
Summary
This detection rule targets the creation of files with extensions typically associated with executables or scripts, specifically when these files are created by Microsoft Office applications (such as Word, Excel, Access, PowerPoint, Project, Publisher, Visio). The rule uses a combination of conditions that check the process creating the file and the file's extension. The relevant Office applications are identified based on their executable names. The detection logic ensures that if any of the specified Office applications creates a file with a specified suspicious extension, an alert is triggered, given the potentially malicious context (e.g., various ransomware have utilized similar tactics). The rule also incorporates filters to minimize false positives, focusing on specific file paths often associated with legitimate operations by Office applications.
Categories
- Endpoint
Data Sources
- File
Created: 2021-08-23