
Summary
This detection rule targets OneNote attachments that may carry suspicious commands indicative of malicious actions. The rule is structured to identify files with a '.one' extension or common archive formats that potentially contain harmful scripts. It leverages a multi-layered scanning approach, utilizing YARA to inspect the flavors of the files and catch specific strings that match known malicious patterns commonly used in scripting attacks. The keywords, snippets, and commands it looks for include references to Windows Shell commands, process creation functions, and PowerShell usage, which are often employed in exploit attempts and malware operations. Articulating strong detection methods, including archive and content analysis alongside YARA scanning, ensures high fidelity in flagging potentially dangerous OneNote attachments before they can be executed.
Categories
- Windows
- Application
- Cloud
Data Sources
- File
- Application Log
Created: 2023-02-09