Potential Maldoc Execution Chain Observed

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


Detect the aftermath of a successfully delivered and executed maldoc (Microsoft Office). Indicates an Office document was opened from an email or download/link, spawned a suspicious execution, and attempted to execute code via common Windows binaries.

Attribute Value
Type Hunting Query
Solution Cyborg Security HUNTER
ID b194088b-c846-4c72-a4b7-933627878db4
Tactics DefenseEvasion, Execution, InitialAccess
Techniques T1059, T1059.001, T1059.004, T1059.005, T1059.006, T1059.007, T1218.011, T1566.001, T1566.002
Required Connectors SecurityEvent
Source View on GitHub

Tables Used

This content item queries data from the following tables:

Table Transformations Ingestion API Lake-Only
SecurityEvent ?

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Hunting Queries · Back to Cyborg Security HUNTER