heroui logo

New Outlook Macro Created

Sigma Rules

View Source
Summary
This detection rule identifies the creation of macro files specifically for Microsoft Outlook, a behavior often associated with attack techniques aimed at persistence and remote command-and-control functionalities. The rule checks for events where the `Image` executed ends with `\outlook.exe` and the target file being created matches `\Microsoft\Outlook\VbaProject.OTM`, which is indicative of a newly created VBA macro. This form of activity is particularly malicious, as it allows an attacker to execute arbitrary code within Outlook, potentially leading to data theft or further system compromise. The rule includes a condition that consolidates these checks into a single logical detection, and it emits alerts when the conditions are met. False positives are possible when legitimate users create macros for their workflow, hence the rule is marked with a medium severity level which requires analyst review.
Categories
  • Endpoint
  • Windows
Data Sources
  • File
Created: 2021-04-05