
Summary
This detection rule identifies potentially malicious behavior wherein a child process is spawned from the Outlook application, specifically from the OUTLOOK.EXE parent process. The rule looks for specific executables that are commonly associated with suspicious activity, listing a range of executable file names that should not typically be launched directly from Outlook. The rule, categorized under process creation in a Windows environment, flags the activity as high-level suspicious, given that such behavior could indicate exploitation attempts or malicious scripts being run stealthily. False positives may arise from unknown processes, making the identification of these instances crucial for further investigation.
Categories
- Windows
- Endpoint
Data Sources
- Process
Created: 2022-02-28