{"id":3447,"date":"2021-08-09T14:29:37","date_gmt":"2021-08-09T19:29:37","guid":{"rendered":"https:\/\/truxgoservers.com\/blog\/?p=3447"},"modified":"2021-08-09T14:29:37","modified_gmt":"2021-08-09T19:29:37","slug":"vba-stomping-malicious-spawn-technique","status":"publish","type":"post","link":"https:\/\/truxgoservers.com\/blog\/vba-stomping-malicious-spawn-technique\/","title":{"rendered":"VBA Stomping malicious spawn technique"},"content":{"rendered":"\n<p>There are many malicious techniques on the network and we know it but&#8230; today we come to see a technique called VBA stomping which generates malicious documents also known as &#8220;maldoc&#8221; which consists of removing or modifying the source code of a Microsoft Office document leaving only a compiled version of the macros called p-code. In this way, an attacker will be able to bypass maldocs detection based on source code analysis.<\/p>\n\n\n\n<p>We already know that email with attachments is one of the most popular entry routes for malware, specifically office-type attachments. This is possible, to a large extent, thanks to the ability to program code in the macros of office documents. The reasons why this technique continues to work two decades after it began to be used are diverse:<\/p>\n\n\n\n<p><strong><em>\u25b8Macros are easy to hide.<\/em><\/strong><\/p>\n\n\n\n<p><strong><em>\u25b8The macros are legitimate. Even disabled by default, it is easy for the user to enable them.<\/em><\/strong><\/p>\n\n\n\n<p><strong><em>\u25b8They are sent by email, so they are usually only analyzed statically since it is the easiest method to deceive users.<\/em><\/strong><\/p>\n\n\n\n<p><strong><em>\u25b8It remains a very lucrative avenue for cyber attackers.<\/em><\/strong><\/p>\n\n\n\n<p>One of the biggest problems with this is that antiviruses have relied on this source code even to classify samples. But it occurred to someone that the document could still infect if the compiled code was kept but the source code was deleted. So it was. This technique for erasing the source code is VBA stomping, and it allows malware to go unnoticed with little impact on its ability to infect, but not everything is bad, although this problem is very misleading, the first thing to do is to have judgment, since we know that for a malware to enter our system, contact with the user is necessary so do not fall down and apply safety margins to avoid these deceptions although it is always good to have tools that help us against threats of this type and others.<\/p>\n\n\n\n<p>See also:<br><a href=\"https:\/\/truxgoservers.com\/blog\/jssloader-a-threat-that-comes-back-improved\/\">JSSLoader \u2013 A Threat That Comes Back Improved<\/a><br><a href=\"https:\/\/truxgoservers.com\/blog\/ahk-the-new-malicious-rat-distribution-campaign\/\">AHK, the new malicious RAT distribution campaign<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are many malicious techniques on the network and we know it but&#8230; today we come to see a technique called VBA stomping which generates malicious documents also known as &#8220;maldoc&#8221; which consists of removing or modifying the source code of a Microsoft Office document leaving only a compiled version of the macros called p-code. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3448,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[36],"class_list":["post-3447","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>VBA Stomping malicious spawn technique - Truxgo Server Blog<\/title>\n<meta name=\"description\" content=\"We well know that there are many malicious techniques on the Web but... today we are talking about a malicious technique called VBA Stomping.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/truxgoservers.com\/blog\/vba-stomping-malicious-spawn-technique\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"VBA Stomping malicious spawn technique - Truxgo Server Blog\" \/>\n<meta property=\"og:description\" content=\"We well know that there are many malicious techniques on the Web but... today we are talking about a malicious technique called VBA Stomping.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/truxgoservers.com\/blog\/vba-stomping-malicious-spawn-technique\/\" \/>\n<meta property=\"og:site_name\" content=\"Truxgo Server Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-09T19:29:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/07\/VBA.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"768\" \/>\n\t<meta property=\"og:image:height\" content=\"384\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Truxgo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Truxgo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/vba-stomping-malicious-spawn-technique\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/vba-stomping-malicious-spawn-technique\\\/\"},\"author\":{\"name\":\"Truxgo\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/person\\\/8b409c26449db6aa09724b45331e333e\"},\"headline\":\"VBA Stomping malicious spawn technique\",\"datePublished\":\"2021-08-09T19:29:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/vba-stomping-malicious-spawn-technique\\\/\"},\"wordCount\":342,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/vba-stomping-malicious-spawn-technique\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/VBA.jpg\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/vba-stomping-malicious-spawn-technique\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/vba-stomping-malicious-spawn-technique\\\/\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/vba-stomping-malicious-spawn-technique\\\/\",\"name\":\"VBA Stomping malicious spawn technique - Truxgo Server Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/vba-stomping-malicious-spawn-technique\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/vba-stomping-malicious-spawn-technique\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/VBA.jpg\",\"datePublished\":\"2021-08-09T19:29:37+00:00\",\"description\":\"We well know that there are many malicious techniques on the Web but... today we are talking about a malicious technique called VBA Stomping.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/vba-stomping-malicious-spawn-technique\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/vba-stomping-malicious-spawn-technique\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/vba-stomping-malicious-spawn-technique\\\/#primaryimage\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/VBA.jpg\",\"contentUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/VBA.jpg\",\"width\":768,\"height\":384},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/vba-stomping-malicious-spawn-technique\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"VBA Stomping malicious spawn technique\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\",\"name\":\"Truxgo Server Blog\",\"description\":\"Cloud Server and Hosting Tutorials.\",\"publisher\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\",\"name\":\"Truxgo Server Blog\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/cropped-truxgo-logo-blanco.png\",\"contentUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/cropped-truxgo-logo-blanco.png\",\"width\":1250,\"height\":278,\"caption\":\"Truxgo Server Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/person\\\/8b409c26449db6aa09724b45331e333e\",\"name\":\"Truxgo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"caption\":\"Truxgo\"},\"sameAs\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\"],\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/author\\\/truxgo\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"VBA Stomping malicious spawn technique - Truxgo Server Blog","description":"We well know that there are many malicious techniques on the Web but... today we are talking about a malicious technique called VBA Stomping.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/truxgoservers.com\/blog\/vba-stomping-malicious-spawn-technique\/","og_locale":"es_MX","og_type":"article","og_title":"VBA Stomping malicious spawn technique - Truxgo Server Blog","og_description":"We well know that there are many malicious techniques on the Web but... today we are talking about a malicious technique called VBA Stomping.","og_url":"https:\/\/truxgoservers.com\/blog\/vba-stomping-malicious-spawn-technique\/","og_site_name":"Truxgo Server Blog","article_published_time":"2021-08-09T19:29:37+00:00","og_image":[{"width":768,"height":384,"url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/07\/VBA.jpg","type":"image\/jpeg"}],"author":"Truxgo","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Truxgo","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/truxgoservers.com\/blog\/vba-stomping-malicious-spawn-technique\/#article","isPartOf":{"@id":"https:\/\/truxgoservers.com\/blog\/vba-stomping-malicious-spawn-technique\/"},"author":{"name":"Truxgo","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/person\/8b409c26449db6aa09724b45331e333e"},"headline":"VBA Stomping malicious spawn technique","datePublished":"2021-08-09T19:29:37+00:00","mainEntityOfPage":{"@id":"https:\/\/truxgoservers.com\/blog\/vba-stomping-malicious-spawn-technique\/"},"wordCount":342,"commentCount":0,"publisher":{"@id":"https:\/\/truxgoservers.com\/blog\/#organization"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/vba-stomping-malicious-spawn-technique\/#primaryimage"},"thumbnailUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/07\/VBA.jpg","keywords":["Cybersecurity"],"articleSection":["Cybersecurity"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/truxgoservers.com\/blog\/vba-stomping-malicious-spawn-technique\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/truxgoservers.com\/blog\/vba-stomping-malicious-spawn-technique\/","url":"https:\/\/truxgoservers.com\/blog\/vba-stomping-malicious-spawn-technique\/","name":"VBA Stomping malicious spawn technique - Truxgo Server Blog","isPartOf":{"@id":"https:\/\/truxgoservers.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/truxgoservers.com\/blog\/vba-stomping-malicious-spawn-technique\/#primaryimage"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/vba-stomping-malicious-spawn-technique\/#primaryimage"},"thumbnailUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/07\/VBA.jpg","datePublished":"2021-08-09T19:29:37+00:00","description":"We well know that there are many malicious techniques on the Web but... today we are talking about a malicious technique called VBA Stomping.","breadcrumb":{"@id":"https:\/\/truxgoservers.com\/blog\/vba-stomping-malicious-spawn-technique\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/truxgoservers.com\/blog\/vba-stomping-malicious-spawn-technique\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/truxgoservers.com\/blog\/vba-stomping-malicious-spawn-technique\/#primaryimage","url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/07\/VBA.jpg","contentUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/07\/VBA.jpg","width":768,"height":384},{"@type":"BreadcrumbList","@id":"https:\/\/truxgoservers.com\/blog\/vba-stomping-malicious-spawn-technique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/truxgoservers.com\/blog\/"},{"@type":"ListItem","position":2,"name":"VBA Stomping malicious spawn technique"}]},{"@type":"WebSite","@id":"https:\/\/truxgoservers.com\/blog\/#website","url":"https:\/\/truxgoservers.com\/blog\/","name":"Truxgo Server Blog","description":"Cloud Server and Hosting Tutorials.","publisher":{"@id":"https:\/\/truxgoservers.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/truxgoservers.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/truxgoservers.com\/blog\/#organization","name":"Truxgo Server Blog","url":"https:\/\/truxgoservers.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/08\/cropped-truxgo-logo-blanco.png","contentUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/08\/cropped-truxgo-logo-blanco.png","width":1250,"height":278,"caption":"Truxgo Server Blog"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/person\/8b409c26449db6aa09724b45331e333e","name":"Truxgo","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","caption":"Truxgo"},"sameAs":["https:\/\/truxgoservers.com\/blog"],"url":"https:\/\/truxgoservers.com\/blog\/author\/truxgo\/"}]}},"_links":{"self":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/3447","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/comments?post=3447"}],"version-history":[{"count":2,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/3447\/revisions"}],"predecessor-version":[{"id":3505,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/3447\/revisions\/3505"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/media\/3448"}],"wp:attachment":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/media?parent=3447"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/categories?post=3447"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/tags?post=3447"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}