Skip to content

<<< Hide Navigation Hide TOC >>>

Suspicious MSExchangeMailboxReplication ASPX Write (7280c9f3-a5af-45d0-916a-bc01cb4151c9)

Detects suspicious activity in which the MSExchangeMailboxReplication process writes .asp and .apsx files to disk, which could be a sign of ProxyShell exploitation

Galaxy ColorsAttack Pat...Sigma-Rule...
Rows: 3
Loading extensions...
Collapse filters
Use the filters above each column to filter and limit table data. Advanced searches can be performed by using the following operators:
<, <=, >, >=, =, *, !, {, }, ||,&&, [empty], [nonempty], rgx:
Learn more

TableFilter v0.7.2

https://www.tablefilter.com/
©2015-2025 Max Guglielmi
?
Cluster A Galaxy A Cluster B Galaxy B Level
Exploit Public-Facing Application - T1190 (3f886f2a-874f-4333-b794-aa6075009b1c) Attack Pattern Suspicious MSExchangeMailboxReplication ASPX Write (7280c9f3-a5af-45d0-916a-bc01cb4151c9) Sigma-Rules 1
Suspicious MSExchangeMailboxReplication ASPX Write (7280c9f3-a5af-45d0-916a-bc01cb4151c9) Sigma-Rules Web Shell - T1505.003 (5d0d3609-d06d-49e1-b9c9-b544e0c618cb) Attack Pattern 1
Server Software Component - T1505 (d456de47-a16f-4e46-8980-e67478a12dcb) Attack Pattern Web Shell - T1505.003 (5d0d3609-d06d-49e1-b9c9-b544e0c618cb) Attack Pattern 2