heroui logo

Suspicious Download from Office Domain

Sigma Rules

View Source
Summary
This detection rule identifies suspicious download activities originating from specific Microsoft domains commonly used for email attachments and OneNote documents. It specifically monitors for the execution of processes associated with downloading tools, such as curl or wget, and examines command-line arguments to capture any usage of commands that retrieve files from these domains. Furthermore, the rule includes checking for network interactions directed towards suspicious URLs endemic to the legitimate use of Microsoft's services to help distinguish between regular operations and potential malicious activity. By analyzing the process creation logs on Windows systems, the rule employs a multi-faceted approach to filter out expected behaviors from malicious actions, making it a robust measure against unwanted file downloads.
Categories
  • Windows
  • Cloud
  • Network
Data Sources
  • Process
  • Network Traffic
Created: 2021-12-27