Windows password protected ZIP file opened with suspicious email attachments
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.Goal
Detects users opening password-protected ZIP files that have been received as email attachments.
Strategy
This rule monitors Windows event ID 5379
for shell extension handler operations involving ZIP folders in Outlook’s temporary directories. It tracks when @Event.EventData.Data.TargetName
contains any of the following strings in the path: Microsoft_Windows_Shell_ZipFolder
, Content.Outlook
, Files
, or Temporary
.
Password-protected archives bypass email security scanning capabilities, allowing malicious content to reach endpoints without inspection. When extracted, this content may execute and compromise systems.
Triage & Response
- Examine the source email and sender details on
{{host}}
to determine legitimacy. - Confirm if the password-protected attachment was expected from a trusted source.
- Analyze extracted file contents and subsequent process executions.
- Check for network connections established after the archive extraction.
- Identify similar password-protected attachments sent to other users.
- Block the sender domain if determined to be malicious.
- Isolate
{{host}}
if malicious content is confirmed.