Tricks the target into enabling content (macros) with fake messages. Once enabled, uses macros to reduce the risk of suspision from target user via verious methods.
Templates are available with a example macro code or without (macro code for each template can be seen in screenshots below):
- With macros
- .xlsm
- .docm
- Without macros
- .xlsx
- .docx
- Enforce security settings for macros in all Office applications
- Official Microsoft documentation: Plan security settings for VBA macros in Office 2016
- My recommendation is to enforce Disable all except digitally signed macros and Block macros from running in Office files from the Internet, even partly deploying such policy reduces risk.
- Address risk of certain Office extensions used for macro documents
- Some extensions
- .docm=Word.DocumentMacroEnabled.12
- .dotm=Word.TemplateMacroEnabled.12
- .xlam=Excel.AddInMacroEnabled
- .xlm=Excel.Macrosheet
- .xlsb=Excel.SheetBinaryMacroEnabled.12
- .xlsm=Excel.SheetMacroEnabled.12
- .xltm=Excel.TemplateMacroEnabled
- .potm=PowerPoint.TemplateMacroEnabled.12
- .ppsm=PowerPoint.SlideShowMacroEnabled.12
- .pptm=PowerPoint.ShowMacroEnabled.12
- .sldm=PowerPoint.SlideMacroEnabled.12
- Block in spam filter, mailflow rules, EDR/AV
- Remove default file associations, or associate with Notepad
- Check current associations with cmd.exe:
assoc | findstr /i "word excel powerpoint"
- Check current associations with cmd.exe:
- Add to detection rules
- Sysmon - Event ID 11: File Creation Events, Event ID 23: FileDelete
- Be aware that regular Office extensions may also contain macros, these include (but not limited to): .xls, .doc, .rtf, .wbk
- Some extensions
- Enforce attack surface reduction rules, here are some which relates directly to Office
- Block all Office applications from creating child processes
- Block Office applications from creating executable content
- Block Office applications from injecting code into other processes
- Block Office communication application from creating child processes
- Block Win32 API calls from Office macros
- Create user awareness
- The Danish sikkerdigital.dk has provides user-focuced awareness material in both English and Danish at headline "Medarbejderpakken".
- More information on macros and misconceptions: Office Macros – file extensions, file format (content), and a few handling stereotypes…
- Saving as 97-2003 document (eg. .xls) gives an old-style icon without the small script icon that you will see for e.g. .xlsm.
- Clear unwanted meta-data via Info -> Check for Issues -> Inspect Document
- Add wanted meta-data to reduce risk of suspicion
Hide the sheet containing the fake message, show a legitimate-looking sheet, and opens calc.exe
- Add macro code to 'ThisWorkbook' function 'WorkbookOpen()' (Developer tab -> Visual Basic).
- Fill 'Sheet1' with legitimate-looking data
- Hide 'Sheet1'
- Protect sheet 'Excel version mismatch'. Uncheck 'Select (un)locked cells'
If you change sheet names, you must do so too in the code that switches sheets!
Fake error message popup, which when closed opens notepad.exe
- Add macro code to 'ThisDocument' function 'MessageClosed()' (Developer tab -> Visual Basic).
- Edit popup failure code to a unique identifier. Can be used to e.g. verify that the target enabled macros.
- Review -> Restrict Editing: Allow only 'Filling in forms'.