heroui logo

Suspicious File Created in Outlook Temporary Directory

Sigma Rules

View Source
Summary
This detection rule aims to identify potentially malicious files created in the temporary directories utilized by Microsoft Outlook. Such files often have suspicious extensions that are commonly associated with malware, including .cpl, .hta, .iso, .rdp, .svg, .vba, .vbe, and .vbs. The rule is crucial for detecting spear-phishing attacks that attempt to exploit users by using these file types as attachments. The detection mechanism examines filename criteria to determine if any newly created files in specific Outlook temporary directories match these suspicious extensions. It serves as an essential layer of protection against spear-phishing tactics that leverage malicious files to compromise users' systems.
Categories
  • Endpoint
  • Windows
Data Sources
  • File
Created: 2025-07-22