Skip to content

Add rule: Office Macro Phishing Initial Access detection #5411

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 2 commits into
base: master
Choose a base branch
from

Conversation

arjun-tarakesh
Copy link

@arjun-tarakesh arjun-tarakesh commented May 10, 2025

Summary of the Pull Request

Added a Sigma rule that detects Microsoft Office applications (such as Word, Excel, PowerPoint) launched with suspicious command-line arguments. These arguments (e.g., /m, .dotm, AutoOpen) are frequently associated with auto-executing macros often leveraged in phishing campaigns for initial access. This detection aligns with MITRE ATT&CK technique T1566.001.

Changelog

new: Suspicious Office Macro Execution via CLI Arguments

Example Log Event

{
  "UtcTime": "2025-05-11T10:42:00.000Z",
  "EventID": 1,
  "Image": "C:\\Program Files\\Microsoft Office\\root\\Office16\\WINWORD.EXE",
  "CommandLine": "\"C:\\Program Files\\Microsoft Office\\root\\Office16\\WINWORD.EXE\" /m AutoOpen /q",
  "ParentImage": "C:\\Windows\\explorer.exe",
  "OriginalFileName": "WINWORD.EXE",
  "User": "CORP\\target.user",
  "ProcessId": 5432,
  "ParentProcessId": 567,
  "LogonId": "0x3e7",
  "IntegrityLevel": "Medium",
  "Hashes": "SHA256=abcdef123456...",
  "Company": "Microsoft Corporation",
  "Description": "Microsoft Word"
}

Fixed Issues

SigmaHQ Rule Creation Conventions

  • Rule file follows naming conventions: proc_creation_win_macro_cli.yml

  • Structure includes id, description, references, and appropriate ATT&CK tags

  • Tags: attack.t1566.001, attack.t1059.001, attack.execution

  • MITRE ATT&CK T1566.001 (Phishing: Spearphishing Attachment) is the main detection focus

  • References included to support technique

  • Rule status is set to experimental

  • Detection logic uses CommandLine|contains and ParentImage|endswith on Office apps

@github-actions github-actions bot added Rules Windows Pull request add/update windows related rules labels May 10, 2025
Copy link
Contributor

@github-actions github-actions bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Welcome @arjun-tarakesh 👋

It looks like this is your first pull request on the Sigma rules repository!

Please make sure to read the SigmaHQ conventions document to make sure your contribution is adhering to best practices and has all the necessary elements in place for a successful approval.

Thanks again, and welcome to the Sigma community! 😃

@frack113
Copy link
Member

@arjun-tarakesh
Copy link
Author

Member

Hi @frack113,

Thank you so much for the helpful insight — and apologies for the duplication earlier. I'm a first-time contributor and still getting familiar with the repo structure and search workflows.

Based on your feedback, I’ve updated my rule to focus on suspicious command-line arguments used to launch Office applications (like /m, .dotm, AutoOpen), which may indicate macro-based execution triggered via phishing.

I used the Sigma search engine to double-check and couldn't find an existing rule that specifically detects Office command-line macro execution patterns — but please let me know if I missed anything. Would you mind taking a look and confirming if the update now looks okay?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Duplicate Rules Windows Pull request add/update windows related rules
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants