configuration changes or administrative tools like AppCmd.exe. These components intercept or manipulate HTTP requests/responses for persistence or C2.
Log Sources
Mutable Elements
| Field |
Description |
| TimeWindow |
Adjustable time frame for detecting chained events (e.g., config change + module load) |
| UserContext |
Scope detection to specific users or roles allowed to modify IIS components |
| WatchedPaths |
Specific directories such as %windir%\System32\inetsrv\ for DLL monitoring |
| DLLNameEntropyThreshold |
Entropy or name patterns to flag suspicious DLLs registered as components |
| ParentProcessName |
Restrict to DLLs loaded by w3wp.exe or invoked via AppCmd.exe |