Skip to content

Commit 543f6b7

Browse files
[PR #3472] added rule: Attachment: DOCX with hyperlink targeting recipient address
1 parent 3925005 commit 543f6b7

File tree

1 file changed

+43
-0
lines changed

1 file changed

+43
-0
lines changed
Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
name: "Attachment: DOCX with hyperlink targeting recipient address"
2+
description: "Detects DOCX attachments containing hyperlinks with anchor references that match recipient email addresses from suspicious or malicious senders. This technique is commonly used to personalize malicious documents and evade detection."
3+
type: "rule"
4+
severity: "medium"
5+
source: |
6+
type.inbound
7+
and any(filter(attachments, .file_extension == 'docx'),
8+
any(filter(file.explode(.), .file_name == 'word/document.xml'),
9+
any(regex.iextract(.scan.strings.raw,
10+
'<w:hyperlink[^\>]*w:anchor="(?P<email_address>[^\"]+)"'
11+
),
12+
.named_groups["email_address"] in map(recipients.to,
13+
.email.email
14+
)
15+
)
16+
)
17+
)
18+
and (
19+
(
20+
profile.by_sender().prevalence in ("new", "outlier")
21+
and not profile.by_sender().solicited
22+
)
23+
or (
24+
profile.by_sender().any_messages_malicious_or_spam
25+
and not profile.by_sender().any_messages_benign
26+
)
27+
)
28+
29+
attack_types:
30+
- "Credential Phishing"
31+
- "Malware/Ransomware"
32+
tactics_and_techniques:
33+
- "Evasion"
34+
- "Social engineering"
35+
detection_methods:
36+
- "File analysis"
37+
- "Archive analysis"
38+
- "XML analysis"
39+
- "Sender analysis"
40+
id: "d2ff2c1e-2994-5ca2-8bf3-508213e11364"
41+
og_id: "9ec8fa49-bda9-5e8f-876f-1e53a46d83ca"
42+
testing_pr: 3472
43+
testing_sha: abd489f7280be8b30f9cfcc0ef3d015749ce8fd3

0 commit comments

Comments
 (0)