Saturday, November 12, 2016

Analyze Macro Code from Malicious Documents

Microsoft office is something i guess everybody uses it and knows about it and you are a regular computer user then to somewhat extent you are definitely going to use Microsoft office or any other variant, so in this particular post we want to show you how malicious documents can be analyzed in order to find malicious macro code. so let's start it.

Malicious Samples


Macro Code is usually written in vba programming for more on it just see the wiki. here i have some malicious sample files which you can get by asking me in comments. they contain some macro code which basically just pings localhost and opens notepad.exe on a windows host.


vba programming
malware asking for enable macro




so how do we about finding what lies in the code? go to excel options and then check the developer tab.

vba programming
show developer tab


so it'll show us the developer tab, in developer tab click on visual basic and it should show you the vba macro code.

vba programming
macro code

now we can look at it and find what it's doing but what if we get kind of a document which cannot show us macro then how we identify it. here is a little python code i wrote to extract macro and some analysis options from a specific file.



and below is the result.

vba programming
extract_vba

Boom, we can see what the macrocode is and analysis shows what exactly its going to do, okay let's see another approach. if you have installed clamav it contains a package sigtool which can extract macro code as well from any binary. yes binary :) see below screen shot.


vba programming
sigtool --vba Binary

That's it hope you've enjoyed it. Please see the video if you were lost somewhere.

VIDEO:


No comments:

Post a Comment