diff --git a/detection-rules/attachment_html_smuggling_suspicious_onload.yml b/detection-rules/attachment_html_smuggling_suspicious_onload.yml new file mode 100644 index 00000000000..9e007fa74a1 --- /dev/null +++ b/detection-rules/attachment_html_smuggling_suspicious_onload.yml @@ -0,0 +1,39 @@ +name: "Attachment: HTML smuggling 'body onload' with high entropy and suspicious text" +description: | + Potential HTML Smuggling. This rule inspects HTML attachments that contain "body unload", high entropy, and suspicious text. +type: "rule" +severity: "high" +source: | + type.inbound + and any(attachments, + ( + .file_extension in~ ("html", "htm", "shtml", "dhtml", "xhtml") + or ( + .file_extension is null + and .file_type == "unknown" + and .content_type == "application/octet-stream" + ) + or .file_extension in~ $file_extensions_common_archives + or .file_type == "html" + or .content_type == "text/html" + ) + and any(file.explode(.), + .scan.entropy.entropy >= 5 + and any(.scan.strings.strings, strings.ilike(., "*body onload*")) + and any(.scan.strings.strings, regex.icontains(., 'data:image/.*;base64')) + and any(.scan.strings.strings, strings.ilike(., "*document pass*")) + ) + ) +attack_types: + - "Credential Phishing" + - "Malware/Ransomware" +tactics_and_techniques: + - "Evasion" + - "HTML smuggling" + - "Scripting" +detection_methods: + - "Archive analysis" + - "Content analysis" + - "File analysis" + - "HTML analysis" +id: "329ac12d-f74e-577c-936c-1db80ccf860e"