EXPLORE
← Back to Explore
sigmahighHunting

Potential Excel.EXE DCOM Lateral Movement Via ActivateMicrosoftApp

Detects suspicious child processes of Excel which could be an indicator of lateral movement leveraging the "ActivateMicrosoftApp" Excel DCOM object.

MITRE ATT&CK

lateral-movement

Detection Query

selection_parent:
  ParentImage|endswith: \excel.exe
selection_child:
  - OriginalFileName:
      - foxprow.exe
      - schdplus.exe
      - winproj.exe
  - Image|endswith:
      - \foxprow.exe
      - \schdplus.exe
      - \winproj.exe
condition: all of selection_*

Author

Aaron Stratton

Created

2023-11-13

Data Sources

windowsProcess Creation Events

Platforms

windows

Tags

attack.t1021.003attack.lateral-movement
Raw Content
title: Potential Excel.EXE DCOM Lateral Movement Via ActivateMicrosoftApp
id: 551d9c1f-816c-445b-a7a6-7a3864720d60
status: test
description: |
    Detects suspicious child processes of Excel which could be an indicator of lateral movement leveraging the "ActivateMicrosoftApp" Excel DCOM object.
references:
    - https://posts.specterops.io/lateral-movement-abuse-the-power-of-dcom-excel-application-3c016d0d9922
    - https://github.com/grayhatkiller/SharpExShell
    - https://learn.microsoft.com/en-us/office/vba/api/excel.xlmsapplication
author: Aaron Stratton
date: 2023-11-13
tags:
    - attack.t1021.003
    - attack.lateral-movement
logsource:
    category: process_creation
    product: windows
detection:
    selection_parent:
        ParentImage|endswith: '\excel.exe'
    selection_child:
        - OriginalFileName:
          - 'foxprow.exe'
          - 'schdplus.exe'
          - 'winproj.exe'
        - Image|endswith:
          - '\foxprow.exe'
          - '\schdplus.exe'
          - '\winproj.exe'
    condition: all of selection_*
falsepositives:
    - Unknown
level: high