Process Path containing Excel.exe with image/module dll load of msimsg.dll might prove to be an interesting way to detect this per my twitter post.
https://twitter.com/luke92881/status/1446147033388273675
There are of course other DLLs such as msi.dll and msimtf.dll (and others), however the msimsg.dll is the first one that appears to be an anomoly baselines I've run.
Small List of samples with this behavior:
https://app.any.run/tasks/74de3a74-f590-4bd7-aca6-c8fa7cd435fe/
https://app.any.run/tasks/9175439d-8d2c-4fa6-bcd5-a24017b97656/
https://app.any.run/tasks/134bee05-bb64-4647-8845-58b12cd31dba/
UPDATE: 10/16/2021
Interesting Anti-Sandbox FUD post on Twitter: Initial Detection Opportunity in EDR.
https://twitter.com/bigmacjpg/status/1448325423549591561
In my baselining, this seems to be odd behavior for various process paths, including Excel, WinWord, \users\ and more. This could be an intersting indicator for catching something early. I do not have any false positives to share at this time.
Process Path contains \office or \users\ AND Registry Key Path contains ACTIVECOMPUTERNAME should be a decent generic enough rule to look for this behavior.
If anyone notices any other interesting things to key in on, let me know. Happy Hunting!
Sandbox Links:
https://app.any.run/tasks/447b3ceb-c3c4-482e-8037-065d8c62669d/
https://app.any.run/tasks/a0a7b338-d362-47ab-a0ee-60feefa910a4/
HKEY_LOCAL_MACHINE\SYSTEM\CONTROLSET001\CONTROL\COMPUTERNAME\ACTIVECOMPUTERNAME
Comments
Post a Comment