EXPLORE
← Back to Explore
sigmahighHunting

Suspicious Microsoft Office Child Process - MacOS

Detects suspicious child processes spawning from microsoft office suite applications such as word or excel. This could indicates malicious macro execution

MITRE ATT&CK

executionpersistence

Detection Query

selection:
  ParentImage|contains:
    - Microsoft Word
    - Microsoft Excel
    - Microsoft PowerPoint
    - Microsoft OneNote
  Image|endswith:
    - /bash
    - /curl
    - /dash
    - /fish
    - /osacompile
    - /osascript
    - /sh
    - /zsh
    - /python
    - /python3
    - /wget
condition: selection

Author

Sohan G (D4rkCiph3r)

Created

2023-01-31

Data Sources

macosProcess Creation Events

Platforms

macos

Tags

attack.executionattack.persistenceattack.t1059.002attack.t1137.002attack.t1204.002
Raw Content
title: Suspicious Microsoft Office Child Process - MacOS
id: 69483748-1525-4a6c-95ca-90dc8d431b68
status: test
description: Detects suspicious child processes spawning from microsoft office suite applications such as word or excel. This could indicates malicious macro execution
references:
    - https://redcanary.com/blog/applescript/
    - https://objective-see.org/blog/blog_0x4B.html
author: Sohan G (D4rkCiph3r)
date: 2023-01-31
modified: 2023-02-04
tags:
    - attack.execution
    - attack.persistence
    - attack.t1059.002
    - attack.t1137.002
    - attack.t1204.002
logsource:
    product: macos
    category: process_creation
detection:
    selection:
        ParentImage|contains:
            - 'Microsoft Word'
            - 'Microsoft Excel'
            - 'Microsoft PowerPoint'
            - 'Microsoft OneNote'
        Image|endswith:
            - '/bash'
            - '/curl'
            - '/dash'
            - '/fish'
            - '/osacompile'
            - '/osascript'
            - '/sh'
            - '/zsh'
            - '/python'
            - '/python3'
            - '/wget'
    condition: selection
falsepositives:
    - Unknown
level: high