
Summary
The detection rule, titled 'Potential Microsoft Office Sandbox Evasion', targets the creation of suspicious zip files on macOS systems that are prepended with special characters. This behavior is noteworthy because sandboxed Microsoft Office applications on macOS are known to allow file writes to folders with names starting with special characters, creating opportunities for attackers to bypass security mechanisms. The rule captures events from Elastic Defend, specifically monitoring for file creation events (excluding deletions) within a 9-month timeframe. The detection uses a KQL-like syntax within the Elastic framework to identify these potentially malicious files, thereby alerting security teams to a significant evasion technique often leveraged by adversaries.
Categories
- Endpoint
- macOS
Data Sources
- File
- Logon Session
- Network Traffic
ATT&CK Techniques
- T1497
Created: 2021-01-11