
Summary
This detection rule identifies the creation of OneNote files (with extensions '.one' or '.onepkg') in suspicious or uncommon file locations, which are typically temp directories used by applications, such as '\AppData\Local\Temp\', '\Users\Public\', and '\Windows\Temp\'. This type of behavior is indicative of potential abuse or misuse of OneNote attachments by attackers, who may utilize these files as a delivery mechanism for malware or to evade detection. The rule includes specific conditions that look for these files being created outside legitimate user activities, by filtering based on the image path of OneNote itself, implying that the detection is aimed at identifying potentially malicious use of this software rather than legitimate usage. False positives are acknowledged for cases where users may legitimately create or store OneNote files in these locations. The overall impact level of this rule is rated as medium, indicating a moderate risk associated with the behavior detected, given the potential for such files to be part of a malware distribution campaign.
Categories
- Endpoint
- Windows
Data Sources
- File
Created: 2023-01-22