<<< Hide Navigation Hide TOC >>>
Suspicious MSExchangeMailboxReplication ASPX Write (7280c9f3-a5af-45d0-916a-bc01cb4151c9)
Detects suspicious activity in which the MSExchangeMailboxReplication process writes .asp and .apsx files to disk, which could be a sign of ProxyShell exploitation
Cluster A![]() |
Galaxy A![]() |
Cluster B![]() |
Galaxy B![]() |
Level![]() |
---|---|---|---|---|
Exploit Public-Facing Application - T1190 (3f886f2a-874f-4333-b794-aa6075009b1c) | Attack Pattern | Suspicious MSExchangeMailboxReplication ASPX Write (7280c9f3-a5af-45d0-916a-bc01cb4151c9) | Sigma-Rules | 1 |
Suspicious MSExchangeMailboxReplication ASPX Write (7280c9f3-a5af-45d0-916a-bc01cb4151c9) | Sigma-Rules | Web Shell - T1505.003 (5d0d3609-d06d-49e1-b9c9-b544e0c618cb) | Attack Pattern | 1 |
Server Software Component - T1505 (d456de47-a16f-4e46-8980-e67478a12dcb) | Attack Pattern | Web Shell - T1505.003 (5d0d3609-d06d-49e1-b9c9-b544e0c618cb) | Attack Pattern | 2 |