
Summary
This detection rule identifies malicious XLSX email attachments by inspecting their EXIF metadata, specifically the TitlesOfParts fields, which contain the worksheet names of Excel documents. The rule looks for patterns in the metadata where the titles indicate a connection between a worksheet named 'Company_Name' and a print title sheet. The detection mechanism utilizes inbound traffic analysis, focusing on the attachment type and applying filters to extract and analyze the relevant metadata. Specifically, it employs regex to match phrases that imply a potential malicious intent, such as combining 'Company_Name' with strings indicating print titles, suggesting the document may have been prepared to conduct credential harvesting or other evasion tactics. By analyzing these characteristics, this rule aims to flag potentially dangerous files before they reach end-users, enhancing security measures against phishing attempts and macro-based exploits.
Categories
- Endpoint
- Cloud
- Web
Data Sources
- File
- Malware Repository
Created: 2025-09-17