Suspicious New Instance Of An Office COM Object

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects an svchost process spawning an instance of an office application. This happens when the initial word application creates an instance of one of the Office COM objects such as 'Word.Application', 'Excel.Application', etc. This can be used by malicious actors to create malicious Office documents with macros on the fly. (See vba2clr project in the references)

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "Process started" AND PARENTPROCESSNAME endswith "\svchost.exe" AND PROCESSNAME endswith "\eqnedt32.exe,\excel.exe,\msaccess.exe,\mspub.exe,\powerpnt.exe,\visio.exe,\winword.exe" select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Windows

Author

Nasreddine Bencherchali (Nextron Systems)