heroui logo

Attachment: Macro with Suspected Use of COM ShellBrowserWindow Object for Process Creation

Sublime Rules

View Source
Summary
This rule detects the usage of malicious macros that utilize the ShellBrowserWindow COM object for process creation which is specifically designed to bypass security mechanisms. Threat actors may exploit this method to execute malicious code without being tracked easily by traditional security tools, as creating new processes under `Explorer.exe` allows them to evade detection that typically scrutinizes forged or unsolicited child process creations from Office applications. The rule requires specific conditions regarding the attached file type, notably focusing on known macro file extensions or files deemed as 'unknown' with a specific content type and size limit. It performs string pattern matching to identify the presence of the COM object reference pattern related to process spawning, thereby indicating a potentially harmful behavior. Accurate identification can help in preventing the inception of malware or ransomware through exploited macros.
Categories
  • Endpoint
  • Windows
  • macOS
Data Sources
  • File
  • Process
  • Application Log
Created: 2022-03-30