title: Execution in Outlook Temp Folder id: a018fdc3-46a3-44e5-9afb-2cd4af1d4b39 status: experimental description: Detects a suspicious program execution in Outlook temp folder author: Florian Roth date: 2019/10/01 tags: - attack.initial_access - attack.t1566.001 - attack.t1193 #an old one logsource: category: process_creation product: windows detection: selection: Image: '*\Temporary Internet Files\Content.Outlook\\*' condition: selection fields: - CommandLine - ParentCommandLine falsepositives: - Unknown level: high