
Summary
This detection rule identifies potential lateral movement activities leveraging the Microsoft Excel application through the DCOM object 'ActivateMicrosoftApp'. When a child process is spawned by Excel (e.g., excel.exe), it may indicate misuse if specific unexpected processes are launched as a result. The rule checks for any child process that is either named 'foxprow.exe', 'schdplus.exe', or 'winproj.exe' which are not typically associated with standard Excel operations. The presence of these processes as child instances can indicate an attacker using DCOM methods to execute commands remotely on other machines or to escalate privilege. It is classified under tactics related to lateral movement (T1021.003) within the MITRE ATT&CK framework, highlighting its relevance in detecting suspicious activity in enterprise networks.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2023-11-13