heroui logo

Uncommon Microsoft Office Trusted Location Added

Sigma Rules

View Source
Summary
This detection rule is designed to identify when uncommon registry keys are added to Microsoft Office's "Trusted Locations" setting. Attackers may exploit this by adding malicious paths to these keys to bypass macro security restrictions in Office applications, allowing potentially harmful macros to run without triggering security alerts. The rule monitors registry changes specifically looking for additions to paths that do not conform to known safe locations, effectively capturing any novel or suspicious entries related to the configuration of trusted locations. The detection conditions ensure that the rule only fires for registry modifications that meet certain criteria, such as containing "Security\Trusted Locations\Location" and ending with "\Path", while excluding recognized legitimate paths that are regularly used by Microsoft Office. This helps mitigate false positives from legitimate software installations that may inadvertently add a trusted location.
Categories
  • Endpoint
  • Windows
Data Sources
  • Windows Registry
Created: 2023-06-21