Detection Method: Macro analysis

Macro analysis examines embedded code within documents, focusing primarily on Microsoft Office files that contain VBA (Visual Basic for Applications) macros. This technique goes beyond simply detecting macros—it analyzes how they behave, their intent, and whether they pose a potential security risk.
Macro analysis can help you detect:
  • Auto-executing macros that run as soon as documents are opened
  • Obfuscated or encoded commands that hide malicious actions
  • Suspicious API calls that access system resources or modify settings
  • Attempts to run commands through shell or PowerShell
  • Data exfiltration methods within macro code
For example, attackers might distribute seemingly legitimate Excel files with embedded macros that, when activated, download malware or establish persistence on your system.
Rule Name & Severity
Last Updated
Author
Types, Tactics & Capabilities
Attachment: Office file with document sharing and browser instruction lures
2mo ago
Oct 16th, 2025
Sublime Security
/feeds/core/detection-rules/attachment-office-file-with-document-sharing-and-browser-instruction-lures-b1250a4b
Attachment: Potential sandbox evasion in Office file
5mo ago
Aug 5th, 2025
@ajpc500
/feeds/core/detection-rules/attachment-potential-sandbox-evasion-in-office-file-1c591681
Attachment: Macro files containing MHT content
5mo ago
Aug 5th, 2025
Sublime Security
/feeds/core/detection-rules/attachment-macro-files-containing-mht-content-4d54e40b
Attachment: Macro with suspected use of COM ShellBrowserWindow object for process creation
5mo ago
Aug 5th, 2025
@ajpc500
/feeds/core/detection-rules/attachment-macro-with-suspected-use-of-com-shellbrowserwindow-object-for-process-creation-527fc7f0
Attachment with high risk VBA macro (unsolicited)
5mo ago
Jul 16th, 2025
Sublime Security
/feeds/core/detection-rules/attachment-with-high-risk-vba-macro-unsolicited-a2b20e16
Attachment soliciting user to enable macros
5mo ago
Jul 16th, 2025
Sublime Security
/feeds/core/detection-rules/attachment-soliciting-user-to-enable-macros-e9d75515
Attachment with auto-opening VBA macro (unsolicited)
5mo ago
Jul 16th, 2025
Sublime Security
/feeds/core/detection-rules/attachment-with-auto-opening-vba-macro-unsolicited-d48b3e53
Suspicious VBA macros from untrusted sender
5mo ago
Jul 16th, 2025
Sublime Security
/feeds/core/detection-rules/suspicious-vba-macros-from-untrusted-sender-37cec120
Attachment with auto-executing macro (unsolicited)
5mo ago
Jul 16th, 2025
Sublime Security
/feeds/core/detection-rules/attachment-with-auto-executing-macro-unsolicited-af6624c3
Attachment with VBA macros from employee impersonation (unsolicited)
5mo ago
Jul 16th, 2025
Sublime Security
/feeds/core/detection-rules/attachment-with-vba-macros-from-employee-impersonation-unsolicited-9b262123
Attachment: Archive contains DLL-loading macro
3y ago
Dec 28th, 2023
Sublime Security
/feeds/core/detection-rules/attachment-archive-contains-dll-loading-macro-3a193f5f
Attachment: CVE-2021-40444 - MSHTML Remote Code Execution Vulnerability
3y ago
Dec 19th, 2023
Sublime Security
/feeds/core/detection-rules/attachment-cve-2021-40444-mshtml-remote-code-execution-vulnerability-8cefcf7f