Attachment: Encrypted Microsoft Office file (unsolicited)
Encrypted OLE2 (eg Microsoft Office) attachment from an unsolicited sender. Attachment encryption is a common technique used to bypass malware scanning products. Use if receiving encrypted attachments is not normal behavior in your environment.
Sublime rule (View on GitHub)
1name: "Attachment: Encrypted Microsoft Office file (unsolicited)"
2description: |
3 Encrypted OLE2 (eg Microsoft Office) attachment from an unsolicited sender. Attachment encryption is a common technique used to bypass malware scanning products.
4 Use if receiving encrypted attachments is not normal behavior in your environment.
5references:
6 - "https://www.cyren.com/blog/articles/anatomy-of-an-attack-password-protected-files-attached-to-emails"
7type: "rule"
8severity: "high"
9source: |
10 type.inbound
11 and any(attachments,
12 .file_extension in~ $file_extensions_macros
13 and file.oletools(.).indicators.encryption.exists
14 )
15 and (
16 (
17 sender.email.domain.root_domain in $free_email_providers
18 and sender.email.email not in $recipient_emails
19 )
20 or (
21 sender.email.domain.root_domain not in $free_email_providers
22 and sender.email.domain.domain not in $recipient_domains
23 )
24 )
25attack_types:
26 - "Malware/Ransomware"
27tactics_and_techniques:
28 - "Encryption"
29 - "Macros"
30 - "Scripting"
31detection_methods:
32 - "Archive analysis"
33 - "File analysis"
34 - "OLE analysis"
35 - "Sender analysis"
36id: "1e47e953-576c-5ba9-b84e-b72a1a89de87"