heroui logo

Windows InProcServer32 New Outlook Form

Splunk Security Content

View Source
Summary
The detection rule focuses on identifying the creation or modification of registry keys tied to new installations of Outlook forms, which may indicate exploitation of the vulnerability identified as CVE-2024-21378. This is significant as such activities could point to an attempt at achieving authenticated remote code execution through the use of compromised form objects. The analytic leverages Sysmon EventID 13 data to monitor registry changes in the `InProcServer32` keys typical for Outlook forms. If this detection is confirmed, it may allow attackers to execute arbitrary code remotely, leading to potential system compromise by creating malicious files and registry entries.
Categories
  • Endpoint
  • Windows
Data Sources
  • Pod
  • Process
  • Windows Registry
ATT&CK Techniques
  • T1566
  • T1112
Created: 2024-11-13