
Summary
This rule detects potential malicious documents that contain macros referencing untrusted DLL files. Attackers often use trusted and signed documents to deliver payloads hidden within archive files. The detection logic analyzes inbound attachments to identify common archive file types (like ZIP and RAR) and inspects their contents for DLL file references. It examines files to see if they are encrypted ZIPs that still reveal the presence of DLL paths. The rule specifically targets documents that are likely to execute macros referencing DLL files, especially those identified by YARA signatures. It integrates various detection methods, including archive, file, and macro analysis, to provide a robust defense against malware or ransomware attacks leveraging DLL injection techniques.
Categories
- Endpoint
- Windows
- macOS
- Cloud
Data Sources
- File
- Network Traffic
- Process
- Script
Created: 2023-06-26