
Summary
The rule titled 'Attachment with auto-opening VBA macro (unsolicited)' is designed to identify unsolicited email attachments that contain embedded Visual Basic for Applications (VBA) macros that execute automatically upon opening. This is achieved through a recursive scan of files and archives, targeting files with specific extensions typically associated with VBA macros as well as common archive formats. The rule includes conditions to detect files that are categorized as 'unknown' but are executable in nature, further ensuring detection of suspicious attachments. It also considers the sender's profile, filtering out messages that are either unsolicited or flagged as malicious, thus enhancing the accuracy of threat detection by minimizing false positives. This rule primarily focuses on the threat associated with malware and ransomware campaigns that exploit macros to distribute malicious payloads, thereby employing rigorous methods like archive analysis, file analysis, and sender analysis to effectively combat such threats.
Categories
- Endpoint
- Web
- Cloud
- Application
Data Sources
- File
- Process
- Network Traffic
Created: 2021-12-01