heroui logo

Windows Outlook Macro Created by Suspicious Process

Splunk Security Content

View Source
Summary
The detection rule titled 'Windows Outlook Macro Created by Suspicious Process' monitors the creation of the Outlook Macro file (VbaProject.OTM) by non-Outlook processes. This is significant because such behavior may indicate malicious intent, particularly when associated with malware that aims to compromise email accounts or harvest sensitive information. The detection relies on data from the Sysmon EventID 11 to track file creation events specifically targeting the path associated with Outlook macros. If any process aside from 'Outlook.exe' creates this file, it triggers an alert, suggesting a potential compromise. This detection is critical in identifying advanced threats that leverage Outlook for malicious activities, such as those seen in operations linked to specific APT groups. It requires a setup with Sysmon and data ingestion to the Endpoint file-system data model in Splunk for effective monitoring. Known false positives may occur when benign Outlook operations generate the same file, necessitating careful investigation of all detections to discern real threats from benign activity.
Categories
  • Endpoint
Data Sources
  • Pod
  • Container
  • User Account
  • File
ATT&CK Techniques
  • T1137
  • T1059.005
Created: 2025-09-09