heroui logo

Attachment: File execution via Javascript

Sublime Rules

View Source
Summary
This detection rule targets potentially malicious JavaScript files that may execute other files when opened as attachments. The rule focuses on identifying JavaScript strings or identifiers that can invoke system commands or execute files, such as 'ActiveXObject' and 'ShellExecute', typically found in malicious scripts. The rule is activated upon detecting inbound attachments that have common archive file types and contain JavaScript patterns suggesting execution capabilities. Additionally, it filters based on the sender's reputation, considering if they are new or previously flagged as malicious/spam, while ensuring that no false positives exist in the sender's history. This type of rule is crucial for preventing malware and ransomware attacks that exploit JavaScript within email attachments.
Categories
  • Endpoint
  • Web
  • Application
Data Sources
  • File
  • Script
  • Network Traffic
  • Application Log
Created: 2023-06-26