

docx files (all files are already known), for version control we will use SVN.

On our project we will have to have some kind of documentation management control. Kinda the first post ever regarding programming, since till now i managed to google everything that i needed.
Repository of excel vba examples code#
For some add-ins types (WLL, VBA) additional mitigation is likely required as disabling add-ins in the Office Trust Center does not disable WLL nor does it prevent VBA code from executing.I'm new to this kind of things. If they are required, follow best practices for securing them by requiring them to be signed and disabling user notification for allowing add-ins. Disable Office VBA macros from executing.ĭisable Office add-ins. įollow Office macro security best practices suitable for your environment.
Repository of excel vba examples windows#
On Windows 10, enable Attack Surface Reduction (ASR) rules to prevent Office applications from creating child processes and from writing potentially malicious executable content to disk. MuddyWater has used a Word Template, Normal.dotm, for persistence. Ĭobalt Strike has the ability to use an Excel Workbook to execute additional code by enabling Office to trust macros and execute code without user permission. Īn adversary may need to enable macros to execute unrestricted depending on the system or enterprise security policy on use of macros.īackConfig has the ability to use hidden columns in Excel spreadsheets to store executable files or commands for VBA macros. To abuse GlobalDotName, adversaries may first need to register the template as a trusted document or place it in a trusted location. By modifying the GlobalDotName registry key an adversary can specify an arbitrary location, file name, and file extension to use for the template that will be loaded on application startup.

Word 2016 will first look for Normal.dotm under C:\Program Files (x86)\Microsoft Office\root\Office16\, or by modifying the GlobalDotName registry key. Ĭ:\Users\\AppData\Roaming\Microsoft\Templates\Normal.dotmĬ:\Users\\AppData\Roaming\Microsoft\Excel\XLSTART\PERSONAL.XLSBĪdversaries may also change the location of the base template to point to their own by hijacking the application's search order, e.g. Shared templates may also be stored and pulled from remote locations. Excel does not have a template file created by default, but one can be added that will automatically be loaded. By default, Word has a Normal.dotm template created that can be modified to include a malicious macro. Examples for both Word and Excel have been discovered and published. Office Visual Basic for Applications (VBA) macros can be inserted into the base template and used to execute code when the respective Office application starts in order to obtain persistence. The base templates within the application are used each time an application starts. Microsoft Office contains templates that are part of common Office applications and are used to customize styles. Adversaries may abuse Microsoft Office templates to obtain persistence on a compromised system.
