Executable Written and Executed by Microsoft Office Applications¶
Identifies an executable file written by a Microsoft Office application where that same executable is later ran as it’s own process. This behavior can be indicative of suspicious activity possibly tied to macro objects or technologies used for command execution such as Dynamic Data Exchange (DDE).
MITRE ATT&CK™ Mapping¶
|techniques:||T1204 User Execution, T1173 Dynamic Data Exchange|
sequence with maxspan=3d [file where file_name == "*.exe" and process_name in ("winword.exe", "excel.exe", "powerpnt.exe")] by file_path [process where true] by process_path