heroui logo

Office Application Drop Executable

Splunk Security Content

View Source
Summary
The 'Office Application Drop Executable' detection rule has been deprecated and originally aimed to identify malicious behaviors associated with Microsoft Office applications, such as Word or Excel, creating or dropping executable files on Windows OS environments. It utilized events from the Endpoint data model, specifically monitoring process creation and filesystem activities to flag instances where these applications generated files with potentially dangerous extensions like .exe, .dll, or .ps1. Such behavior is notably indicative of spear-phishing attacks, where attackers exploit Office applications to introduce malware onto a host system, leading to severe consequences like unauthorized code execution, privilege escalation, or persistent backdoor access. Although this detection method is no longer active, understanding its functionality emphasizes the continuous threat posed by malicious Office files and highlights the need for operational vigilance across endpoint defenses.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • File
ATT&CK Techniques
  • T1566
  • T1566.001
Created: 2025-01-24