Detection rules › Sigma
Suspicious Microsoft Office Child Process
Detects a suspicious process spawning from one of the Microsoft Office suite products (Word, Excel, PowerPoint, Publisher, Visio, etc.)
MITRE ATT&CK coverage
| Tactic | Techniques |
|---|---|
| Execution | T1047 Windows Management Instrumentation, T1204.002 User Execution: Malicious File |
| Defense Evasion | T1218.010 System Binary Proxy Execution: Regsvr32 |
Event coverage
| Provider | Event ID | Title |
|---|---|---|
| Sysmon | 1 | Process creation |
Stages and Predicates
Stage 1: selection_parent
or:
ParentImage|endswith: '\EQNEDT32.EXE'
ParentImage|endswith: '\EXCEL.EXE'
ParentImage|endswith: '\MSACCESS.EXE'
ParentImage|endswith: '\MSPUB.exe'
ParentImage|endswith: '\ONENOTE.EXE'
ParentImage|endswith: '\POWERPNT.exe'
ParentImage|endswith: '\VISIO.exe'
ParentImage|endswith: '\WINWORD.EXE'
ParentImage|endswith: '\wordpad.exe'
ParentImage|endswith: '\wordview.exe'
Stage 2: 1 of selection_child_processes
or:
Image|endswith: '\AppVLP.exe'
Image|endswith: '\Microsoft.Workflow.Compiler.exe'
Image|endswith: '\bash.exe'
Image|endswith: '\bitsadmin.exe'
Image|endswith: '\certoc.exe'
Image|endswith: '\certutil.exe'
Image|endswith: '\cmd.exe'
Image|endswith: '\cmstp.exe'
Image|endswith: '\control.exe'
Image|endswith: '\cscript.exe'
Image|endswith: '\curl.exe'
Image|endswith: '\forfiles.exe'
Image|endswith: '\hh.exe'
Image|endswith: '\ieexec.exe'
Image|endswith: '\installutil.exe'
Image|endswith: '\javaw.exe'
Image|endswith: '\mftrace.exe'
Image|endswith: '\msbuild.exe'
Image|endswith: '\msdt.exe'
Image|endswith: '\mshta.exe'
Image|endswith: '\msidb.exe'
Image|endswith: '\msiexec.exe'
Image|endswith: '\msxsl.exe'
Image|endswith: '\odbcconf.exe'
Image|endswith: '\pcalua.exe'
Image|endswith: '\powershell.exe'
Image|endswith: '\pwsh.exe'
Image|endswith: '\regasm.exe'
Image|endswith: '\regsvcs.exe'
Image|endswith: '\regsvr32.exe'
Image|endswith: '\rundll32.exe'
Image|endswith: '\schtasks.exe'
Image|endswith: '\scrcons.exe'
Image|endswith: '\scriptrunner.exe'
Image|endswith: '\sh.exe'
Image|endswith: '\svchost.exe'
Image|endswith: '\verclsid.exe'
Image|endswith: '\wmic.exe'
Image|endswith: '\workfolders.exe'
Image|endswith: '\wscript.exe'
OriginalFileName: CMSTP.EXE
OriginalFileName: CertOC.exe
OriginalFileName: CertUtil.exe
OriginalFileName: Cmd.Exe
OriginalFileName: HH.exe
OriginalFileName: IEExec.exe
OriginalFileName: InstallUtil.exe
OriginalFileName: MSHTA.EXE
OriginalFileName: Microsoft.Workflow.Compiler.exe
OriginalFileName: Msxsl.exe
OriginalFileName: PowerShell.EXE
OriginalFileName: REGSVR32.exe
OriginalFileName: RUNDLL32.exe
OriginalFileName: RegAsm.exe
OriginalFileName: RegSvcs.exe
OriginalFileName: ScriptRunner.exe
OriginalFileName: WorkFolders.exe
OriginalFileName: bitsadmin.exe
OriginalFileName: cscript.exe
OriginalFileName: curl.exe
OriginalFileName: javaw.exe
OriginalFileName: msdt.exe
OriginalFileName: msiexec.exe
OriginalFileName: odbcconf.exe
OriginalFileName: pcalua.exe
OriginalFileName: schtasks.exe
OriginalFileName: wmic.exe
OriginalFileName: wscript.exe
Stage 3: 1 of selection_child_susp_paths
or:
Image|contains: '\AppData\'
Image|contains: '\ProgramData\'
Image|contains: '\Users\Public\'
Image|contains: '\Windows\System32\Tasks\'
Image|contains: '\Windows\Tasks\'
Image|contains: '\Windows\Temp\'
Indicators
Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.
| Field | Kind | Values |
|---|---|---|
Image | ends_with |
|
Image | match |
|
OriginalFileName | eq |
|
ParentImage | ends_with |
|