Attachment with VBA macros from employee impersonation (unsolicited)

Attachment contains a VBA macro from a sender your organization has never sent an email to.

Sender is using a display name that matches the display name of someone in your organization.

VBA macros are a common phishing technique used to deploy malware.

Sublime rule (View on GitHub)

 1name: "Attachment with VBA macros from employee impersonation (unsolicited)"
 2description: |
 3  Attachment contains a VBA macro from a sender your organization has never sent an email to.
 4
 5  Sender is using a display name that matches the display name of someone in 
 6  your organization.
 7
 8  VBA macros are a common phishing technique used to deploy malware.  
 9references:
10  - "https://threatpost.com/microsoft-outlook-users-targeted-by-gamaredons-new-vba-macro/156484/"
11type: "rule"
12severity: "high"
13source: |
14  type.inbound
15  and sender.display_name in $org_display_names
16  and any(attachments,
17          (
18            .file_extension in~ $file_extensions_macros
19            or .file_extension in~ $file_extensions_common_archives
20          )
21          and file.oletools(.).indicators.vba_macros.exists
22  )
23  and (
24    (
25      sender.email.domain.root_domain in $free_email_providers
26      and sender.email.email not in $recipient_emails
27    )
28    or (
29      sender.email.domain.root_domain not in $free_email_providers
30      and sender.email.domain.domain not in $recipient_domains
31    )
32  )  
33attack_types:
34  - "Malware/Ransomware"
35tactics_and_techniques:
36  - "Impersonation: Employee"
37  - "Macros"
38  - "Social engineering"
39detection_methods:
40  - "Archive analysis"
41  - "File analysis"
42  - "Macro analysis"
43  - "Sender analysis"
44id: "9b262123-9010-5245-89a7-9ebd75333b2a"
to-top