Suspicious MS Office Child Process
Detects suspicious child processes of Microsoft Office applications, indicating potential exploitation or malicious macros for initial access, defense evasion, and execution.
This detection identifies suspicious child processes spawned by Microsoft Office applications (Word, PowerPoint, Excel, Outlook), which are commonly targeted for initial access via malicious documents or macro exploitation. The rule focuses on identifying anomalous process executions originating from these applications, a tactic often employed to execute arbitrary code or download additional payloads. Attackers leverage Office applications due to their widespread use and inherent scripting capabilities. Successful exploitation can lead to arbitrary code execution, lateral movement, and data exfiltration. This detection helps defenders identify and respond to potential security breaches originating from Microsoft Office applications, reducing the attack surface and minimizing potential damage. The rule specifically looks for processes like cmd.exe, powershell.exe, mshta.exe, wscript.exe, and others being spawned by Office applications.
Attack Chain
- A user receives a malicious Microsoft Office document (e.g., Word, Excel) via email or downloads it from a compromised website.
- The user opens the document, triggering the execution of a malicious macro or exploitation of a vulnerability within the Office application.
- The Office application (e.g.,
winword.exe,excel.exe) spawns a suspicious child process such ascmd.exeorpowershell.exe. - The spawned process executes a command to download a malicious payload from a remote server using
bitsadmin.exeorcertutil.exe. - The downloaded payload is a reverse shell or a malware dropper, which establishes a connection to an attacker-controlled server.
- The attacker gains initial access to the compromised system and attempts to escalate privileges and perform reconnaissance.
- The attacker uses discovery commands with
net.exe,ipconfig.exe,tasklist.exe, andwhoami.exeto map the environment and identify valuable targets. - The attacker moves laterally to other systems within the network, aiming to compromise critical assets and achieve their objectives, such as data theft or ransomware deployment.
Impact
Successful exploitation can lead to arbitrary code execution, allowing attackers to gain initial access to the compromised system. This can result in data theft, installation of malware, lateral movement to other systems, and ultimately, significant disruption to business operations. The widespread use of Microsoft Office makes it a prime target, potentially affecting a large number of users and organizations. Failure to detect and respond to these attacks can result in significant financial losses, reputational damage, and compromise of sensitive data.
Recommendation
- Enable process creation logging (Sysmon Event ID 1 or Windows Security Event Logs) to ensure the visibility required to detect suspicious child processes.
- Deploy the Sigma rule
Suspicious MS Office Child Processto your SIEM and tune the rule based on your environment to reduce false positives. - Investigate any alerts generated by the
Suspicious MS Office Child ProcessSigma rule by examining the parent process tree and associated network connections. - Implement application control policies to restrict the execution of unauthorized processes from Microsoft Office applications.
- Regularly update Microsoft Office applications to patch known vulnerabilities.
- Block known malicious domains or IPs associated with malware delivery and command and control, based on threat intelligence feeds and IOCs from external sources.
Detection coverage 2
Suspicious MS Office Child Process
mediumDetects suspicious child processes of Microsoft Office applications
Suspicious Office Application spawning CertUtil
mediumDetects certutil.exe spawned by MS Office apps, often used for downloading malicious payloads.
Detection queries are kept inside the platform. Get full rules →