Skip to content

Commit 0518b62

Browse files
D-BoltonID Generatorkeaton-sublime
authored
Create attachment_docx_hyperlink_targeting_recipient.yml (#3472)
Co-authored-by: ID Generator <hello@sublimesecurity.com> Co-authored-by: keaton-sublime <kyle.eaton@sublimesecurity.com>
1 parent ea0e6fa commit 0518b62

File tree

1 file changed

+33
-0
lines changed

1 file changed

+33
-0
lines changed
Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
name: "Attachment: DOCX with hyperlink targeting recipient address"
2+
description: "Detects DOCX attachments containing hyperlinks with anchor references that match recipient email addresses. This technique is commonly used to personalize malicious documents and evade detection."
3+
type: "rule"
4+
severity: "medium"
5+
source: |
6+
type.inbound
7+
and any(filter(attachments, .file_extension in ('docx', 'docm')),
8+
any(filter(file.explode(.),
9+
strings.icontains(.scan.strings.raw, '<w:hyperlink')
10+
),
11+
any(regex.iextract(.scan.strings.raw,
12+
'<w:hyperlink[^\>]*w:anchor="(?P<email_address>[^\"]+)"'
13+
),
14+
.named_groups["email_address"] == recipients.to[0].email.email
15+
or any(strings.scan_base64(.named_groups["email_address"],
16+
ignore_padding=true
17+
),
18+
strings.icontains(., recipients.to[0].email.email)
19+
)
20+
)
21+
)
22+
)
23+
attack_types:
24+
- "Credential Phishing"
25+
- "Malware/Ransomware"
26+
tactics_and_techniques:
27+
- "Evasion"
28+
- "Social engineering"
29+
detection_methods:
30+
- "File analysis"
31+
- "Archive analysis"
32+
- "XML analysis"
33+
id: "9ec8fa49-bda9-5e8f-876f-1e53a46d83ca"

0 commit comments

Comments
 (0)