Detectionmediumtest
New Outlook Macro Created
Detects the creation of a macro file for Outlook.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Log Source
WindowsFile Event
ProductWindows← raw: windows
CategoryFile Event← raw: file_event
Events for file system activity including creation, modification, and deletion.
Detection Logic
Detection Logic1 selector
detection:
selection:
Image|endswith: '\outlook.exe'
TargetFilename|endswith: '\Microsoft\Outlook\VbaProject.OTM'
condition: selectionFalse Positives
User genuinely creates a VB Macro for their email
References
MITRE ATT&CK
Rule Metadata
Rule ID
8c31f563-f9a7-450c-bfa8-35f8f32f1f61
Status
test
Level
medium
Type
Detection
Created
Mon Apr 05
Modified
Wed Feb 08
Author
Path
rules/windows/file/file_event/file_event_win_office_outlook_macro_creation.yml
Raw Tags
attack.privilege-escalationattack.persistenceattack.command-and-controlattack.t1137attack.t1008attack.t1546