<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Ms_office — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/ms_office/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 18:15:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/ms_office/feed.xml" rel="self" type="application/rss+xml"/><item><title>Execution of File Written or Modified by Microsoft Office</title><link>https://feed.craftedsignal.io/briefs/2024-01-office-written-executable/</link><pubDate>Wed, 03 Jan 2024 18:15:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-office-written-executable/</guid><description>This rule detects the creation and execution of executable files by Microsoft Office applications, which is often associated with malicious documents containing scripts or exploitation of Microsoft Office vulnerabilities, leading to the execution of arbitrary code.</description><content:encoded><![CDATA[<p>This detection identifies instances where Microsoft Office applications (WINWORD.EXE, EXCEL.EXE, OUTLOOK.EXE, POWERPNT.EXE, MSPUB.EXE, MSACCESS.EXE, eqnedt32.exe, and fltldr.exe) write or modify executable files (.exe) on a Windows system, followed by the execution of these files. This behavior is often indicative of malicious activity, such as exploitation of Office vulnerabilities or the execution of malicious scripts embedded within Office documents. The rule excludes signed Microsoft NewOutlookInstaller.exe and Citrix ShareFileForOutlook helpers to reduce false positives. This activity is important for defenders to monitor because it can lead to arbitrary code execution and compromise of the system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user opens a malicious Microsoft Office document (e.g., Word, Excel, PowerPoint).</li>
<li>The document contains a malicious script or exploits a vulnerability in the Office application.</li>
<li>The Office application (e.g., WINWORD.EXE) writes a new executable file (.exe) to disk, often in a temporary directory or user-writable location.</li>
<li>The malicious script or exploit executes the newly created executable file.</li>
<li>The executed file performs malicious actions, such as downloading additional malware, establishing persistence, or compromising sensitive data.</li>
<li>The malware may attempt to escalate privileges to gain broader access to the system.</li>
<li>The malware may attempt to move laterally to other systems on the network.</li>
<li>The final objective could be data exfiltration, ransomware deployment, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, allowing attackers to install malware, steal sensitive information, or take control of the compromised system. Depending on the privileges of the user and the nature of the malware, this can result in significant data loss, system disruption, and potential financial damage. If lateral movement is successful, the attacker may compromise multiple systems, increasing the scope of the attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging in Windows and monitor for the execution of executable files written or modified by Microsoft Office applications to activate the rules below.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM and tune for your specific environment.</li>
<li>Investigate any alerts generated by the Sigma rules, focusing on the parent process, file path, and command-line arguments of the executed file.</li>
<li>Implement application control policies to restrict the execution of unauthorized executables in user-writable directories.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>execution</category><category>ms_office</category><category>file_creation</category><category>malware</category></item></channel></rss>