EXPLORE
← Back to Explore
sublimehighRule

Attachment: .csproj with suspicious commands

Attached .csproj file contains suspicious commands.

MITRE ATT&CK

defense-evasionexecution

Detection Query

type.inbound
and any(attachments,
        .file_extension == "csproj"
        and any(file.explode(.),
                (
                  (any(.scan.strings.strings, strings.contains(., 'DllImport')))
                  and (
                    any(.scan.strings.strings,
                        strings.icontains(., 'CreateProcess')
                    )
                  )
                )
        )
)

Data Sources

Email MessagesEmail HeadersEmail Attachments

Platforms

email

Tags

Suspicious attachment
Raw Content
name: "Attachment: .csproj with suspicious commands"
description: |
  Attached .csproj file contains suspicious commands.
references:
  - "https://delivr.to/payloads?id=9d80cf8d-fb68-40fb-8969-4b11f3a29c9f"
type: "rule"
severity: "high"
source: |
  type.inbound
  and any(attachments,
          .file_extension == "csproj"
          and any(file.explode(.),
                  (
                    (any(.scan.strings.strings, strings.contains(., 'DllImport')))
                    and (
                      any(.scan.strings.strings,
                          strings.icontains(., 'CreateProcess')
                      )
                    )
                  )
          )
  )
tags: 
  - "Suspicious attachment"
attack_types:
  - "Malware/Ransomware"
tactics_and_techniques:
  - "Evasion"
  - "Scripting"
detection_methods:
  - "File analysis"
id: "fe45b81d-43df-52fc-9bf8-79824819fb51"