<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Office XML with Macros in Custom Signatures</title>
    <link>https://live.paloaltonetworks.com/t5/custom-signatures/office-xml-with-macros/m-p/248893#M292</link>
    <description>&lt;P&gt;This is a custom vulnerability signature I created based on what I was seeing come through to our users.&amp;nbsp; Usually, the malicious Office files with macros were in either the binary Office 2003 format or the newer Office 2007+ format.&amp;nbsp; What I was seeing were Office XML (2003 era) files.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note, this signature includes a specific string match for Word (since that was the only sample I had at the time), however it should be pretty simple to adjust for other patterns (Excel, etc.).&amp;nbsp; I based the signature on the sample I had, plus a few resources online such as the following YARA rule:&amp;nbsp;&amp;nbsp;&lt;A href="https://github.com/Neo23x0/signature-base/blob/master/yara/crime_dridex_xml.yar" target="_blank"&gt;https://github.com/Neo23x0/signature-base/blob/master/yara/crime_dridex_xml.yar&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;set threats vulnerability 41000 signature standard "Office XML with Macros" and-condition "And Condition 1" or-condition "Or Condition 1" operator pattern-match pattern "&amp;lt;\?xml version="
set threats vulnerability 41000 signature standard "Office XML with Macros" and-condition "And Condition 1" or-condition "Or Condition 1" operator pattern-match context file-html-body
set threats vulnerability 41000 signature standard "Office XML with Macros" and-condition "And Condition 1" or-condition "Or Condition 1" operator pattern-match negate no
set threats vulnerability 41000 signature standard "Office XML with Macros" and-condition "And Condition 2" or-condition "Or Condition 1" operator pattern-match pattern '&amp;lt;\?mso\-application progid="Word\.Document"\?&amp;gt;'
set threats vulnerability 41000 signature standard "Office XML with Macros" and-condition "And Condition 2" or-condition "Or Condition 1" operator pattern-match context file-html-body
set threats vulnerability 41000 signature standard "Office XML with Macros" and-condition "And Condition 2" or-condition "Or Condition 1" operator pattern-match negate no
set threats vulnerability 41000 signature standard "Office XML with Macros" and-condition "And Condition 3" or-condition "Or Condition 1" operator pattern-match pattern 'w:macrosPresent="yes"'
set threats vulnerability 41000 signature standard "Office XML with Macros" and-condition "And Condition 3" or-condition "Or Condition 1" operator pattern-match context file-html-body
set threats vulnerability 41000 signature standard "Office XML with Macros" and-condition "And Condition 3" or-condition "Or Condition 1" operator pattern-match negate no
set threats vulnerability 41000 signature standard "Office XML with Macros" and-condition "And Condition 4" or-condition "Or Condition 1" operator pattern-match pattern "&amp;lt;w:binData w:name="
set threats vulnerability 41000 signature standard "Office XML with Macros" and-condition "And Condition 4" or-condition "Or Condition 1" operator pattern-match context file-html-body
set threats vulnerability 41000 signature standard "Office XML with Macros" and-condition "And Condition 4" or-condition "Or Condition 1" operator pattern-match negate no
set threats vulnerability 41000 signature standard "Office XML with Macros" order-free no
set threats vulnerability 41000 signature standard "Office XML with Macros" scope protocol-data-unit
set threats vulnerability 41000 default-action reset-both
set threats vulnerability 41000 threatname "Office XML with Macros"
set threats vulnerability 41000 severity high
set threats vulnerability 41000 direction both
set threats vulnerability 41000 affected-host client yes
set threats vulnerability 41000 affected-host server yes&lt;/PRE&gt;</description>
    <pubDate>Tue, 05 Feb 2019 16:34:03 GMT</pubDate>
    <dc:creator>rickyboone</dc:creator>
    <dc:date>2019-02-05T16:34:03Z</dc:date>
    <item>
      <title>Office XML with Macros</title>
      <link>https://live.paloaltonetworks.com/t5/custom-signatures/office-xml-with-macros/m-p/248893#M292</link>
      <description>&lt;P&gt;This is a custom vulnerability signature I created based on what I was seeing come through to our users.&amp;nbsp; Usually, the malicious Office files with macros were in either the binary Office 2003 format or the newer Office 2007+ format.&amp;nbsp; What I was seeing were Office XML (2003 era) files.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note, this signature includes a specific string match for Word (since that was the only sample I had at the time), however it should be pretty simple to adjust for other patterns (Excel, etc.).&amp;nbsp; I based the signature on the sample I had, plus a few resources online such as the following YARA rule:&amp;nbsp;&amp;nbsp;&lt;A href="https://github.com/Neo23x0/signature-base/blob/master/yara/crime_dridex_xml.yar" target="_blank"&gt;https://github.com/Neo23x0/signature-base/blob/master/yara/crime_dridex_xml.yar&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;set threats vulnerability 41000 signature standard "Office XML with Macros" and-condition "And Condition 1" or-condition "Or Condition 1" operator pattern-match pattern "&amp;lt;\?xml version="
set threats vulnerability 41000 signature standard "Office XML with Macros" and-condition "And Condition 1" or-condition "Or Condition 1" operator pattern-match context file-html-body
set threats vulnerability 41000 signature standard "Office XML with Macros" and-condition "And Condition 1" or-condition "Or Condition 1" operator pattern-match negate no
set threats vulnerability 41000 signature standard "Office XML with Macros" and-condition "And Condition 2" or-condition "Or Condition 1" operator pattern-match pattern '&amp;lt;\?mso\-application progid="Word\.Document"\?&amp;gt;'
set threats vulnerability 41000 signature standard "Office XML with Macros" and-condition "And Condition 2" or-condition "Or Condition 1" operator pattern-match context file-html-body
set threats vulnerability 41000 signature standard "Office XML with Macros" and-condition "And Condition 2" or-condition "Or Condition 1" operator pattern-match negate no
set threats vulnerability 41000 signature standard "Office XML with Macros" and-condition "And Condition 3" or-condition "Or Condition 1" operator pattern-match pattern 'w:macrosPresent="yes"'
set threats vulnerability 41000 signature standard "Office XML with Macros" and-condition "And Condition 3" or-condition "Or Condition 1" operator pattern-match context file-html-body
set threats vulnerability 41000 signature standard "Office XML with Macros" and-condition "And Condition 3" or-condition "Or Condition 1" operator pattern-match negate no
set threats vulnerability 41000 signature standard "Office XML with Macros" and-condition "And Condition 4" or-condition "Or Condition 1" operator pattern-match pattern "&amp;lt;w:binData w:name="
set threats vulnerability 41000 signature standard "Office XML with Macros" and-condition "And Condition 4" or-condition "Or Condition 1" operator pattern-match context file-html-body
set threats vulnerability 41000 signature standard "Office XML with Macros" and-condition "And Condition 4" or-condition "Or Condition 1" operator pattern-match negate no
set threats vulnerability 41000 signature standard "Office XML with Macros" order-free no
set threats vulnerability 41000 signature standard "Office XML with Macros" scope protocol-data-unit
set threats vulnerability 41000 default-action reset-both
set threats vulnerability 41000 threatname "Office XML with Macros"
set threats vulnerability 41000 severity high
set threats vulnerability 41000 direction both
set threats vulnerability 41000 affected-host client yes
set threats vulnerability 41000 affected-host server yes&lt;/PRE&gt;</description>
      <pubDate>Tue, 05 Feb 2019 16:34:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/custom-signatures/office-xml-with-macros/m-p/248893#M292</guid>
      <dc:creator>rickyboone</dc:creator>
      <dc:date>2019-02-05T16:34:03Z</dc:date>
    </item>
  </channel>
</rss>

