Attachment: Invoice and W-9 PDFs with suspicious creators

Detects messages containing two PDF attachments where one has invoice-related naming patterns and another contains W-9 tax form indicators, with at least one PDF generated by Chrome or wkhtmltopdf tools, commonly used in business email compromise attacks targeting financial processes.

Sublime rule (View on GitHub)

 1name: "Attachment: Invoice and W-9 PDFs with suspicious creators"
 2description: "Detects messages containing two PDF attachments where one has invoice-related naming patterns and another contains W-9 tax form indicators, with at least one PDF generated by Chrome or wkhtmltopdf tools, commonly used in business email compromise attacks targeting financial processes."
 3type: "rule"
 4severity: "high"
 5source: |
 6  type.inbound
 7  and length(distinct(attachments, .sha1)) == 2
 8  and length(filter(attachments, .file_type == "pdf")) == 2
 9  // either of them are chrome/wkhtmltopdf
10  and any(filter(attachments, .file_type == "pdf"),
11          beta.parse_exif(.).creator == "Chromium"
12          or strings.icontains(beta.parse_exif(.).creator, "wkhtmltopdf")
13          or strings.icontains(beta.parse_exif(.).creator, "HeadlessChrome")
14  )
15  and any(attachments,
16          strings.istarts_with(.file_name, 'lnv')
17          or strings.istarts_with(.file_name, 'inv-')
18          or strings.istarts_with(.file_name, "invoice_")
19          or regex.contains(.file_name, '^Invoice\s\d{8,9}')
20          or regex.contains(.file_name, '^INV[0-9]{7}')
21          or regex.contains(.file_name, '^INV#[0-9]{12}')
22          or strings.icontains(beta.ocr(.).text, "Executive Business Coaching")
23          or strings.icontains(beta.ocr(.).text, "Executive Coaching")
24          or strings.icontains(beta.ocr(.).text, "Professional Services")
25          or strings.icontains(beta.ocr(.).text, "Business Systems Integration")
26          or strings.icontains(beta.ocr(.).text, "Consulting & Advisory")
27          or strings.icontains(beta.ocr(.).text, "Zoomlnfo")
28  )
29  and any(attachments,
30          .file_name == ".pdf"
31          or regex.contains(beta.ocr(.).text, 'W[=-]9')
32          or regex.icontains(.file_name, 'w-?9')
33  )
34  and not (
35    sender.email.domain.root_domain in ('intuit.com')
36    and coalesce(headers.auth_summary.dmarc.pass, false)
37  )  
38attack_types:
39  - "BEC/Fraud"
40tactics_and_techniques:
41  - "PDF"
42  - "Social engineering"
43  - "Impersonation: Brand"
44detection_methods:
45  - "File analysis"
46  - "Optical Character Recognition"
47  - "Exif analysis"
48  - "Content analysis"
49id: "305d6e32-4104-5007-a209-ee4686081de2"
to-top