Potential Arbitrary File Download Using Office Application (4ae3e30b-b03f-43aa-87e3-b622f4048eed)
Detects potential arbitrary file download using a Microsoft Office application
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
Indirect Command Execution - T1202 (3b0e52ce-517a-4614-a523-1bd5deef6c5e) | Attack Pattern | Potential Arbitrary File Download Using Office Application (4ae3e30b-b03f-43aa-87e3-b622f4048eed) | Sigma-Rules | 1 |