Attachment: Malicious OneNote Commands
Scans for OneNote attachments that contain suspicious commands that may indicate malicious activity.
Sublime rule (View on GitHub)
1name: "Attachment: Malicious OneNote Commands"
2description: |
3 Scans for OneNote attachments that contain suspicious commands that may indicate malicious activity.
4references:
5 - "https://www.trustedsec.com/blog/new-attacks-old-tricks-how-onenote-malware-is-evolving/"
6 - "https://bazaar.abuse.ch/sample/aafc0ca9681c1f5c368b0f6da85b90e433f6d62fb34ed2e968e53f83981a800f"
7type: "rule"
8authors:
9 - twitter: "Kyle_Parrish_"
10 name: "Kyle Parrish"
11severity: "high"
12source: |
13 type.inbound
14 and any(attachments,
15 (.file_extension in~ ("one") or .file_extension in~ $file_extensions_common_archives)
16 and any(file.explode(.),
17 "onenote_file" in .flavors.yara
18 and any(.scan.strings.strings,
19 strings.ilike(.,
20 "*WshShell*",
21 "*ExecuteCmdAsync*",
22 "*CreateObject*",
23 "*Wscript.Shell*",
24 "*schtasks*",
25 "*CreateProcess*",
26 "*winmgmts*",
27 "*SetEnvironmentVariable*",
28 "*powershell*",
29 "*echo off*"
30 )
31 )
32 )
33 )
34attack_types:
35 - "Malware/Ransomware"
36tactics_and_techniques:
37 - "OneNote"
38 - "Scripting"
39detection_methods:
40 - "Archive analysis"
41 - "Content analysis"
42 - "File analysis"
43 - "YARA"
44id: "7319f0eb-a3c7-5320-a4ae-6fbf7952369e"