
Summary
This detection rule identifies suspicious activity related to the creation of macro files within Microsoft Outlook. Specifically, it targets files named 'VbaProject.OTM', which are commonly associated with VBA macros used in Office applications. The rule focuses on detecting events where this specific file is created while ensuring that the originating process is 'outlook.exe'. This behavior could indicate potential persistence mechanisms or the use of malicious macros for command and control operations. The high severity level suggests that detection of this activity warrants immediate attention, as it may signify an active threat targeting the organization's email infrastructure. References provide additional context on macro-based threats and methods for persistence through Outlook. The likelihood of false positives is considered low, as the rule is designed to filter out benign activity.
Categories
- Endpoint
- Windows
- Application
Data Sources
- File
Created: 2023-02-08