
Summary
This detection rule identifies instances where a .NET assembly DLL is loaded by various Microsoft Office applications, including Excel, PowerPoint, Word, OneNote, Outlook, and Publisher. The rule leverages the Image Load event logs, monitoring potential executions of DLLs from the Windows assembly directory, which can be indicative of malicious behavior, especially in environments where attendees leverage macros or embedded scripts to run arbitrary code. By observing the image and image-loaded paths, the rule flags instances if any of the specified Office applications load an assembly DLL from the 'C:\Windows\assembly\' location, thus providing insight into potential exploitation attempts. The rule is classified as medium-level risk, acknowledging a balance between legitimate usage and abnormal behaviors triggered by potential threat actors using known Office applications for nefarious purposes.
Categories
- Endpoint
- Windows
Data Sources
- Image
Created: 2020-02-19