
Summary
This detection rule focuses on identifying suspicious email attachments that might be indicative of malicious intent. It specifically looks for attachments with extensions typically associated with executable files, such as ".exe" and ".dll", as well as archive formats that could contain malware like ".rar", ".zip", ".cab", ".7z", and ".gzip". The rule is designed to be implemented in a Splunk environment and utilizes the logic constructed around the `get_email_data` and `get_email_data_malicious` functions to extract relevant details about the email message. The detection process involves searching for these file types in incoming email attachments and compiling information such as event time, host, user source and destination details, file names, and actions taken on the attachments. By filtering the results using a regex match on the file name, it focuses only on those that match the criteria for potentially malicious attachments. The rule is intended to provide insight into possibly spear-phishing attempts linked to multiple threat actors known for using these types of malicious files, including various APT groups and well-known malware campaigns.
Categories
- Endpoint
- Network
- Cloud
Data Sources
- User Account
- Application Log
- Network Traffic
- File
- Web Credential
ATT&CK Techniques
- T1566.001
Created: 2024-02-09