Potential Persistence Via Outlook Home Page
Detects potential persistence activity via outlook home page. An attacker can set a home page to achieve code execution and persistence by editing the WebView registry keys.
Sigma rule (View on GitHub)
1title: Potential Persistence Via Outlook Home Page
2id: ddd171b5-2cc6-4975-9e78-f0eccd08cc76
3related:
4 - id: 487bb375-12ef-41f6-baae-c6a1572b4dd1
5 type: similar
6status: test
7description: |
8 Detects potential persistence activity via outlook home page.
9 An attacker can set a home page to achieve code execution and persistence by editing the WebView registry keys.
10references:
11 - https://speakerdeck.com/heirhabarov/hunting-for-persistence-via-microsoft-exchange-server-or-outlook?slide=70
12 - https://support.microsoft.com/en-us/topic/outlook-home-page-feature-is-missing-in-folder-properties-d207edb7-aa02-46c5-b608-5d9dbed9bd04?ui=en-us&rs=en-us&ad=us
13 - https://trustedsec.com/blog/specula-turning-outlook-into-a-c2-with-one-registry-change
14author: Tobias Michalski (Nextron Systems), David Bertho (@dbertho) & Eirik Sveen (@0xSV1), Storebrand
15date: 2021-06-09
16modified: 2024-08-07
17tags:
18 - attack.persistence
19 - attack.t1112
20logsource:
21 product: windows
22 category: registry_set
23detection:
24 selection:
25 TargetObject|contains|all:
26 - '\Software\Microsoft\Office\'
27 - '\Outlook\WebView\'
28 TargetObject|endswith: '\URL'
29 condition: selection
30falsepositives:
31 - Unknown
32level: high
References
Related rules
- CVE-2020-1048 Exploitation Attempt - Suspicious New Printer Ports - Registry
- FlowCloud Registry Markers
- OilRig APT Activity
- OilRig APT Registry Persistence
- OilRig APT Schedule Task Persistence - Security