Suspicious Microsoft Office Child Process - MacOS

Detects suspicious child processes spawning from microsoft office suite applications such as word or excel. This could indicates malicious macro execution

Sigma rule (View on GitHub)

 1title: Suspicious Microsoft Office Child Process - MacOS
 2id: 69483748-1525-4a6c-95ca-90dc8d431b68
 3status: test
 4description: Detects suspicious child processes spawning from microsoft office suite applications such as word or excel. This could indicates malicious macro execution
 5references:
 6    - https://redcanary.com/blog/applescript/
 7    - https://objective-see.org/blog/blog_0x4B.html
 8author: Sohan G (D4rkCiph3r)
 9date: 2023/01/31
10modified: 2023/02/04
11tags:
12    - attack.execution
13    - attack.persistence
14    - attack.t1059.002
15    - attack.t1137.002
16    - attack.t1204.002
17logsource:
18    product: macos
19    category: process_creation
20detection:
21    selection:
22        ParentImage|contains:
23            - 'Microsoft Word'
24            - 'Microsoft Excel'
25            - 'Microsoft PowerPoint'
26            - 'Microsoft OneNote'
27        Image|endswith:
28            - '/bash'
29            - '/curl'
30            - '/dash'
31            - '/fish'
32            - '/osacompile'
33            - '/osascript'
34            - '/sh'
35            - '/zsh'
36            - '/python'
37            - '/python3'
38            - '/wget'
39    condition: selection
40falsepositives:
41    - Unknown
42level: high

References

Related rules

to-top