Suspicious Execution via Microsoft Office Add-Ins
This rule detects suspicious execution of Microsoft Office applications launching Office Add-Ins from unusual paths or with atypical parent processes, potentially indicating an attempt to gain initial access via a malicious phishing campaign.
Attackers are increasingly leveraging malicious Microsoft Office Add-Ins to gain initial access and persistence on victim systems. These add-ins, often delivered through phishing campaigns, contain embedded malicious code. This detection identifies unusual execution patterns, such as Office applications (WINWORD.EXE, EXCEL.EXE, POWERPNT.EXE, MSACCESS.EXE, VSTOInstaller.exe) launching add-ins (wll, xll, ppa, ppam, xla, xlam, vsto) from suspicious paths like Temp or Downloads directories, or with atypical parent processes (explorer.exe, OpenWith.exe, cmd.exe, powershell.exe). The detection logic filters out known benign activities to minimize false positives, focusing on anomalies indicative of malicious intent, such as installations of Logitech software. This activity matters because successful exploitation can lead to arbitrary code execution, data theft, and further compromise of the victim’s network.
Attack Chain
- A user receives a phishing email containing a malicious Microsoft Office document.
- The user opens the document, which prompts them to enable macros or install an add-in.
- The malicious add-in (wll, xll, ppa, ppam, xla, xlam, vsto) is downloaded from a remote server or dropped into a suspicious directory, such as %TEMP% or %APPDATA%.
- The user executes an Office application (WINWORD.EXE, EXCEL.EXE, POWERPNT.EXE, MSACCESS.EXE), which loads the malicious add-in.
- The malicious add-in executes arbitrary code, potentially downloading and executing a second-stage payload.
- The add-in may establish persistence by modifying registry keys or creating scheduled tasks.
- The attacker gains initial access to the system and can perform reconnaissance, lateral movement, and data exfiltration.
- The attacker achieves their objective, which could include data theft, ransomware deployment, or intellectual property theft.
Impact
A successful attack can lead to complete system compromise, data theft, and potential ransomware deployment. Organizations across all sectors are at risk, particularly those with a high volume of email traffic. The use of malicious Office Add-Ins provides attackers with a persistent foothold within the victim’s environment, allowing for long-term data collection and disruption of business operations. This can lead to significant financial losses, reputational damage, and legal liabilities.
Recommendation
- Deploy the Sigma rule
Office Add-In Loaded From Suspicious Pathto detect add-ins loaded from temporary or download directories based onprocess.argsandprocess.name. - Deploy the Sigma rule
Office Add-In Loaded By Suspicious Parentto detect add-ins loaded bycmd.exeorpowershell.exebased onprocess.parent.name. - Investigate any instances of
VSTOInstaller.exeexecuting with the/Uninstallargument, as this may indicate suspicious activity, correlating with the exclusion rule in the provided query. - Monitor for Office applications launching add-ins with parent processes of
explorer.exeorOpenWith.exeusing process creation logs and the provided query logic. - Implement stricter email filtering to prevent phishing emails containing malicious Office documents from reaching end-users.
Detection coverage 3
Office Add-In Loaded From Suspicious Path
mediumDetects Microsoft Office applications loading add-ins from suspicious paths such as Temp or Downloads.
Office Add-In Loaded By Suspicious Parent
highDetects Microsoft Office applications loading add-ins with a suspicious parent process like cmd.exe or powershell.exe.
VSTOInstaller executing uninstall
infoDetects VSTOInstaller.exe executing with the /Uninstall argument
Detection queries are kept inside the platform. Get full rules →