Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Package Object Support #41

Open
decalage2 opened this issue May 11, 2016 · 1 comment
Open

Package Object Support #41

decalage2 opened this issue May 11, 2016 · 1 comment

Comments

@decalage2
Copy link
Owner

Originally reported by: Jeremy Humble (Bitbucket: jeremy_humble, GitHub: Unknown)


I've noticed an uptick lately in phishing campaigns sending out documents with embedded package objects (https://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/packager_what_is_obj_pkg.mspx?mfr=true)

All of the attached files have executables embedded using this technique, but none of the oletools seem to be able to recognize or extract these types of objects.
I'm still researching this technique and will update this ticket if I find anything useful.

While running syria.pps through olefile, I did notice the following:

#!python

DEBUG    property id=13: type=4126 offset=108
DEBUG    property id=13: type=4126 not implemented in parser yet

DEBUG    property id=12: type=4108 offset=1D1
DEBUG    property id=12: type=4108 not implemented in parser yet

archive password is infected.


@decalage2
Copy link
Owner Author

Original comment by Philippe Lagadec (Bitbucket: decalage, GitHub: decalage2):


Hi Jeremy,
Part of the code to extract OLE Package objects is already in the oleobj.py module, but I haven't added the code to make it a command-line tool yet.
For now it is only used by rtfobj for RTF files.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant