heroui logo

Suspicious Microsoft Office Child Process - MacOS

Sigma Rules

View Source
Summary
This rule identifies suspicious child processes that are spawned by Microsoft Office applications such as Word, Excel, PowerPoint, and OneNote on macOS. The detection mechanism uses process creation logs to monitor for the execution of commands typically associated with malicious activities, especially those triggered by macros within Office documents. If a parent process is one of the identified Office applications and if it spawns any of a predefined list of command-line interfaces (like bash, curl, python, etc.), this may indicate an abnormal behavior that warrants further investigation. The presence of these child processes after interaction with Office applications is essential as they can signify exploitation of Office macros or other forms of attack leveraging the suite's capabilities.
Categories
  • macOS
  • Endpoint
Data Sources
  • Process
Created: 2023-01-31