Skip to content

Commit fadd559

Browse files
committed
feat(rules): Suspicious Microsoft Office add-in loaded
Identifies attempts to load unsigned executables from Microsoft Office add-ins directories, which adversaries may exploit to maintain persistence.
1 parent 070e642 commit fadd559

1 file changed

Lines changed: 32 additions & 0 deletions

File tree

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
name: Suspicious Microsoft Office add-in loaded
2+
id: fe4daff8-d8aa-48d3-bf09-a9d868375a3c
3+
version: 1.0.0
4+
description: |
5+
Identifies attempts to load unsigned executables from known Microsoft Office
6+
add-ins directories, which adversaries may exploit to maintain persistence.
7+
labels:
8+
tactic.id: TA0003
9+
tactic.name: Persistence
10+
tactic.ref: https://attack.mitre.org/tactics/TA0003/
11+
technique.id: T1137
12+
technique.name: Office Application Startup
13+
technique.ref: https://attack.mitre.org/techniques/T1137/
14+
references:
15+
- https://github.com/3gstudent/Office-Persistence/blob/master/OfficePersistence.ps1
16+
17+
condition: >
18+
(load_unsigned_or_untrusted_module) and ps.name iin ('excel.exe', 'winword.exe', 'outlook.exe', 'powerpnt.exe')
19+
and
20+
image.path imatches
21+
(
22+
'?:\\Users\\*\\AppData\\Roaming\\Microsoft\\AddIns\\*',
23+
'?:\\Users\\*\\AppData\\Roaming\\Microsoft\\Excel\\XLSTART\\*',
24+
'?:\\Users\\*\\AppData\\Roaming\\Microsoft\\Word\\Startup\\*',
25+
'?:\\Users\\*\\AppData\\Roaming\\Microsoft\\Outlook\\*'
26+
)
27+
28+
output:
29+
Microsoft Office process %ps.name loaded a suspicious add-in %image.path
30+
severity: high
31+
32+
min-engine-version: 2.4.0

0 commit comments

Comments
 (0)