ONENOTE drops suspicious file

ONENOTE drops suspicious file

Sigma rule (View on GitHub)

 1title: ONENOTE drops suspicious file
 2status: experimental
 3description: ONENOTE drops suspicious file
 4author: Joe Security
 5date: 2023-01-11
 6id: 200109
 7threatname:
 8behaviorgroup: 1
 9classification: 7
10logsource:
11    service: sysmon
12    product: windows
13detection:
14    selection:
15        EventID: 11
16        Image:
17            - '*\microsoft office\root\office*\onenote.exe'
18            - '*\microsoft office\office*\onenote.exe'
19        TargetFilename:
20            - '*\exported*\\*.hta'
21            - '*\exported*\\*.lnk'
22            - '*\exported*\\*.vbs'
23            - '*\exported*\\*.js'
24            - '*\exported*\\*.bat'
25            - '*\onenoteofflinecache_files\\*.hta'            
26            - '*\onenoteofflinecache_files\\*.vbs'
27            - '*\onenoteofflinecache_files\\*.js'
28            - '*\onenoteofflinecache_files\\*.bat'
29            
30    condition: selection
31level: critical
to-top