Attachment: Office Document with VSTO Add-in
Recursively scans files and archives to detect Office documents with VSTO Add-ins.
Sublime rule (View on GitHub)
1name: "Attachment: Office Document with VSTO Add-in"
2description: |
3 Recursively scans files and archives to detect Office documents with VSTO Add-ins.
4type: "rule"
5references:
6 - "https://medium.com/@airlockdigital/make-phishing-great-again-vsto-office-files-are-the-new-macro-nightmare-e09fcadef010"
7severity: "high"
8authors:
9 - twitter: "vector_sec"
10source: |
11 type.inbound
12 and any(attachments,
13 (
14 .file_extension in~ $file_extensions_macros
15 or .file_extension in~ $file_extensions_common_archives
16 )
17 and any(file.explode(.),
18 .file_extension in~ (
19 "doc",
20 "docm",
21 "docx",
22 "dot",
23 "dotm",
24 "xls",
25 "xlsx",
26 "xlsm",
27 "xlm",
28 "xlsb",
29 "xlt",
30 "xltm",
31 "ppt",
32 "pptx",
33 "pptm",
34 "ppsm"
35 )
36 and any(.scan.exiftool.fields,
37 .key == "Tag_AssemblyLocation" and strings.ilike(.value, "*.vsto*")
38 and not strings.ilike(.value, 'C:\Program Files*')
39 )
40 )
41 )
42attack_types:
43 - "Malware/Ransomware"
44tactics_and_techniques:
45 - "Scripting"
46detection_methods:
47 - "Archive analysis"
48 - "Content analysis"
49 - "Exif analysis"
50 - "File analysis"
51 - "Sender analysis"
52 - "URL analysis"
53id: "27afa730-6dd5-58ec-9deb-ed5170de210d"