Files
blue-team-tools/rules/windows/registry_event/sysmon_reg_office_security.yml
T

27 lines
780 B
YAML

title: Office Security Settings Changed
id: a166f74e-bf44-409d-b9ba-ea4b2dd8b3cd
status: experimental
description: Detects registry changes to Office macro settings
author: Trent Liffick (@tliffick)
date: 2020/05/22
modified: 2021/07/12
references:
- Internal Research
- https://www.mcafee.com/blogs/other-blogs/mcafee-labs/zloader-with-a-new-infection-technique/
tags:
- attack.defense_evasion
- attack.t1112
logsource:
category: registry_event
product: windows
detection:
sec_settings:
TargetObject|endswith:
- '\Security\Trusted Documents\TrustRecords'
- '\Security\AccessVBOM'
- '\Security\VBAWarnings'
condition: sec_settings
falsepositives:
- Valid Macros and/or internal documents
level: high