-
-
Notifications
You must be signed in to change notification settings - Fork 112
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Word Document -- End User authorized Macros #52
Comments
CollectionLog-2018.11.07-14.02.zip I know the end user enabled the Macro. Analysing the word document led to a generic VBA/Trojan Downloader. I'm not sure what was actually downloaded and ran. I'm running the traditional removal tools and scans, but as yet they have not found anything. I'm hoping someone can look at the collection log and provide feedback on what payload the Macro delivered. |
Hi, Please, note that only members of VIRUSNET-Association are allowed to respond in PC cure topics. Assistance is provided free of charge at our free time. If you found our help useful, you can thank us with any amount using this form or you can leave a feedback in Guestbook. |
Hello, What kind of problems are you experience now?
|
Those are Group Policy Restrictions to restrict End User access to prevent students (and teachers) from bypassing the internet filter. |
Ok, but you didn't answer my first question. :) |
I choose to reimage the machine before putting it back on the network Friday as I couldn't wait any longer to get the employee back her computer. So I'm not having issues as of now. But I'm still concerned as all the virus scanners and malware scanners found nothing before I imaged the machine. So what did the macro do? I didn't see anything in the hijackthis logs, but maybe I missed something. I'm concerned if it moved laterally on my network. But without any idea what footprint to look for... I'm hoping the logs uploaded to GitHub last Wednesday would give me a clue as to what I'm looking for. |
Logs didn't show any malicious in system. You can check the system for vulnerabilities:
After script ends and if it find vulnerabilities file avz_log.txt will be open in the Notepad and there'll be download links in it. Reboot your PC. |
Thank you for double checking the logs for me. I appreciate the second opinion. |
If you want we try to analyze that sample you can send us your macros file. |
Welcome !
Thank you for joining the section of VIRUSNET association support.
BEFORE ASKING HELP, READ CAREFULLY THIS INSTRUCTION:
Step 1: Are you in the right place?
If yes, see the next step.
Step 2: Show us required logs (for PC cure):
Read carefully: How to make a request for help in the PC cure section
Attach 'Collection-[Date].zip' log created by AutoLogger
Describe your problem in details:
The text was updated successfully, but these errors were encountered: