Detectionmediumtest

Potential Suspicious Browser Launch From Document Reader Process

Detects when a browser process or browser tab is launched from an application that handles document files such as Adobe, Microsoft Office, etc. And connects to a web application over http(s), this could indicate a possible phishing attempt.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Joseph KamauCreated Mon May 27Updated Tue Oct 071193d960-2369-499f-a158-7b50a31df682windows
Log Source
WindowsProcess Creation
ProductWindows← raw: windows
CategoryProcess Creation← raw: process_creation

Events generated when a new process is spawned on the system. Covers command-line arguments, parent/child relationships, and process metadata.

Detection Logic
Detection Logic3 selectors
detection:
    selection:
        ParentImage|contains:
            - 'Acrobat Reader'
            - 'Microsoft Office'
            - 'PDF Reader'
        Image|endswith:
            - '\brave.exe'
            - '\chrome.exe'
            - '\firefox.exe'
            - '\msedge.exe'
            - '\opera.exe'
            - '\maxthon.exe'
            - '\seamonkey.exe'
            - '\vivaldi.exe'
        CommandLine|contains: 'http'
    filter_main_microsoft_help:
        CommandLine|contains: 'https://go.microsoft.com/fwlink/'
    filter_optional_foxit:
        CommandLine|contains:
            - 'http://ad.foxitsoftware.com/adlog.php?'
            - 'https://globe-map.foxitservice.com/go.php?do=redirect'
    condition: selection and not 1 of filter_main_* and not 1 of filter_optional_*
False Positives

Unlikely in most cases, further investigation should be done in the commandline of the browser process to determine the context of the URL accessed.

MITRE ATT&CK
Rule Metadata
Rule ID
1193d960-2369-499f-a158-7b50a31df682
Status
test
Level
medium
Type
Detection
Created
Mon May 27
Modified
Tue Oct 07
Path
rules/windows/process_creation/proc_creation_win_susp_browser_launch_from_document_reader_process.yml
Raw Tags
attack.executionattack.t1204.002
View on GitHub