heroui logo

Attachment: Potential Sandbox Evasion in Office File

Sublime Rules

View Source
Summary
This rule focuses on monitoring attached files with Office file extensions to detect potential sandbox evasion techniques employed by malicious code. Such code often conducts preliminary checks against the local host environment, searching for information such as running processes, disk size, and whether the host is part of a domain, before executing its payload. The rule triggers an alert if any Office file, or files with an ambiguous type and less than 100MB size, contain specific strings indicative of such checks. Strings associated with various Windows management classes (like Win32_Processor, Win32_Process, etc.) are specifically matched using case-insensitive substring searches. This detection is instrumental in identifying potentially harmful attachments that attempt to evade detection when operating in sandbox environments.
Categories
  • Endpoint
  • Windows
  • macOS
Data Sources
  • File
  • Process
  • Application Log
Created: 2022-03-29