Detection rules › Splunk

Windows Spearphishing Attachment Connect To None MS Office Domain

Author
Teoderick Contreras, Splunk
Source
upstream

The following analytic identifies suspicious Office documents that connect to non-Microsoft Office domains. It leverages Sysmon EventCode 22 to detect processes like winword.exe or excel.exe making DNS queries to domains outside of *.office.com or *.office.net. This activity is significant as it may indicate a spearphishing attempt using malicious documents to download or connect to harmful content. If confirmed malicious, this could lead to unauthorized data access, malware infection, or further network compromise.

MITRE ATT&CK coverage

TacticTechniques
Initial AccessT1566.001 Phishing: Spearphishing Attachment

Event coverage

ProviderEvent IDTitle
Sysmon22DNSEvent (DNS query)

Stages and Predicates

Stage 1: search

search NOT QueryName IN ("*.office.com", "*.office.net") EventCode=22 Image IN ("*\\excel.exe", "*\\msaccess.exe", "*\\mspub.exe", "*\\onenote.exe", "*\\onenoteim.exe", "*\\onenotem.exe", "*\\onenoteviewer.exe", "*\\powerpnt.exe", "*\\visio.exe", "*\\winword.exe", "*\\wordpad.exe", "*\\wordview.exe")

Stage 2: stats

stats BY answer, answer_count, dvc, process_exec, process_guid, process_name, query, query_count, reply_code_id, signature, signature_id, src, user_id, vendor_product, QueryName, QueryResults, QueryStatus

Stage 3: search

search

Stage 4: search

search

Stage 5: search

search `macro`

Exclusions

Top-level NOT(...) conjuncts — predicates this rule actively suppresses.

StageFieldKindExcluded values
1QueryNamein"*.office.com", "*.office.net"

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
EventCodeeq
  • 22 corpus 15 (splunk 15)
Imagein
  • "*\\excel.exe"
  • "*\\msaccess.exe"
  • "*\\mspub.exe"
  • "*\\onenote.exe"
  • "*\\onenoteim.exe"
  • "*\\onenotem.exe"
  • "*\\onenoteviewer.exe"
  • "*\\powerpnt.exe"
  • "*\\visio.exe"
  • "*\\winword.exe"
  • "*\\wordpad.exe"
  • "*\\wordview.exe"