-
Notifications
You must be signed in to change notification settings - Fork 6
/
Copy pathattachment_microsoft_branded_html.yml
57 lines (55 loc) · 1.77 KB
/
attachment_microsoft_branded_html.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
name: "Attachment: Microsoft-branded HTML File (Unsolicited)"
description: |
A unsolicited attachment with a HTML file format, sent by a first time sender or known-bad source, that includes Microsoft branding. Often leveraged for malware delivery, e.g. Bumblebee.
type: "rule"
severity: "medium"
authors:
- twitter: "delivr_to"
references:
- https://delivr.to/payloads?id=37541776-bc8e-4af7-a54e-de97052ec092
- https://twitter.com/0xtoxin/status/1722915203040354656
source: |
type.inbound
and (
(
not profile.by_sender_email().solicited
and profile.by_sender_email().prevalence in ("new", "outlier")
)
or (
profile.by_sender_email().any_messages_malicious_or_spam
and not profile.by_sender_email().any_false_positives
)
or sender.email.domain.domain == "delivrto.me"
)
and any(attachments,
// HTML file format
(
regex.imatch(.file_extension, '^[sdx]{0,1}ht[ml]{0,2}') or
.file_type == "html"
)
// Some MS branding present
and 1 of (
// HTML screenshot indicates MS branding
any(ml.logo_detect(file.html_screenshot(.)).brands,
strings.starts_with(.name, "Microsoft")
),
// HTML content indicates MS branding
any(ml.logo_detect(.).brands,
strings.starts_with(.name, "Microsoft")
),
// HTML page title is MS related
any(file.explode(.),
strings.ilike(.scan.html.title,
"*Microsoft*",
"*Teams*",
"*One*Drive*",
"*Share*Point*",
"*Office*365*"
)
)
)
)
tags:
- "Suspicious Attachment"
- "Brand Impersonation"
- "Bumblebee"