Potential Persistence Via Outlook Today Page

Detects potential persistence activity via outlook today page. An attacker can set a custom page to execute arbitrary code and link to it via the registry values "URL" and "UserDefinedUrl".

Sigma rule (View on GitHub)

 1title: Potential Persistence Via Outlook Today Page
 2id: 487bb375-12ef-41f6-baae-c6a1572b4dd1
 3related:
 4    - id: ddd171b5-2cc6-4975-9e78-f0eccd08cc76
 5      type: similar
 6status: test
 7description: |
 8    Detects potential persistence activity via outlook today page.
 9    An attacker can set a custom page to execute arbitrary code and link to it via the registry values "URL" and "UserDefinedUrl".    
10references:
11    - https://speakerdeck.com/heirhabarov/hunting-for-persistence-via-microsoft-exchange-server-or-outlook?slide=74
12    - https://trustedsec.com/blog/specula-turning-outlook-into-a-c2-with-one-registry-change
13author: Tobias Michalski (Nextron Systems), David Bertho (@dbertho) & Eirik Sveen (@0xSV1), Storebrand
14date: 2021-06-10
15modified: 2024-08-07
16tags:
17    - attack.persistence
18    - attack.t1112
19logsource:
20    product: windows
21    category: registry_set
22detection:
23    selection_main:
24        TargetObject|contains|all:
25            - 'Software\Microsoft\Office\'
26            - '\Outlook\Today\'
27    selection_value_stamp:
28        TargetObject|endswith: '\Stamp'
29        Details: 'DWORD (0x00000001)'
30    selection_value_url:
31        TargetObject|endswith:
32            - '\URL'
33            - '\UserDefinedUrl'
34    filter_main_office:
35        Image|startswith:
36            - 'C:\Program Files\Common Files\Microsoft Shared\ClickToRun\'
37            - 'C:\Program Files\Common Files\Microsoft Shared\ClickToRun\Updates\'
38        Image|endswith: '\OfficeClickToRun.exe'
39    condition: selection_main and 1 of selection_value_* and not 1 of filter_main_*
40falsepositives:
41    - Unknown
42level: high

References

Related rules

to-top