its-a-feature / Office-DDE-Payloads

Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Office-DDE-Payloads

Overview

Collection of scripts and templates to generate Word documents embedded with the DDE, macro-less command execution technique described by @_staaldraad and @0x5A1F (blog post link in References section below). Intended for use during sanctioned red team engagements and/or phishing campaigns.

Obfuscation and evasion techniques inspired by @_staaldraad (blog post link in References section below).

Usage

Install dependencies:

pip install -r requirements.txt

Insert a simple (unobfuscated) DDE command string into the payload document:

python ddeword.py

Insert an obfuscated DDE command string by way of the {QUOTE} field code technique into the payload document:

python ddeword.py --obfuscate

NOTE: When leveraging the template doc to link/reference the payload doc (by way of the --obfuscate trigger), do not use the DDEAUTO element in place of the DDE element. This will (1) elicit three sets of prompts to the user and (2) disrupt/corrupt the first set of prompts to display "!Unexpected end of formula" and fail the execution of the DDE command string. For some reason, DDEAUTO does not play well with the updateFields value in word/settings.xml.

Both forms of usage will generate two Word documents:

out/template-final.docx

  • The webSettings are configured to pull the DDE element from payload-final.docx or payload-obfuscated-final.docx, which is hosted by a server specified by the user.

out/payload-final.docx (not obfuscated)
out/payload-obfuscated-final.docx (obfuscated)

  • Contains user-provided DDE payload/command string. Hosted by user-controlled server (URL provided by user and baked into template-final.docx).

Delivery

By default, the user then has two standard methods of payload delivery, described below:

  1. Host the payload Word document on a user-controlled server (pointed to by the provided URL). Customize/stylize the template document and send directly to the desired target(s). This will trigger a remote reference to the payload document, ultimately pulling and executing the DDE command string.

  2. Customize/Stylize the payload document and send directly to the desired target(s).

NOTE: Be sure to remove personal/identifying information from the documents before hosting and sending to target (e.g., by way of the File --> Inspect Document functionality). This has already been applied to the docs in 'templates', but it's always good practice to confirm.

To-Do

  • Add more obfuscation techniques
  • Create option for user to choose prepackaged DDE command strings

References

https://sensepost.com/blog/2017/macro-less-code-exec-in-msword/
https://staaldraad.github.io/2017/10/23/msword-field-codes/

Additional Thanks

@ryHanson
@SecuritySift
@GossiTheDog

About

Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.

License:MIT License


Languages

Language:Python 100.0%