heroui logo

Malicious Document Execution

Anvilogic Forge

View Source
Summary
This rule is designed to detect potential malicious document executions by monitoring processes spawned by Microsoft Office and Adobe programs. The primary focus is on identifying actions that may indicate these applications are being leveraged to deliver malware, particularly through the execution of scripts or commands typically associated with such exploits. Threat actor groups including APT29, FIN6, and Lazarus are known to utilize these vectors, often executing secondary malicious payloads via child processes. The detection logic employs a Splunk query that focuses on specific event codes (like Event Code 4688), combined with terms that flag suspicious processes (e.g., powershell.exe, cmd.exe) that may interact with legitimate document applications like Word, Excel, or Adobe Reader. The logic utilizes regex patterns to ensure thorough matching of related process names, thus enhancing the likelihood of detecting malicious activity. Effective data analysis here hinges on accurate endpoint data collection, specifically through Windows event logs, to observe these executions in real-time and possibly block or alert on such activities to mitigate risks.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
  • Process
  • Application Log
ATT&CK Techniques
  • T1566.001
  • T1204.001
  • T1204.002
Created: 2024-02-09