
Summary
This detection rule targets the potential creation of malicious Outlook forms, which can be used for persistence mechanisms in Windows systems. The primary focus is to identify when Outlook (outlook.exe) creates a new form in specific directories known to be associated with Outlook forms. The rule evaluates file creation events, specifically looking for activity in the 'AppData\Local\Microsoft\FORMS\IPM' and 'Local Settings\Application Data\Microsoft\Forms' paths. These directories are typical locations for Outlook forms, and if new files are created in these paths, it may indicate an attempt to establish persistence through a malicious Outlook form. The rule is set at a high severity level due to the potential risks associated with successful exploitation of this vector. False positives may occur during legitimate use of Outlook forms, necessitating careful analysis of alerts triggered by the detection.
Categories
- Windows
- Endpoint
Data Sources
- File
Created: 2021-06-10