<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Macro — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/macro/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/macro/feed.xml" rel="self" type="application/rss+xml"/><item><title>MS Office Macro Security Registry Modifications</title><link>https://feed.craftedsignal.io/briefs/2024-01-office-macro-security-regmod/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-office-macro-security-regmod/</guid><description>Attackers may modify Microsoft Office registry settings related to macro security (AccessVBOM, VbaWarnings) to disable security warnings, enabling malicious macros for persistence and further compromise.</description><content:encoded><![CDATA[<p>Microsoft Office applications allow users and developers to manage macro security settings. Attackers can abuse these settings by modifying the registry to automatically trust macros or disable security warnings. This increases the likelihood of successful macro execution, potentially establishing persistence or enabling further malicious activities on the compromised system. The modifications specifically target the <code>AccessVBOM</code> and <code>VbaWarnings</code> registry values. This is a common tactic used to bypass security controls and execute malicious code within an organization, often as part of a phishing or spear phishing campaign.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious Office document containing VBA macros.</li>
<li>The victim receives the malicious document via email or other means (T1566).</li>
<li>The victim opens the document, potentially triggering a prompt to enable macros.</li>
<li>If macros are enabled or trusted due to existing settings, the malicious VBA code executes (T1204.002).</li>
<li>The VBA code modifies the Windows Registry to disable macro security warnings by setting <code>HKEY_CURRENT_USER\Software\Microsoft\Office\*\Security\VbaWarnings</code> to 1 or modifying <code>AccessVBOM</code> (T1112).</li>
<li>The attacker can then use the trusted macro environment to execute arbitrary code (T1059.005).</li>
<li>The attacker may establish persistence by creating scheduled tasks or modifying startup entries (T1547.001).</li>
<li>The attacker achieves their final objective, which may include data exfiltration, lateral movement, or deploying ransomware (TA0005, TA0002).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to bypass Office macro security protections, potentially leading to arbitrary code execution and system compromise. Disabling macro security warnings increases the attack surface within an organization, as users are no longer prompted to approve macro execution, which can lead to further malware infection and data breaches. The rule is designed to detect registry changes that could enable this type of attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon registry event logging to detect the registry modifications described in this brief to trigger the detections (Sysmon Registry Events).</li>
<li>Deploy the Sigma rule &ldquo;MS Office Macro Security Registry Modifications&rdquo; to your SIEM and tune for your environment.</li>
<li>Use Group Policy Objects (GPOs) to centrally manage Office macro security settings and prevent users from modifying them (references).</li>
<li>Investigate any alerts generated by this rule to determine the source of the registry modification and whether malicious macros were subsequently executed (rule description).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>office</category><category>macro</category><category>registry</category><category>defense-evasion</category><category>windows</category></item><item><title>Detection of Office Macro File Creation</title><link>https://feed.craftedsignal.io/briefs/2024-01-office-macro-creation/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-office-macro-creation/</guid><description>This brief outlines a threat involving the creation of new Office macro files, potentially indicating malicious activity such as phishing or malware distribution, targeting Windows systems.</description><content:encoded><![CDATA[<p>The creation of Office macro files (.docm, .xlsm, .pptm, etc.) can be an indicator of malicious activity, often linked to initial access attempts such as phishing campaigns or malware distribution. Attackers frequently embed malicious macros within these files to execute arbitrary code on a victim&rsquo;s machine upon opening the document and enabling macros. While legitimate use cases for macro-enabled documents exist, their creation should be monitored, especially when originating from unusual processes or locations. This activity is related to the technique T1566.001 (Phishing: Spearphishing Attachment). Defenders need to monitor file creation events for specific Office macro extensions, filtering out common false positives to identify potential threats.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious Office document (e.g., .docm, .xlsm) containing a VBA macro.</li>
<li>The attacker sends the malicious document as an attachment via email (spearphishing).</li>
<li>The user receives the email and opens the attached Office document.</li>
<li>The user is prompted to enable macros within the document.</li>
<li>If the user enables macros, the embedded VBA code executes.</li>
<li>The VBA code may execute PowerShell or other scripting languages to download a malicious payload.</li>
<li>The downloaded payload is saved to disk (e.g., in the user&rsquo;s temp directory).</li>
<li>The payload executes, establishing persistence or performing other malicious actions, such as ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, malware installation, data exfiltration, and potentially complete system compromise. The impact can range from individual user infection to widespread organizational damage, depending on the attacker&rsquo;s objectives and the level of access gained. In a widespread attack, numerous systems could be infected, leading to significant downtime, data loss, and financial repercussions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Office Macro File Creation</code> to your SIEM to detect the creation of suspicious Office macro files (logsource: file_event/windows).</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the parent processes of the file creation event.</li>
<li>Implement user awareness training to educate employees about the risks of opening unsolicited attachments and enabling macros.</li>
<li>Enable Sysmon file creation logging to capture the necessary events for the Sigma rule to function effectively.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>initial-access</category><category>phishing</category><category>macro</category></item></channel></rss>