From 4cc4df35d82e738c46d7c80cf3c010926e1dbcd1 Mon Sep 17 00:00:00 2001 From: frack113 Date: Wed, 21 Jul 2021 15:27:12 +0200 Subject: [PATCH] add powershell_suspicious_mail_acces.yml --- .../powershell_suspicious_mail_acces.yml | 27 +++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 rules/windows/powershell/powershell_suspicious_mail_acces.yml diff --git a/rules/windows/powershell/powershell_suspicious_mail_acces.yml b/rules/windows/powershell/powershell_suspicious_mail_acces.yml new file mode 100644 index 00000000..660c798a --- /dev/null +++ b/rules/windows/powershell/powershell_suspicious_mail_acces.yml @@ -0,0 +1,27 @@ +title: Powershell Local Email Collection +id: 2837e152-93c8-43d2-85ba-c3cd3c2ae614 +status: experimental +author: frack113 +date: 2021/07/21 +description: Adversaries may target user email on local systems to collect sensitive information. Files containing email data can be acquired from a user’s local system, such as Outlook storage or cache files. +references: + - https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1114.001/T1114.001.md +tags: + - attack.collection + - attack.t1114.001 +logsource: + product: windows + service: powershell + description: EnableScriptBlockLogging must be set to enable +detection: + selection: + EventID: 4104 + ScriptBlockText|contains: + - 'Get-Inbox.ps1' + - 'Microsoft.Office.Interop.Outlook' + - 'Microsoft.Office.Interop.Outlook.olDefaultFolders' + - '-comobject outlook.application' + condition: selection +falsepositives: + - Unknown +level: medium