Macro Enabled In A Potentially Suspicious Document
Detects registry changes to Office trust records where the path is located in a potentially suspicious location
Sigma rule (View on GitHub)
 1title: Macro Enabled In A Potentially Suspicious Document
 2id: a166f74e-bf44-409d-b9ba-ea4b2dd8b3cd
 3related:
 4    - id: 295a59c1-7b79-4b47-a930-df12c15fc9c2
 5      type: derived
 6status: test
 7description: Detects registry changes to Office trust records where the path is located in a potentially suspicious location
 8references:
 9    - https://twitter.com/inversecos/status/1494174785621819397
10    - Internal Research
11author: Nasreddine Bencherchali (Nextron Systems)
12date: 2023-06-21
13modified: 2023-08-17
14tags:
15    - attack.persistence
16    - attack.defense-evasion
17    - attack.t1112
18logsource:
19    category: registry_set
20    product: windows
21detection:
22    selection_value:
23        TargetObject|contains: '\Security\Trusted Documents\TrustRecords'
24    selection_paths:
25        TargetObject|contains:
26            # Note: add more locations where you don't expect a user to executed macro enabled docs
27            - '/AppData/Local/Microsoft/Windows/INetCache/'
28            - '/AppData/Local/Temp/'
29            - '/PerfLogs/'
30            - 'C:/Users/Public/'
31            - 'file:///D:/'
32            - 'file:///E:/'
33    condition: all of selection_*
34falsepositives:
35    - Unlikely
36level: high
References
Related rules
- Activate Suppression of Windows Security Center Notifications
- Add DisallowRun Execution to Registry
- Allow RDP Remote Assistance Feature
- Blackbyte Ransomware Registry
- Blue Mockingbird