Description
Adversaries may abuse Visual Basic (VB) for execution. VB is a programming language created by Microsoft with interoperability with many Windows technologies such as [Component Object Model](https://attack.mitre.org/techniques/T1559/001) and the [Native API](https://attack.mitre.org/techniques/T1106) through the Windows API. Although tagged as legacy with no planned future evolutions, VB is integrated and supported in the .NET Framework and cross-platform .NET Core.(Citation: VB .NET Mar 2020)(Citation: VB Microsoft) Derivative languages based on VB have also been created, such as Visual Basic for Applications (VBA) and VBScript. VBA is an event-driven programming language built into Microsoft Office, as well as several third-party applications.(Citation: Microsoft VBA)(Citation: Wikipedia VBA) VBA enables documents to contain macros used to automate the execution of tasks and other functionality on the host. VBScript is a default scripting language on Windows hosts and can also be used in place of [JavaScript](https://attack.mitre.org/techniques/T1059/007) on HTML Application (HTA) webpages served to Internet Explorer (though most modern browsers do not come with VBScript support).(Citation: Microsoft VBScript) Adversaries may use VB payloads to execute malicious commands. Common malicious usage includes automating execution of behaviors with VBScript or embedding VBA content into [Spearphishing Attachment](https://attack.mitre.org/techniques/T1566/001) payloads (which may also involve [Mark-of-the-Web Bypass](https://attack.mitre.org/techniques/T1553/005) to enable execution).(Citation: Default VBS macros Blocking )
Threat-Mapped Scoring
ATT&CK Kill Chain Metadata
- Tactics: execution
- Platforms: Windows, macOS, Linux
-
Detection Guidance:
Monitor for events associated with VB execution, such as Office applications spawning processes, usage of the Windows Script Host (typically cscript.exe or wscript.exe), file activity involving VB payloads or scripts, or loading of modules associated with VB languages (ex: vbscript.dll). VB execution is likely to perform actions with various effects on a system that may generate events, depending on the types of monitoring used. Monitor processes and command-line arguments for execution and subsequent behavior. Actions may be related to network and system information [Discovery](https://attack.mitre.org/tactics/TA0007), [Collection](https://attack.mitre.org/tactics/TA0009), or other programable post-compromise behaviors and could be used as indicators of detection leading back to the source. Understanding standard usage patterns is important to avoid a high number of false positives. If VB execution is restricted for normal users, then any attempts to enable related components running on a system would be considered suspicious. If VB execution is not commonly used on a system, but enabled, execution running out of cycle from patching or other administrator functions is suspicious. Payloads and scripts should be captured from the file system when possible to determine their actions and intent.
Malware
- Astaroth
- BabyShark
- BackConfig
- Bandook
- Bisonal
- Bumblebee
- CHIMNEYSWEEP
- Chaes
- Cobalt Strike
- Comnie
- DanBot
- DarkGate
- Emotet
- Exaramel for Windows
- Ferocious
- Flagpro
- Goopy
- Grandoreiro
- Helminth
- IPsec Helper
- IcedID
- JCry
- JSS Loader
- Javali
- KOCTOPUS
- Kerrdown
- KeyBoy
- Lokibot
- LookBack
- LunarMail
- Melcoz
- Metamorfo
- Mispadu
- NETWIRE
- NanHaiShu
- NanoCore
- OSX_OCEANLOTUS.D
- OopsIE
- POWERSTATS
- PoetRAT
- PowerShower
- Pteranodon
- QUADAGENT
- QakBot
- REvil
- ROKRAT
- Ramsay
- Remexi
- STARWHALE
- SUNBURST
- SVCReady
- Saint Bot
- ShrinkLocker
- Sibot
- Smoke Loader
- Snip3
- Squirrelwaffle
- StoneDrill
- TAMECAT
- TYPEFRAME
- Ursnif
- VBShower
- WhisperGate
- Xbash
- jRAT
Tools
APTs (Intrusion Sets)
- APT-C-36
- APT32
- APT33
- APT37
- APT38
- APT39
- APT42
- BRONZE BUTLER
- Cobalt Group
- Confucius
- Earth Lusca
- FIN13
- FIN4
- FIN7
- Gamaredon Group
- Gorgon Group
- HEXANE
- Higaisa
- Inception
- Kimsuky
- Lazarus Group
- LazyScripter
- Leviathan
- Machete
- Magic Hound
- Malteiro
- Molerats
- MuddyWater
- Mustang Panda
- OilRig
- Patchwork
- Rancor
- RedCurl
- Sandworm Team
- SideCopy
- Sidewinder
- Silence
- TA2541
- TA459
- TA505
- Transparent Tribe
- Turla
- WIRTE
- Windshift