Some people believe that MS Office Macros are the only way to run malicious code in office files, so files without them are safe.
I also heard ".docx are just a bunch of XML, so it can't do anything bad."
Both statements are wrong. We take a look at two techniques that load malware without Macros in the following video. I also provide a checklist that analysts can use to make sure a file is really clean.
Samples are available on Trainings Samples
For those of you who just want the checklist, here it is. It is designed such that even new malware loading techniques shouldn't be missed that easily:
I also heard ".docx are just a bunch of XML, so it can't do anything bad."
Both statements are wrong. We take a look at two techniques that load malware without Macros in the following video. I also provide a checklist that analysts can use to make sure a file is really clean.
Samples are available on Trainings Samples
For those of you who just want the checklist, here it is. It is designed such that even new malware loading techniques shouldn't be missed that easily:
- Open in MS Office and check content for social engineering and phishing, often it tells you what to enable or where to click
- ️Does the sample show interesting behavior in a sandbox?
- ️Is the metadata consistent? If it looks suspicious, take extra time to analyze it
- ️Extract IPs, URLs, emails and other plaintext indicators, e.g., using regex or binary refinery
- ️For non-text formats: Roughly check the file in a hex editor and create a strings listing, watch out for embedded files and anything that stands out
- ️Scan with a Yara rule set, start with Yara-Forge if you don't have your own, add detections for new techniques there
- ️Check for Macros, VBA Stomping, VSTO Add-ins, External Templates


