Suspicious Microsoft OneNote Child Process

Detects suspicious child processes of the Microsoft OneNote application. This may indicate an attempt to execute malicious embedded objects from a .one file.

Sigma rule (View on GitHub)

  1title: Suspicious Microsoft OneNote Child Process
  2id: c27515df-97a9-4162-8a60-dc0eeb51b775
  3related:
  4    - id: 438025f9-5856-4663-83f7-52f878a70a50 # Generic rule for suspicious office application child processes
  5      type: derived
  6status: test
  7description: Detects suspicious child processes of the Microsoft OneNote application. This may indicate an attempt to execute malicious embedded objects from a .one file.
  8references:
  9    - https://github.com/elastic/protections-artifacts/commit/746086721fd385d9f5c6647cada1788db4aea95f#diff-e34e43eb5666427602ddf488b2bf3b545bd9aae81af3e6f6c7949f9652abdf18
 10    - https://micahbabinski.medium.com/detecting-onenote-one-malware-delivery-407e9321ecf0
 11author: Tim Rauch (Nextron Systems), Nasreddine Bencherchali (Nextron Systems), Elastic (idea)
 12date: 2022/10/21
 13modified: 2023/02/10
 14tags:
 15    - attack.t1566
 16    - attack.t1566.001
 17    - attack.initial_access
 18logsource:
 19    category: process_creation
 20    product: windows
 21detection:
 22    selection_parent:
 23        ParentImage|endswith: '\onenote.exe'
 24    selection_opt_img:
 25        - OriginalFileName:
 26              - 'bitsadmin.exe'
 27              - 'CertOC.exe'
 28              - 'CertUtil.exe'
 29              - 'Cmd.Exe'
 30              - 'CMSTP.EXE'
 31              - 'cscript.exe'
 32              - 'curl.exe'
 33              - 'HH.exe'
 34              - 'IEExec.exe'
 35              - 'InstallUtil.exe'
 36              - 'javaw.exe'
 37              - 'Microsoft.Workflow.Compiler.exe'
 38              - 'msdt.exe'
 39              - 'MSHTA.EXE'
 40              - 'msiexec.exe'
 41              - 'Msxsl.exe'
 42              - 'odbcconf.exe'
 43              - 'pcalua.exe'
 44              - 'PowerShell.EXE'
 45              - 'RegAsm.exe'
 46              - 'RegSvcs.exe'
 47              - 'REGSVR32.exe'
 48              - 'RUNDLL32.exe'
 49              - 'schtasks.exe'
 50              - 'ScriptRunner.exe'
 51              - 'wmic.exe'
 52              - 'WorkFolders.exe'
 53              - 'wscript.exe'
 54        - Image|endswith:
 55              - '\AppVLP.exe'
 56              - '\bash.exe'
 57              - '\bitsadmin.exe'
 58              - '\certoc.exe'
 59              - '\certutil.exe'
 60              - '\cmd.exe'
 61              - '\cmstp.exe'
 62              - '\control.exe'
 63              - '\cscript.exe'
 64              - '\curl.exe'
 65              - '\forfiles.exe'
 66              - '\hh.exe'
 67              - '\ieexec.exe'
 68              - '\installutil.exe'
 69              - '\javaw.exe'
 70              - '\mftrace.exe'
 71              - '\Microsoft.Workflow.Compiler.exe'
 72              - '\msbuild.exe'
 73              - '\msdt.exe'
 74              - '\mshta.exe'
 75              - '\msidb.exe'
 76              - '\msiexec.exe'
 77              - '\msxsl.exe'
 78              - '\odbcconf.exe'
 79              - '\pcalua.exe'
 80              - '\powershell.exe'
 81              - '\pwsh.exe'
 82              - '\regasm.exe'
 83              - '\regsvcs.exe'
 84              - '\regsvr32.exe'
 85              - '\rundll32.exe'
 86              - '\schtasks.exe'
 87              - '\scrcons.exe'
 88              - '\scriptrunner.exe'
 89              - '\sh.exe'
 90              - '\svchost.exe'
 91              - '\verclsid.exe'
 92              - '\wmic.exe'
 93              - '\workfolders.exe'
 94              - '\wscript.exe'
 95    selection_opt_explorer:
 96        Image|endswith: '\explorer.exe'
 97        CommandLine|contains:
 98            - '.hta'
 99            - '.vb'
100            - '.wsh'
101            - '.js'
102            - '.ps'
103            - '.scr'
104            - '.pif'
105            - '.bat'
106            - '.cmd'
107    selection_opt_paths:
108        Image|contains:
109            - '\AppData\'
110            - '\Users\Public\'
111            - '\ProgramData\'
112            - '\Windows\Tasks\'
113            - '\Windows\Temp\'
114            - '\Windows\System32\Tasks\'
115    filter_teams:
116        Image|endswith: '\AppData\Local\Microsoft\Teams\current\Teams.exe'
117        CommandLine|endswith: '-Embedding'
118    filter_onedrive:
119        Image|contains: '\AppData\Local\Microsoft\OneDrive\'
120        Image|endswith: '\FileCoAuth.exe'
121        CommandLine|endswith: '-Embedding'
122    condition: selection_parent and 1 of selection_opt_* and not 1 of filter_*
123falsepositives:
124    - File located in the AppData folder with trusted signature
125level: high

References

Related rules

to-top