heroui logo

Windows Office Product Spawned Uncommon Process

Splunk Security Content

View Source
Summary
This detection rule identifies potentially malicious activities involving Microsoft Office products that spawn uncommon processes. Leveraging endpoint data, it focuses on process creation events where Microsoft Office applications serve as the parent process. Such behavior is significant, as it can indicate attempts to execute malicious macros or exploit vulnerabilities in Office products to circumvent security measures. If confirmed as malicious, this could empower an attacker to run arbitrary code, leading to system compromise, unauthorized data access, and lateral movement across the network. The rule uses various data sources, including Windows Event Logs and Sysmon events, to effectively capture this behavior, ensuring accurate and thorough monitoring of potentially harmful actions.
Categories
  • Endpoint
  • Windows
Data Sources
  • Pod
  • User Account
  • File
  • Process
ATT&CK Techniques
  • T1047
  • T1105
  • T1197
  • T1566
  • T1566.001
  • T1566.002
Created: 2025-01-13