Skip to content

A tool to dynamically inspect macro execution in Office documents

License

Notifications You must be signed in to change notification settings

enkomio/MacroInspector

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 

Repository files navigation

MacroInspector

A tool for analyzing dynamically the execution of macros in WORD documents.

Description

The aim of the project is to assist malware analysts during the analysis of malicious Office documents. Very often malwares use macros to execute malicious code. Just by dumping statically the macro is not always enough, in fact it is common for malware to hide important information not directly in the macro source. With Macro Inspector you will be able to:

  • Dump the source of all executed macros
  • Dump all the referenced strings allocated during the macro execution
  • Dump possible executables that are embedded in the document (done by string inspection)

Usage

The usage is deadly simple, just run: python macro_inspecto.py that's all :) It will loop until a new WINWORD process is found. Now you have to just open the malicious document, enable the macro and then close the document (this will ensure that events that are triggered on the closing document are executed).

Dependencies

In order to run the program you need to have the WinAppDbg library installed.

Limitations

The project was created by considering Microsoft WORD 2013. On different Word versions it could be necessary to adjust the address offset.

About

A tool to dynamically inspect macro execution in Office documents

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages