Powershell Local Email Collection
Adversaries may target user email on local systems to collect sensitive information. Files containing email data can be acquired from a users local system, such as Outlook storage or cache files.
Sigma rule (View on GitHub)
1title: Powershell Local Email Collection
2id: 2837e152-93c8-43d2-85ba-c3cd3c2ae614
3status: test
4description: |
5 Adversaries may target user email on local systems to collect sensitive information.
6 Files containing email data can be acquired from a users local system, such as Outlook storage or cache files.
7references:
8 - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1114.001/T1114.001.md
9author: frack113
10date: 2021-07-21
11modified: 2022-12-25
12tags:
13 - attack.collection
14 - attack.t1114.001
15logsource:
16 product: windows
17 category: ps_script
18 definition: 'Requirements: Script Block Logging must be enabled'
19detection:
20 selection:
21 ScriptBlockText|contains:
22 - 'Get-Inbox.ps1'
23 - 'Microsoft.Office.Interop.Outlook'
24 - 'Microsoft.Office.Interop.Outlook.olDefaultFolders'
25 - '-comobject outlook.application'
26 condition: selection
27falsepositives:
28 - Unknown
29level: medium
References
Related rules
- 7Zip Compressing Dump Files
- ADFS Database Named Pipe Connection By Uncommon Tool
- AWS EC2 VM Export Failure
- Audio Capture
- Audio Capture via PowerShell