
Summary
This detection rule focuses on identifying suspicious file creations associated with the OneNote application, which has been increasingly exploited by attackers to deliver malware. It specifically monitors for files generated via OneNote in local temporary directories, particularly targeting unusual file extensions that may correlate with malicious activities. Attackers have been reported using OneNote attachments to spread malware, making it crucial for systems to have this rule implemented to detect potential threats proactively.
Categories
- Endpoint
- Windows
Data Sources
- File
Created: 2023-02-09