Analysis and Correlation of Visual Evidence in Campaigns of Malicious Office Documents

8Citations
Citations of this article
24Readers
Mendeley users who have this article in their library.

Abstract

Many malware campaigns use Microsoft (MS) Office documents as droppers to download and execute their malicious payload. Such campaigns often use these documents because MS Office is installed on billions of devices and that these files allow the execution of arbitrary VBA code. Recent versions of MS Office prevent the automatic execution of VBA macros, so malware authors try to convince users into enabling the content via images that, e.g., forge system or technical errors. In this article, we propose a mechanism to extract and analyse the different components of the files, including these visual elements, and construct lightweight signatures based on them. These visual elements are used as input for a text extraction pipeline which, in combination with the signatures, is able to capture the intent of MS Office files and the campaign they belong to. We test and validate our approach using an extensive database of malware samples, obtaining an accuracy above 99% in the task of distinguishing between benign and malicious files. Furthermore, our signature-based scheme allowed us to identify correlations between different campaigns, illustrating that some campaigns are either using the same tools or collaborating between them.

Cite

CITATION STYLE

APA

Casino, F., Totosis, N., Apostolopoulos, T., Lykousas, N., & Patsakis, C. (2023). Analysis and Correlation of Visual Evidence in Campaigns of Malicious Office Documents. Digital Threats: Research and Practice, 4(2). https://doi.org/10.1145/3513025

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free