heroui logo

Suspicious Email Attachment Extensions

Splunk Security Content

View Source
Summary
The 'Suspicious Email Attachment Extensions' rule is designed to detect potentially malicious email attachments by identifying emails containing attachments with suspicious file extensions. Utilizing the Email data model in Splunk and specifically the tstats command, the rule analyzes the presence of attachment file names in emails. By filtering for non-empty attachment filenames, SOC analysts can pinpoint emails that may indicate phishing attempts or malware delivery methods, which are critical paths for data breaches and malware infections. The analysis of flagged emails is important to promptly address risks such as unauthorized access to sensitive data, system compromises, and potential data exfiltration. Confirming and mitigating the malicious nature of such activity is priority, as it can lead to serious security incidents. Integration with Splunk Phantom can streamline the investigation process by automating response actions when suspicious attachments are detected.
Categories
  • Endpoint
  • Network
Data Sources
  • User Account
  • Application Log
ATT&CK Techniques
  • T1566.001
  • T1566
Created: 2025-01-21