Skip to content

Commit 7df0828

Browse files
committed
feat(rules): Microsoft Office file execution via script interpreter
Identifies the execution via Windows script interpreter of the executable file written by the Microsoft Office process.
1 parent fb4f977 commit 7df0828

File tree

1 file changed

+35
-0
lines changed

1 file changed

+35
-0
lines changed
Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
name: Microsoft Office file execution via script interpreter
2+
id: bf3ea547-1470-4bcc-9945-3b495d962c2c
3+
version: 1.0.0
4+
description: |
5+
Identifies the execution via Windows script interpreter of the executable file written
6+
by the Microsoft Office process.
7+
labels:
8+
tactic.id: TA0001
9+
tactic.name: Initial Access
10+
tactic.ref: https://attack.mitre.org/tactics/TA0001/
11+
technique.id: T1566
12+
technique.name: Phishing
13+
technique.ref: https://attack.mitre.org/techniques/T1566/
14+
subtechnique.id: T1566.001
15+
subtechnique.name: Spearphishing Attachment
16+
subtechnique.ref: https://attack.mitre.org/techniques/T1566/001/
17+
18+
condition: >
19+
sequence
20+
maxspan 2m
21+
|create_file and ps.name iin msoffice_binaries and (file.extension iin ('.exe', '.com', '.scr', '.pif', '.bat') or file.is_exec = true)| by file.path
22+
|spawn_process and ps.name iin script_interpreters and ps.child.exe not imatches
23+
(
24+
'?:\\Program Files\\*.exe',
25+
'?:\\Program Files (x86)\\*.exe'
26+
)
27+
| by ps.child.exe
28+
action:
29+
- name: kill
30+
31+
output: >
32+
Microsoft Office process %1.ps.exe wrote the file %1.file.path and subsequently executed it via script interpreter %2.ps.exe
33+
severity: high
34+
35+
min-engine-version: 2.4.0

0 commit comments

Comments
 (0)