• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Malware • Security  /  An emerging trend of DDE based Office malware
An emerging trend of DDE based Office malware
06 December 2017

An emerging trend of DDE based Office malware

Written by Aniruddha Dolas
Aniruddha Dolas
Malware, Security
2
Shares

For the past few years, we have been seeing macro-based attacks through Object Linking Embedding (OLE)/Microsoft Office files. But, presently, attackers are using a different technique to spread malware through Office files – using a new attack vector called ‘Dynamic Data Exchange (DDE)’.

DDE is an authorized Microsoft Office feature that provides several methods for transferring data between applications. Once the communication protocol is established, it doesn’t require user interactions to exchange data between applications. The DDE feature is not limited to Word and Excel document but it includes RTF and Outlook also.

Technical details
This attack starts with a spam email with a malicious document file as an attachment as shown in fig 1.

Fig 1. Spam email
Fig 1. Spam email

Microsoft Word application i.e., ‘winword.exe’ opens this attachment and runs the DDE code. It throws a user prompt which says that this document contains some links which may refer to fetch data from other files. Fig 2 shows this prompt. 

Fig 2: 1st user prompt
Fig 2: 1st user prompt

If the user selects Yes, another user prompt is displayed which shows the remote data execution information. And here, if the user selects Yes, the attack will succeed.

Fig 3 shows the information about the remote data (this may vary from case to case).

Fig 3: 2nd user prompt
Fig 3: 2nd user prompt

In either of these user prompts, if the user selects No, the attack will fail.

The malware with a DDE code executes ‘cmd.exe’ with PowerShell and other codes as a parameter. PowerShell will download the payload in the background and execute it silently. The payload may contain any of the types of malware. Fig 4 shows one of the types of DDE code.

Fig 4: DDE Code
Fig 4: DDE Code

To evade signature-based detections, malware authors use different obfuscation techniques including the following:

Obfuscation technique 1

Splits the DDE and PowerShell code in different tags.

Fig 5 Splitting DDE code
Fig 5 Splitting DDE code

Obfuscation technique 2

Encoded PowerShell code with base64.

Fig 6. Base 64 encoding
Fig 6. Base 64 encoding

Obfuscation technique 3

Encoded PowerShell code with an integer value of their respective character.

Fig 7. Long string with Integer values
Fig 7. Long string with Integer values

Decoded version of the code above: 

Fig 8. Decoded value string highlighted in Fig 7
Fig 8. Decoded value string highlighted in Fig 7

The DDE based office malware attack technique is very simple for attackers. We suspect this trend will be picked up by malware authors in coming future.

Prevention measures

  • Consider disabling DDE when not in use.
  • To disable the DDE feature via the user interface: Set File -> Options -> Trust Center -> Trust Center Settings -> External Content -> Security settings for Workbook Links = Disable automatic update of Workbook Links.
  • Do not download/open attachments that arrive in emails from unwanted or unexpected sources.
  • Apply all recommended security updates and patches for your Operating System.

Indicators of compromise:

53c1d68242de77940a0011d7d108c098
106776A1A0F1F15E17C06C23CBFE550E
31362967C1BFE285DDC5C3AB27CDC62D

Subject Matter Experts

  • Aniruddha Dolas, Prashant Tilekar| Quick Heal Security Labs

 Previous PostUnified Threat Management: Understanding the requirements as per ...
Next Post  Holiday seasons: Breeding ground for cybercriminals
Aniruddha Dolas

About Aniruddha Dolas

Aniruddha Dolas is part of the HIPS (Host-based Intrusion Prevention System) team in Quick Heal Security Labs. He has worked on various security vulnerabilities...

Articles by Aniruddha Dolas »

Related Posts

  • SnakeKeylogger: A Multistage Info Stealer Malware Campaign

    March 25, 2025
  • SVC New Stealer on the Horizon

    March 21, 2025
  • data privacy

    The What, How, and Why of Data Privacy

    January 24, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (21) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (326) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies