heroui logo

VBA DLL Loaded Via Office Application

Sigma Rules

View Source
Summary
This detection rule identifies when Visual Basic (VB) Dynamic Link Libraries (DLLs) are loaded via various Microsoft Office applications, such as Excel, PowerPoint, Word, and others. The loading of these DLLs could indicate the utilization of VBA (Visual Basic for Applications) Macros, which are often targeted by malicious actors to execute arbitrary code within Office documents. The rule specifically looks for the processes associated with Office products (like excel.exe and winword.exe) and checks if any of the specified VB DLLs (VBE7.DLL, VBEUI.DLL, VBE7INTL.DLL) are being loaded. The potential implications of this detection are significant, as macro-based attacks can lead to malware infections or other types of intrusions. Organizations should be vigilant in monitoring these behaviors, especially in contexts where the execution of unknown or undesired macros could be damaging. Regular auditing and filtering based on the specific environment can help mitigate false positives. Therefore, it's crucial to consider legitimate macro usage alongside detection efforts.
Categories
  • Endpoint
  • Windows
  • Application
Data Sources
  • Process
  • Image
Created: 2020-02-19