<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Microsoft Office — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/microsoft-office/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 27 Jan 2024 17:30:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/microsoft-office/feed.xml" rel="self" type="application/rss+xml"/><item><title>Microsoft Office 'Office Test' Registry Persistence Abuse</title><link>https://feed.craftedsignal.io/briefs/2024-01-office-test-registry-persistence/</link><pubDate>Sat, 27 Jan 2024 17:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-office-test-registry-persistence/</guid><description>Attackers modify the Microsoft Office 'Office Test' Registry key to achieve persistence by specifying a malicious DLL that executes upon application startup.</description><content:encoded><![CDATA[<p>The &ldquo;Office Test&rdquo; registry key, located under <code>HKCU\Software\Microsoft\Office Test\Special\Perf</code>, is a legitimate feature that allows specifying a DLL to be executed every time an MS Office application is started. Attackers can abuse this functionality by modifying the registry to point to a malicious DLL, achieving persistence on a compromised host. This allows for continued malicious activity even after a system restart or user logout. Elastic has published a rule to detect this behavior. The modification of this registry key, excluding deletions, is a strong indicator of potential abuse, and can be detected via endpoint detection and response (EDR) solutions as well as traditional Sysmon logging.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, often through phishing or exploiting a vulnerability.</li>
<li>The attacker establishes a foothold and escalates privileges to make necessary registry modifications.</li>
<li>The attacker modifies the <code>HKCU\Software\Microsoft\Office Test\Special\Perf</code> registry key, adding a new entry or modifying an existing one to point to a malicious DLL.</li>
<li>The attacker ensures the malicious DLL is present on the system, either by dropping it directly or using existing system tools to download it.</li>
<li>A user launches a Microsoft Office application (e.g., Word, Excel, PowerPoint).</li>
<li>The Office application loads the DLL specified in the &ldquo;Office Test&rdquo; registry key during startup.</li>
<li>The malicious DLL executes its payload, which could include establishing a reverse shell, installing malware, or exfiltrating data.</li>
<li>The attacker maintains persistence, allowing them to regain access to the system each time an Office application is started.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain persistent access to a compromised system. The injected DLL can be used to execute arbitrary code, potentially leading to data theft, malware installation, or further compromise of the network. The relatively low risk score suggests a common technique, but the potential for persistent access makes it a significant threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM and tune for your environment to detect unauthorized modifications to the &ldquo;Office Test&rdquo; registry key (<code>HKCU\Software\Microsoft\Office Test\Special\Perf\*</code>).</li>
<li>Enable Sysmon Registry event logging to capture registry modifications and activate the Sigma rule above.</li>
<li>Monitor process execution logs for Office applications to detect if a suspicious DLL has been loaded or executed, as described in the investigation guide.</li>
<li>Implement enhanced monitoring and alerting for similar registry modifications across the network, as described in the remediation steps.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>registry</category><category>windows</category></item><item><title>XSL Script Execution via COM Interface in Microsoft Office</title><link>https://feed.craftedsignal.io/briefs/2024-01-xsl-script-execution-via-com/</link><pubDate>Fri, 26 Jan 2024 18:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-xsl-script-execution-via-com/</guid><description>Adversaries may exploit Microsoft Office applications to execute malicious JScript or VBScript by leveraging the Microsoft.XMLDOM COM interface to process and transform XML documents using XSL scripts, potentially leading to initial access or defense evasion.</description><content:encoded><![CDATA[<p>Attackers are increasingly leveraging the Microsoft.XMLDOM COM interface in Microsoft Office applications to execute malicious scripts. This technique involves embedding malicious JScript or VBScript within XSL transformations, which are then processed by Office applications like Word, Excel, PowerPoint, and Publisher. The exploitation begins when a user opens a specially crafted document. This campaign abuses legitimate functionalities for malicious purposes. This technique can be used for initial access, defense evasion, and execution of arbitrary code. The observed behavior includes the loading of <code>msxml3.dll</code> and the spawning of child processes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user receives a phishing email containing a malicious Office document.</li>
<li>The user opens the document in Microsoft Word (winword.exe), Excel (excel.exe), PowerPoint (powerpnt.exe), or Publisher (mspub.exe).</li>
<li>The Office application loads <code>msxml3.dll</code> to process XML content within the document.</li>
<li>The document contains an embedded XSL script with malicious JScript or VBScript code.</li>
<li>The XSL transformation is initiated, executing the embedded script via the COM interface.</li>
<li>The script spawns a new process (cmd.exe, powershell.exe, or mshta.exe) to execute arbitrary commands.</li>
<li>The spawned process downloads and executes a payload from a remote server.</li>
<li>The payload establishes persistence, escalates privileges, and performs malicious activities such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, potentially compromising sensitive data and allowing attackers to gain initial access to the targeted system. This can result in data breaches, financial losses, and reputational damage. The scope of impact includes any Windows systems running vulnerable versions of Microsoft Office. If successful, the attacker can achieve persistence, perform lateral movement and compromise other systems on the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;XSL Script Execution via COM&rdquo; to your SIEM to detect the execution of hosted XSL scripts using the Microsoft.XMLDOM COM interface.</li>
<li>Monitor for the loading of <code>msxml3.dll</code> by Microsoft Office applications and subsequent process creations to identify potential exploitation attempts.</li>
<li>Implement application whitelisting to restrict the execution of unauthorized scripts and executables, particularly those not located in standard directories.</li>
<li>Block the execution of unusual or unsigned child processes spawned by Microsoft Office applications to prevent malicious script execution.</li>
<li>Educate users about the risks of opening suspicious attachments or clicking on links in phishing emails (T1566).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>xsl-script</category><category>com-interface</category><category>office-macro</category></item><item><title>Suspicious Execution via Microsoft Office Add-Ins</title><link>https://feed.craftedsignal.io/briefs/2024-01-office-addins/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-office-addins/</guid><description>This rule detects suspicious execution of Microsoft Office applications launching Office Add-Ins from unusual paths or with atypical parent processes, potentially indicating an attempt to gain initial access via a malicious phishing campaign.</description><content:encoded><![CDATA[<p>Attackers are increasingly leveraging malicious Microsoft Office Add-Ins to gain initial access and persistence on victim systems. These add-ins, often delivered through phishing campaigns, contain embedded malicious code. This detection identifies unusual execution patterns, such as Office applications (WINWORD.EXE, EXCEL.EXE, POWERPNT.EXE, MSACCESS.EXE, VSTOInstaller.exe) launching add-ins (wll, xll, ppa, ppam, xla, xlam, vsto) from suspicious paths like Temp or Downloads directories, or with atypical parent processes (explorer.exe, OpenWith.exe, cmd.exe, powershell.exe). The detection logic filters out known benign activities to minimize false positives, focusing on anomalies indicative of malicious intent, such as installations of Logitech software. This activity matters because successful exploitation can lead to arbitrary code execution, data theft, and further compromise of the victim&rsquo;s network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user receives a phishing email containing a malicious Microsoft Office document.</li>
<li>The user opens the document, which prompts them to enable macros or install an add-in.</li>
<li>The malicious add-in (wll, xll, ppa, ppam, xla, xlam, vsto) is downloaded from a remote server or dropped into a suspicious directory, such as %TEMP% or %APPDATA%.</li>
<li>The user executes an Office application (WINWORD.EXE, EXCEL.EXE, POWERPNT.EXE, MSACCESS.EXE), which loads the malicious add-in.</li>
<li>The malicious add-in executes arbitrary code, potentially downloading and executing a second-stage payload.</li>
<li>The add-in may establish persistence by modifying registry keys or creating scheduled tasks.</li>
<li>The attacker gains initial access to the system and can perform reconnaissance, lateral movement, and data exfiltration.</li>
<li>The attacker achieves their objective, which could include data theft, ransomware deployment, or intellectual property theft.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to complete system compromise, data theft, and potential ransomware deployment. Organizations across all sectors are at risk, particularly those with a high volume of email traffic. The use of malicious Office Add-Ins provides attackers with a persistent foothold within the victim&rsquo;s environment, allowing for long-term data collection and disruption of business operations. This can lead to significant financial losses, reputational damage, and legal liabilities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Office Add-In Loaded From Suspicious Path</code> to detect add-ins loaded from temporary or download directories based on <code>process.args</code> and <code>process.name</code>.</li>
<li>Deploy the Sigma rule <code>Office Add-In Loaded By Suspicious Parent</code> to detect add-ins loaded by <code>cmd.exe</code> or <code>powershell.exe</code> based on <code>process.parent.name</code>.</li>
<li>Investigate any instances of <code>VSTOInstaller.exe</code> executing with the <code>/Uninstall</code> argument, as this may indicate suspicious activity, correlating with the exclusion rule in the provided query.</li>
<li>Monitor for Office applications launching add-ins with parent processes of <code>explorer.exe</code> or <code>OpenWith.exe</code> using process creation logs and the provided query logic.</li>
<li>Implement stricter email filtering to prevent phishing emails containing malicious Office documents from reaching end-users.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>office-addins</category><category>phishing</category><category>initial-access</category></item><item><title>Suspicious MS Office Child Process</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-office-child-process/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-office-child-process/</guid><description>Detects suspicious child processes of Microsoft Office applications, indicating potential exploitation or malicious macros for initial access, defense evasion, and execution.</description><content:encoded><![CDATA[<p>This detection identifies suspicious child processes spawned by Microsoft Office applications (Word, PowerPoint, Excel, Outlook), which are commonly targeted for initial access via malicious documents or macro exploitation. The rule focuses on identifying anomalous process executions originating from these applications, a tactic often employed to execute arbitrary code or download additional payloads. Attackers leverage Office applications due to their widespread use and inherent scripting capabilities. Successful exploitation can lead to arbitrary code execution, lateral movement, and data exfiltration. This detection helps defenders identify and respond to potential security breaches originating from Microsoft Office applications, reducing the attack surface and minimizing potential damage. The rule specifically looks for processes like <code>cmd.exe</code>, <code>powershell.exe</code>, <code>mshta.exe</code>, <code>wscript.exe</code>, and others being spawned by Office applications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user receives a malicious Microsoft Office document (e.g., Word, Excel) via email or downloads it from a compromised website.</li>
<li>The user opens the document, triggering the execution of a malicious macro or exploitation of a vulnerability within the Office application.</li>
<li>The Office application (e.g., <code>winword.exe</code>, <code>excel.exe</code>) spawns a suspicious child process such as <code>cmd.exe</code> or <code>powershell.exe</code>.</li>
<li>The spawned process executes a command to download a malicious payload from a remote server using <code>bitsadmin.exe</code> or <code>certutil.exe</code>.</li>
<li>The downloaded payload is a reverse shell or a malware dropper, which establishes a connection to an attacker-controlled server.</li>
<li>The attacker gains initial access to the compromised system and attempts to escalate privileges and perform reconnaissance.</li>
<li>The attacker uses discovery commands with <code>net.exe</code>, <code>ipconfig.exe</code>, <code>tasklist.exe</code>, and <code>whoami.exe</code> to map the environment and identify valuable targets.</li>
<li>The attacker moves laterally to other systems within the network, aiming to compromise critical assets and achieve their objectives, such as data theft or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, allowing attackers to gain initial access to the compromised system. This can result in data theft, installation of malware, lateral movement to other systems, and ultimately, significant disruption to business operations. The widespread use of Microsoft Office makes it a prime target, potentially affecting a large number of users and organizations. Failure to detect and respond to these attacks can result in significant financial losses, reputational damage, and compromise of sensitive data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging (Sysmon Event ID 1 or Windows Security Event Logs) to ensure the visibility required to detect suspicious child processes.</li>
<li>Deploy the Sigma rule <code>Suspicious MS Office Child Process</code> to your SIEM and tune the rule based on your environment to reduce false positives.</li>
<li>Investigate any alerts generated by the <code>Suspicious MS Office Child Process</code> Sigma rule by examining the parent process tree and associated network connections.</li>
<li>Implement application control policies to restrict the execution of unauthorized processes from Microsoft Office applications.</li>
<li>Regularly update Microsoft Office applications to patch known vulnerabilities.</li>
<li>Block known malicious domains or IPs associated with malware delivery and command and control, based on threat intelligence feeds and IOCs from external sources.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>initial-access</category><category>defense-evasion</category><category>execution</category><category>discovery</category><category>windows</category></item><item><title>Persistence via Visual Studio Tools for Office (VSTO) Add-ins</title><link>https://feed.craftedsignal.io/briefs/2024-01-vsto-persistence/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-vsto-persistence/</guid><description>The Visual Studio Tools for Office (VSTO) add-ins can be abused by attackers to establish persistence in Microsoft Office applications by modifying registry keys.</description><content:encoded><![CDATA[<p>Attackers can leverage Visual Studio Tools for Office (VSTO) add-ins to establish persistence within Microsoft Office applications. VSTO add-ins, designed to extend the functionality of Office applications, can be manipulated by threat actors to execute malicious code upon application startup. By modifying specific registry keys associated with VSTO add-ins, adversaries can ensure their code is loaded and executed each time an Office application is launched. This technique allows for covert and persistent access to compromised systems, enabling further malicious activities such as data exfiltration, lateral movement, or the deployment of additional payloads. The detection of this persistence mechanism is crucial for defenders to identify and mitigate potential compromises within their environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the target system via unspecified means (e.g., phishing, exploiting a vulnerability).</li>
<li>The attacker identifies the registry keys associated with VSTO add-ins for Office applications (Outlook, Word, Excel, PowerPoint). These keys are typically located under <code>\Software\Microsoft\Office\[Application]\Addins\</code>.</li>
<li>The attacker modifies the registry to add or modify entries related to a malicious VSTO add-in. This involves setting the <code>LoadBehavior</code> value to <code>3</code> to ensure the add-in is loaded on startup.</li>
<li>The attacker places the malicious VSTO add-in files (DLLs) in a location accessible to the Office application.</li>
<li>The attacker may also modify the <code>\Software\Microsoft\VSTO\Security\Inclusion\</code> registry key to bypass security warnings related to unsigned add-ins.</li>
<li>The user launches the targeted Office application (e.g., Outlook).</li>
<li>The Office application loads the malicious VSTO add-in based on the modified registry entries.</li>
<li>The malicious VSTO add-in executes its payload, enabling the attacker to perform malicious activities on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to achieve persistent code execution within Microsoft Office applications. This can lead to the compromise of sensitive data, the deployment of additional malware, and the establishment of a long-term foothold within the targeted environment. The scope of impact depends on the privileges of the user account and the capabilities of the malicious VSTO add-in. Since Office applications are commonly used, a successful attack could potentially affect a large number of users within an organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Potential Persistence Via Visual Studio Tools for Office</code> to your SIEM to detect suspicious registry modifications related to VSTO add-ins.</li>
<li>Monitor registry modifications under the paths <code>\Software\Microsoft\Office\Outlook\Addins\</code>, <code>\Software\Microsoft\Office\Word\Addins\</code>, <code>\Software\Microsoft\Office\Excel\Addins\</code>, <code>\Software\Microsoft\Office\Powerpoint\Addins\</code>, and <code>\Software\Microsoft\VSTO\Security\Inclusion\</code> (see Sigma rule and references).</li>
<li>Implement application control policies to restrict the execution of unsigned or untrusted VSTO add-ins.</li>
<li>Regularly review and audit installed Office add-ins to identify and remove any suspicious or unauthorized extensions.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>office</category><category>vsto</category></item><item><title>Office Application Autorun Registry Key Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-office-autorun-registry-modification/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-office-autorun-registry-modification/</guid><description>Adversaries modify Office application autostart extensibility point (ASEP) registry keys to achieve persistence and execute malicious code when Office applications are launched.</description><content:encoded><![CDATA[<p>Attackers may target Microsoft Office applications&rsquo; autostart extensibility points (ASEPs) in the Windows Registry to establish persistence. By modifying specific registry keys, malicious actors can ensure that their code is executed each time an Office application, such as Word, Excel, or Outlook, is launched. This technique is often employed to maintain a foothold on a compromised system. While legitimate add-ins also leverage these registry keys, unauthorized modifications can lead to the execution of arbitrary code, potentially resulting in data theft, system compromise, or further exploitation. Defenders should be aware that many legitimate applications modify these keys. Thorough testing and tuning is required.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system via an unrelated method.</li>
<li>The attacker identifies the relevant Office application ASEP registry keys: <code>\Software\Wow6432Node\Microsoft\Office</code>, <code>\Software\Microsoft\Office</code> and specific application keys like <code>\Word\Addins</code>, <code>\Excel\Addins</code>, etc.</li>
<li>The attacker modifies the registry key to point to a malicious executable or script. This could be achieved using tools like <code>reg.exe</code> or PowerShell.</li>
<li>The registry modification ensures that the malicious code is executed upon the next launch of the targeted Office application.</li>
<li>The user launches the Office application (e.g., Word, Excel, Outlook).</li>
<li>The Office application reads the modified registry key and executes the associated malicious code.</li>
<li>The malicious code performs its intended actions, such as downloading additional payloads, establishing command and control, or stealing data.</li>
<li>The attacker maintains persistence on the system through the modified registry key, ensuring continued access and control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to achieve persistence on compromised systems. This can lead to data exfiltration, deployment of ransomware, or further lateral movement within the network. The modification of these keys is often performed to maintain a persistent presence, allowing attackers to regain access to the system even after reboots or user logoffs. While the number of direct victims is unknown, the potential for widespread impact is significant, especially in organizations heavily reliant on Microsoft Office applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable registry modification logging and deploy the provided Sigma rules to your SIEM to detect suspicious changes to Office application autostart registry keys.</li>
<li>Regularly audit the Office application add-ins installed on systems to identify and remove any unauthorized or malicious extensions (reference: Sigma rules).</li>
<li>Implement application whitelisting to prevent the execution of unauthorized executables and scripts (reference: Attack Chain).</li>
<li>Monitor process execution events for Office applications launching unusual or suspicious child processes (reference: Attack Chain).</li>
<li>Tune and customize the provided Sigma rules based on your environment&rsquo;s baseline of legitimate Office add-in activity to minimize false positives (reference: Sigma rules).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>attack.privilege-escalation</category><category>attack.persistence</category><category>attack.t1547.001</category></item><item><title>MS Office Macro Security Registry Modifications</title><link>https://feed.craftedsignal.io/briefs/2024-01-office-macro-security-regmod/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-office-macro-security-regmod/</guid><description>Attackers may modify Microsoft Office registry settings related to macro security (AccessVBOM, VbaWarnings) to disable security warnings, enabling malicious macros for persistence and further compromise.</description><content:encoded><![CDATA[<p>Microsoft Office applications allow users and developers to manage macro security settings. Attackers can abuse these settings by modifying the registry to automatically trust macros or disable security warnings. This increases the likelihood of successful macro execution, potentially establishing persistence or enabling further malicious activities on the compromised system. The modifications specifically target the <code>AccessVBOM</code> and <code>VbaWarnings</code> registry values. This is a common tactic used to bypass security controls and execute malicious code within an organization, often as part of a phishing or spear phishing campaign.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious Office document containing VBA macros.</li>
<li>The victim receives the malicious document via email or other means (T1566).</li>
<li>The victim opens the document, potentially triggering a prompt to enable macros.</li>
<li>If macros are enabled or trusted due to existing settings, the malicious VBA code executes (T1204.002).</li>
<li>The VBA code modifies the Windows Registry to disable macro security warnings by setting <code>HKEY_CURRENT_USER\Software\Microsoft\Office\*\Security\VbaWarnings</code> to 1 or modifying <code>AccessVBOM</code> (T1112).</li>
<li>The attacker can then use the trusted macro environment to execute arbitrary code (T1059.005).</li>
<li>The attacker may establish persistence by creating scheduled tasks or modifying startup entries (T1547.001).</li>
<li>The attacker achieves their final objective, which may include data exfiltration, lateral movement, or deploying ransomware (TA0005, TA0002).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to bypass Office macro security protections, potentially leading to arbitrary code execution and system compromise. Disabling macro security warnings increases the attack surface within an organization, as users are no longer prompted to approve macro execution, which can lead to further malware infection and data breaches. The rule is designed to detect registry changes that could enable this type of attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon registry event logging to detect the registry modifications described in this brief to trigger the detections (Sysmon Registry Events).</li>
<li>Deploy the Sigma rule &ldquo;MS Office Macro Security Registry Modifications&rdquo; to your SIEM and tune for your environment.</li>
<li>Use Group Policy Objects (GPOs) to centrally manage Office macro security settings and prevent users from modifying them (references).</li>
<li>Investigate any alerts generated by this rule to determine the source of the registry modification and whether malicious macros were subsequently executed (rule description).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>office</category><category>macro</category><category>registry</category><category>defense-evasion</category><category>windows</category></item><item><title>Detection of Office Macro File Creation</title><link>https://feed.craftedsignal.io/briefs/2024-01-office-macro-creation/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-office-macro-creation/</guid><description>This brief outlines a threat involving the creation of new Office macro files, potentially indicating malicious activity such as phishing or malware distribution, targeting Windows systems.</description><content:encoded><![CDATA[<p>The creation of Office macro files (.docm, .xlsm, .pptm, etc.) can be an indicator of malicious activity, often linked to initial access attempts such as phishing campaigns or malware distribution. Attackers frequently embed malicious macros within these files to execute arbitrary code on a victim&rsquo;s machine upon opening the document and enabling macros. While legitimate use cases for macro-enabled documents exist, their creation should be monitored, especially when originating from unusual processes or locations. This activity is related to the technique T1566.001 (Phishing: Spearphishing Attachment). Defenders need to monitor file creation events for specific Office macro extensions, filtering out common false positives to identify potential threats.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious Office document (e.g., .docm, .xlsm) containing a VBA macro.</li>
<li>The attacker sends the malicious document as an attachment via email (spearphishing).</li>
<li>The user receives the email and opens the attached Office document.</li>
<li>The user is prompted to enable macros within the document.</li>
<li>If the user enables macros, the embedded VBA code executes.</li>
<li>The VBA code may execute PowerShell or other scripting languages to download a malicious payload.</li>
<li>The downloaded payload is saved to disk (e.g., in the user&rsquo;s temp directory).</li>
<li>The payload executes, establishing persistence or performing other malicious actions, such as ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, malware installation, data exfiltration, and potentially complete system compromise. The impact can range from individual user infection to widespread organizational damage, depending on the attacker&rsquo;s objectives and the level of access gained. In a widespread attack, numerous systems could be infected, leading to significant downtime, data loss, and financial repercussions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Office Macro File Creation</code> to your SIEM to detect the creation of suspicious Office macro files (logsource: file_event/windows).</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the parent processes of the file creation event.</li>
<li>Implement user awareness training to educate employees about the risks of opening unsolicited attachments and enabling macros.</li>
<li>Enable Sysmon file creation logging to capture the necessary events for the Sigma rule to function effectively.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>initial-access</category><category>phishing</category><category>macro</category></item></channel></rss>