Persistence via Microsoft Office AddIns
Detects attempts to establish persistence on an endpoint by abusing Microsoft Office add-ins.
Elastic rule (View on GitHub)
1[metadata]
2creation_date = "2020/10/16"
3integration = ["endpoint", "windows", "m365_defender", "sentinel_one_cloud_funnel"]
4maturity = "production"
5updated_date = "2025/03/20"
6
7[rule]
8author = ["Elastic"]
9description = "Detects attempts to establish persistence on an endpoint by abusing Microsoft Office add-ins."
10from = "now-9m"
11index = [
12 "logs-endpoint.events.file-*",
13 "winlogbeat-*",
14 "logs-windows.sysmon_operational-*",
15 "endgame-*",
16 "logs-m365_defender.event-*",
17 "logs-sentinel_one_cloud_funnel.*",
18]
19language = "eql"
20license = "Elastic License v2"
21name = "Persistence via Microsoft Office AddIns"
22note = """## Triage and analysis
23
24> **Disclaimer**:
25> This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
26
27### Investigating Persistence via Microsoft Office AddIns
28
29Microsoft Office AddIns enhance productivity by allowing custom functionalities in Office applications. However, adversaries exploit this by placing malicious add-ins in specific startup directories, ensuring execution each time the application launches. The detection rule identifies suspicious files with extensions like .xll or .xlam in these directories, flagging potential persistence mechanisms on Windows systems.
30
31### Possible investigation steps
32
33- Review the file path and extension from the alert to confirm it matches the suspicious directories and extensions specified in the detection rule, such as .xll or .xlam in the Microsoft Office startup directories.
34- Check the file creation and modification timestamps to determine when the suspicious file was added or altered, which can help establish a timeline of potential malicious activity.
35- Investigate the file's origin by examining recent file downloads, email attachments, or network activity that might have introduced the file to the system.
36- Analyze the file's contents or hash against known malware databases to identify if it is a known threat or potentially malicious.
37- Review user activity and system logs around the time the file was created or modified to identify any unusual behavior or processes that could be related to the persistence mechanism.
38- Assess the impacted user's role and access level to determine the potential risk and impact of the persistence mechanism on the organization.
39
40### False positive analysis
41
42- Legitimate add-ins installed by trusted software vendors may trigger alerts. Verify the source and publisher of the add-in to determine its legitimacy.
43- Custom add-ins developed internally for business purposes can be flagged. Maintain a whitelist of known internal add-ins to prevent unnecessary alerts.
44- Frequent updates to legitimate add-ins might cause repeated alerts. Implement version control and update the whitelist accordingly to accommodate these changes.
45- User-specific add-ins for accessibility or productivity tools may be detected. Educate users on safe add-in practices and monitor for any unusual behavior.
46- Temporary add-ins used for specific projects or tasks can be mistaken for threats. Document and review these cases to ensure they are recognized as non-threatening.
47
48### Response and remediation
49
50- Isolate the affected endpoint from the network to prevent further spread of the potential threat.
51- Terminate any suspicious Microsoft Office processes that may be running add-ins from the identified directories.
52- Remove the malicious add-in files from the specified startup directories: "C:\\Users\\*\\AppData\\Roaming\\Microsoft\\Word\\Startup\\", "C:\\Users\\*\\AppData\\Roaming\\Microsoft\\AddIns\\", and "C:\\Users\\*\\AppData\\Roaming\\Microsoft\\Excel\\XLSTART\\".
53- Conduct a full antivirus and antimalware scan on the affected system using tools like Microsoft Defender for Endpoint to ensure no other malicious files are present.
54- Review and restore any altered system configurations or settings to their default state to ensure system integrity.
55- Monitor the affected system and network for any signs of re-infection or related suspicious activity, using enhanced logging and alerting mechanisms.
56- Escalate the incident to the security operations center (SOC) or relevant IT security team for further analysis and to determine if additional systems are affected."""
57references = ["https://labs.withsecure.com/publications/add-in-opportunities-for-office-persistence"]
58risk_score = 73
59rule_id = "f44fa4b6-524c-4e87-8d9e-a32599e4fb7c"
60severity = "high"
61tags = [
62 "Domain: Endpoint",
63 "OS: Windows",
64 "Use Case: Threat Detection",
65 "Tactic: Persistence",
66 "Data Source: Elastic Endgame",
67 "Data Source: Elastic Defend",
68 "Data Source: Sysmon",
69 "Data Source: Microsoft Defender for Endpoint",
70 "Data Source: SentinelOne",
71 "Resources: Investigation Guide",
72]
73timestamp_override = "event.ingested"
74type = "eql"
75
76query = '''
77file where host.os.type == "windows" and event.type != "deletion" and
78 file.extension : ("wll","xll","ppa","ppam","xla","xlam") and
79 file.path :
80 (
81 "C:\\Users\\*\\AppData\\Roaming\\Microsoft\\Word\\Startup\\*",
82 "C:\\Users\\*\\AppData\\Roaming\\Microsoft\\AddIns\\*",
83 "C:\\Users\\*\\AppData\\Roaming\\Microsoft\\Excel\\XLSTART\\*"
84 )
85'''
86
87
88[[rule.threat]]
89framework = "MITRE ATT&CK"
90[[rule.threat.technique]]
91id = "T1137"
92name = "Office Application Startup"
93reference = "https://attack.mitre.org/techniques/T1137/"
94[[rule.threat.technique.subtechnique]]
95id = "T1137.006"
96name = "Add-ins"
97reference = "https://attack.mitre.org/techniques/T1137/006/"
98
99
100
101[rule.threat.tactic]
102id = "TA0003"
103name = "Persistence"
104reference = "https://attack.mitre.org/tactics/TA0003/"
Triage and analysis
Disclaimer: This investigation guide was created using generative AI technology and has been reviewed to improve its accuracy and relevance. While every effort has been made to ensure its quality, we recommend validating the content and adapting it to suit your specific environment and operational needs.
Investigating Persistence via Microsoft Office AddIns
Microsoft Office AddIns enhance productivity by allowing custom functionalities in Office applications. However, adversaries exploit this by placing malicious add-ins in specific startup directories, ensuring execution each time the application launches. The detection rule identifies suspicious files with extensions like .xll or .xlam in these directories, flagging potential persistence mechanisms on Windows systems.
Possible investigation steps
- Review the file path and extension from the alert to confirm it matches the suspicious directories and extensions specified in the detection rule, such as .xll or .xlam in the Microsoft Office startup directories.
- Check the file creation and modification timestamps to determine when the suspicious file was added or altered, which can help establish a timeline of potential malicious activity.
- Investigate the file's origin by examining recent file downloads, email attachments, or network activity that might have introduced the file to the system.
- Analyze the file's contents or hash against known malware databases to identify if it is a known threat or potentially malicious.
- Review user activity and system logs around the time the file was created or modified to identify any unusual behavior or processes that could be related to the persistence mechanism.
- Assess the impacted user's role and access level to determine the potential risk and impact of the persistence mechanism on the organization.
False positive analysis
- Legitimate add-ins installed by trusted software vendors may trigger alerts. Verify the source and publisher of the add-in to determine its legitimacy.
- Custom add-ins developed internally for business purposes can be flagged. Maintain a whitelist of known internal add-ins to prevent unnecessary alerts.
- Frequent updates to legitimate add-ins might cause repeated alerts. Implement version control and update the whitelist accordingly to accommodate these changes.
- User-specific add-ins for accessibility or productivity tools may be detected. Educate users on safe add-in practices and monitor for any unusual behavior.
- Temporary add-ins used for specific projects or tasks can be mistaken for threats. Document and review these cases to ensure they are recognized as non-threatening.
Response and remediation
- Isolate the affected endpoint from the network to prevent further spread of the potential threat.
- Terminate any suspicious Microsoft Office processes that may be running add-ins from the identified directories.
- Remove the malicious add-in files from the specified startup directories: "C:\Users*\AppData\Roaming\Microsoft\Word\Startup", "C:\Users*\AppData\Roaming\Microsoft\AddIns", and "C:\Users*\AppData\Roaming\Microsoft\Excel\XLSTART".
- Conduct a full antivirus and antimalware scan on the affected system using tools like Microsoft Defender for Endpoint to ensure no other malicious files are present.
- Review and restore any altered system configurations or settings to their default state to ensure system integrity.
- Monitor the affected system and network for any signs of re-infection or related suspicious activity, using enhanced logging and alerting mechanisms.
- Escalate the incident to the security operations center (SOC) or relevant IT security team for further analysis and to determine if additional systems are affected.
References
Related rules
- Adding Hidden File Attribute via Attrib
- Adobe Hijack Persistence
- Browser Extension Install
- Creation of a Hidden Local User Account
- Creation or Modification of a new GPO Scheduled Task or Service