Synopsis
Activation Period |
14 Days |
Training Period |
30 Days |
Test Period |
N/A (single event) |
Deduplication Period |
1 Day |
Required Data |
|
Detection Modules |
|
Detector Tags |
|
ATT&CK Tactic |
|
ATT&CK Technique |
|
Severity |
Low |
Description
An Office process was executed with LOLBIN-like command-line arguments. This behavior is exhibited in the VBA-RunPE tool that executes executables from the memory of Word/Excel/PowerPoint.
Attacker's Goals
Execute arbitrary code or run malicious applications undetected.
Investigative actions
Check the file that spawns the office application, and search for macros, formulas, or scripts.
Variations
Masqueraded office process spawned with suspicious command-line argumentsPowerPoint process accesses a suspicious PPAM file