heroui logo

Office Binary Download Remote File

Anvilogic Forge

View Source
Summary
The detection rule titled "Office Binary Download Remote File" is designed to identify a potential exploitation vector where Office applications (such as PowerPoint, Word, Excel, OneNote, Publisher, Outlook, and Access) are manipulated to download malicious payloads from remote sources. Unsanitized file validation processes in these applications can be exploited by threat actors to bypass security measures and introduce malware into the target system. This rule targets execution footprints that exhibit patterns consistent with malicious behaviors associated with known threat actors like Evilnum, FIN11, and NewsPenguin, and commonly used malware families such as Clop and Qakbot. Leveraging Splunk for detection, it collects endpoint data and checks for malicious process strings indicating attempts to download files via administrative tools, categorized under command-and-control techniques. Through careful analysis of process command-line parameters and endpoint behavior, the rule aims to mitigate the risk of file-based exploits and unauthorized downloads originating from Office binaries. The detection utilizes specific process names as indicators of compromise and implements statistical analysis on the captured data to derive insights on potential threats.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • User Account
ATT&CK Techniques
  • T1105
Created: 2024-02-09