40 lines
1.2 KiB
YAML
40 lines
1.2 KiB
YAML
title: Microsoft Office Persistence
|
|
status: experimental
|
|
description: Detect some kinds of persistence techniques using Office Startup
|
|
author: Lep
|
|
references:
|
|
- https://attack.mitre.org/techniques/T1137/
|
|
- https://labs.mwrinfosecurity.com/blog/add-in-opportunities-for-office-persistence/
|
|
date: 2019/08/20
|
|
tags:
|
|
- attack.persistence
|
|
- attack.t1137
|
|
- attack.g0050
|
|
logsource:
|
|
service: sysmon
|
|
product: windows
|
|
detection:
|
|
template_macro:
|
|
EventID: 11
|
|
TargetFilename:
|
|
- '*\AppData\Roaming\Microsoft\Templates\Normal.dotm'
|
|
- '*\AppData\Roaming\Microsoft\Excel*'
|
|
office_test:
|
|
EventID: 13
|
|
TargetObject: 'HKCU\Software\Microsoft\Office test\Special\Perf*'
|
|
enable_macros:
|
|
EventID: 13
|
|
TargetObject:
|
|
- 'HKCU\Software\Microsoft\Office\*\Outlook*'
|
|
- 'HKCU\Software\Microsoft\Office\*\Excel\Options*'
|
|
addins:
|
|
EventID: 13
|
|
TargetObject:
|
|
- 'HKCU\Software\Microsoft\VBA\VBE\6.0\Addins\*'
|
|
- 'HKCU\Software\Microsoft\Office\*\PowerPoint\AddIns'
|
|
- 'HKCU\Software\Microsoft\Office\*\Addins\<AddInName>'
|
|
condition: template_macro or office_test or addins or enable_macros
|
|
falsepositives:
|
|
- Office usage
|
|
level: low
|