Detection Method: OLE analysis

OLE (Object Linking and Embedding) analysis examines embedded objects in Microsoft Office documents to detect potentially harmful content and behavior. This method focuses on the OLE2 container format used in many Office files, which can hide threats like malicious macros, executable code, or dangerous external links.
OLE analysis can help you detect:
  • Malicious VBA macros that run automatically when documents are opened
  • Hidden executable code or scripts embedded within document objects
  • External relationships linking to malicious or suspicious resources
  • Encryption used to hide malicious content
  • Flash objects that might contain exploitable vulnerabilities
  • Attempts to exploit known vulnerabilities in Office applications
For example, attackers might embed macros that execute as soon as you open the document, or include external links that download additional malware when clicked. OLE analysis helps catch these hidden threats early.
Rule Name & Severity
Last Updated
Author
Types, Tactics & Capabilities
Attachment: Encrypted Microsoft Office file (unsolicited)
2mo ago
Jan 12th, 2026
Sublime Security
Attachment: OLE external relationship containing file scheme link to IP address
2mo ago
Jan 12th, 2026
Sublime Security
Attachment: Office file contains OLE relationship to credential phishing page
2mo ago
Jan 12th, 2026
Sublime Security
Attachment with auto-executing macro (unsolicited)
2mo ago
Jan 12th, 2026
Sublime Security
Attachment with high risk VBA macro (unsolicited)
2mo ago
Jan 12th, 2026
Sublime Security
Attachment: CVE-2021-40444 - MSHTML Remote Code Execution Vulnerability
2mo ago
Jan 12th, 2026
Sublime Security
Attachment: OLE external relationship containing file scheme link to executable filetype
4mo ago
Nov 24th, 2025
Sublime Security