Exchange.Windows.Applications.OfficeMacros.MacroRaptor - High false positive rate #1739
Unanswered
angry-bender
asked this question in
Q&A
Replies: 1 comment 2 replies
-
I can add another field.... we use the same regex but when I originally wrote this I thought it was best to just present results and a decision was moot. You can use notebook to exclude the results. Macroraptor just marks as suspicious any found with Autoexec one of the other two entries: https://github.com/decalage2/oletools/blob/89e4dda01b53c12b75b9af0a04fc51582cb23b87/oletools/mraptor.py#L217-L218 Keep in mind macro parsing in general is fragile and I wouldnt put complete faith in any macro parsing tool. |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Describe the issue
When using the artefact, the false positive rate is very high when compared to the source MacroRaptor tool.
To Reproduce
upload(file=FullPath)
to line 47 of the artefact.mkdir files
,find . -type f -exec cp {} files \;
,rm *.csv, rm *.json
.pip3 install oletools
) .mraptor * -m -l critical
to show the results. The output of this command will clear up to approximately 70% of macros as Macro OKExpected behavior
The artefacts regex logic only identifies SUSPICIOUS macros
Screenshots
I currently don't have a dataset for testing, as this was found during an investigation. However, if requested I can try to get one together.
Version:
Additional context
I believe this may be due to the artefacts regex behavior. It could be worth comparting to the MacroRaptor source, and classifying macro's in a similar behavior to https://github.com/decalage2/oletools/wiki/mraptor
Beta Was this translation helpful? Give feedback.
All reactions