{"id":81454,"date":"2017-10-27T06:00:45","date_gmt":"2017-10-27T13:00:45","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=81454"},"modified":"2025-05-28T23:34:28","modified_gmt":"2025-05-29T06:34:28","slug":"configuring-mcafee-ens-and-vse-to-prevent-macroless-code-execution-in-office-apps","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/configuring-mcafee-ens-and-vse-to-prevent-macroless-code-execution-in-office-apps\/","title":{"rendered":"Configuring McAfee ENS and VSE to Prevent Macroless Code Execution in Office Apps"},"content":{"rendered":"<p>Microsoft Office macros are a popular method of distributing malware. Users can defend themselves against macro attacks by disabling macros. McAfee Labs has now seen a new attack technique using a feature of Office applications that help create dynamic reports. In this post we will explain this technique and offer a method to prevent the execution of malicious tools related to it.<\/p>\n<p>This new technique takes advantage of Microsoft\u2019s Dynamic Data Exchange protocol to execute command(s). DDE \u201csends messages between applications that share data and uses shared memory to exchange data between applications. Applications can use the DDE protocol for one-time data transfers and for continuous exchanges in which applications send updates to one another as new data becomes available,\u201d <a href=\"https:\/\/msdn.microsoft.com\/en-us\/library\/windows\/desktop\/ms648774(v=vs.85).aspx#_win32_Dynamic_Data_Exchange_Protocol\" target=\"_blank\" rel=\"noopener\">according to MSDN<\/a>. (<a href=\"https:\/\/blogs.msdn.microsoft.com\/oldnewthing\/20070226-00\/?p=27863\/\" target=\"_blank\" rel=\"noopener\">Microsoft advises <\/a>that you disable DDE.)<\/p>\n<p>During the course of our research into some interesting COM and OLE objects specifically related to Office malware, we found a <a href=\"https:\/\/sensepost.com\/blog\/2017\/macro-less-code-exec-in-msword\/\" target=\"_blank\" rel=\"noopener\">SensePost blog<\/a> that describes how this new technique could be used in both innocent and malicious ways. The author noted that the COM methods DDEInitialize, and DDEExecute were present in Excel and Word and that DDE gives us the option to execute commands.<\/p>\n<h2><strong>The DDE Protocol<\/strong><\/h2>\n<p>The DDE protocol was created to exchange data among Office applications. It is not inherently malicious. This feature is useful for some companies and businesses to create dynamic reports and documents. For example, we can create a Word file that can grab data from Excel spreadsheets using this feature.<\/p>\n<p>The problem is that this protocol also provides the option to run applications such as cmd.exe, which can run other executables on the system, for example, PowerShell.exe.<\/p>\n<p>As explained in the SensePost blog, we can use this feature in Word to run cmd.exe, and from cmd.exe run any executable we want. For example, if the developer put in the formula field the following instruction:<\/p>\n<p>{DDEAUTO c:\\\\windows\\\\system32\\\\cmd.exe &#8220;\/k calc.exe&#8221;}<\/p>\n<p>This instruction will open cmd.exe and then calc.exe, as in Figure 1:<\/p>\n<p><em><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-81458 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-1.jpg\" alt=\"\" width=\"1431\" height=\"713\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-1.jpg 1431w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-1-300x149.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-1-768x383.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-1-1024x510.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-1-1004x500.jpg 1004w\" sizes=\"auto, (max-width: 1431px) 100vw, 1431px\" \/><\/a>Figure 1.<\/em><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Malicious Method<\/strong><\/h2>\n<p>During our research we obtained a sample that uses this technique. The file runs PowerShell to execute a command that tries to download a file from an external source. (During our analysis this control server was down.)<\/p>\n<p>When the user opens this file, they see the following message:<\/p>\n<p><em><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-81459 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-2.jpg\" alt=\"\" width=\"817\" height=\"298\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-2.jpg 817w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-2-300x109.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-2-768x280.jpg 768w\" sizes=\"auto, (max-width: 817px) 100vw, 817px\" \/><\/a>Figure 2.<\/em><\/p>\n<p>A Yes click leads to this:<\/p>\n<p><em><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-3.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-81460 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-3.jpg\" alt=\"\" width=\"816\" height=\"252\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-3.jpg 816w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-3-300x93.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-3-768x237.jpg 768w\" sizes=\"auto, (max-width: 816px) 100vw, 816px\" \/><\/a>Figure 3.<\/em><\/p>\n<p>At this point Word asks if the user want to open cmd.exe. A Yes response runs cmd.exe and the code in the formula is executed (Figures 4a and 4b):<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-4.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-81461 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-4.jpg\" alt=\"\" width=\"575\" height=\"320\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-4.jpg 575w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-4-300x167.jpg 300w\" sizes=\"auto, (max-width: 575px) 100vw, 575px\" \/><\/a><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-4b.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-81462 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-4b.jpg\" alt=\"\" width=\"558\" height=\"223\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-4b.jpg 558w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-4b-300x120.jpg 300w\" sizes=\"auto, (max-width: 558px) 100vw, 558px\" \/><\/a><\/p>\n<p><em>Figures 4a and 4b.<\/em><\/p>\n<p>Now the PowerShell code runs and the download starts:<\/p>\n<p><em><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-5.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-81463 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-5.jpg\" alt=\"\" width=\"1115\" height=\"590\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-5.jpg 1115w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-5-300x159.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-5-768x406.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-5-1024x542.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-5-945x500.jpg 945w\" sizes=\"auto, (max-width: 1115px) 100vw, 1115px\" \/><\/a>Figure 5.<\/em><\/p>\n<p>The malicious command is obfuscated in an XML object (document.xml) within the Word file:<\/p>\n<p><em><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-6.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-81464 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-6.jpg\" alt=\"\" width=\"728\" height=\"493\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-6.jpg 728w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-6-300x203.jpg 300w\" sizes=\"auto, (max-width: 728px) 100vw, 728px\" \/><\/a>Figure 6.<\/em><\/p>\n<p>The source of the download is offline so PowerShell could not reach the control server to transfer the suspicious file. And we cannot be certain what this file would do. Nonetheless, this feature can be used in a malicious way and put systems in danger. Can McAfee help control this technique? Yes, and here\u2019s how to do that.<\/p>\n<h2><strong>Setting Restrictions to Prevent this Technique<\/strong><\/h2>\n<p>To set up our defense we need to create some rules to prevent the execution of applications from Word and Excel without our permission.<\/p>\n<p>Follow these steps in <strong>McAfee Endpoint Security.<\/strong><\/p>\n<p>Open Threat Prevention:<\/p>\n<p><em><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-7.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-81465 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-7.jpg\" alt=\"\" width=\"798\" height=\"596\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-7.jpg 798w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-7-300x224.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-7-768x574.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-7-669x500.jpg 669w\" sizes=\"auto, (max-width: 798px) 100vw, 798px\" \/><\/a>Figure 7.<\/em><\/p>\n<p>Click Show Advanced:<\/p>\n<p><em><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-8.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-81466 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-8.jpg\" alt=\"\" width=\"898\" height=\"649\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-8.jpg 898w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-8-300x217.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-8-768x555.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-8-692x500.jpg 692w\" sizes=\"auto, (max-width: 898px) 100vw, 898px\" \/><\/a>Figure 8.<\/em><\/p>\n<p>Go to Rules and click Add:<\/p>\n<p><em><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-9.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-81467 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-9.jpg\" alt=\"\" width=\"899\" height=\"766\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-9.jpg 899w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-9-300x256.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-9-768x654.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-9-587x500.jpg 587w\" sizes=\"auto, (max-width: 899px) 100vw, 899px\" \/><\/a>Figure 9.<\/em><\/p>\n<p>In Add Rule, click Executables\/Add:<\/p>\n<p><em><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-10.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-81468 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-10.jpg\" alt=\"\" width=\"956\" height=\"942\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-10.jpg 956w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-10-300x296.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-10-768x757.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-10-507x500.jpg 507w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-10-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-10-50x50.jpg 50w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-10-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-10-96x96.jpg 96w\" sizes=\"auto, (max-width: 956px) 100vw, 956px\" \/><\/a>Figure 10.<\/em><\/p>\n<p>Select the option Block and Report. Then click on Executables\/Add, and add Word and Excel like this:<\/p>\n<ul>\n<li>C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE<\/li>\n<li>C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE<\/li>\n<\/ul>\n<p>Under Subrules click Add:<\/p>\n<p><em><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-11.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-81469 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-11.jpg\" alt=\"\" width=\"959\" height=\"940\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-11.jpg 959w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-11-300x294.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-11-768x753.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-11-510x500.jpg 510w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-11-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-11-50x50.jpg 50w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-11-64x64.jpg 64w\" sizes=\"auto, (max-width: 959px) 100vw, 959px\" \/><\/a>Figure 11.<\/em><\/p>\n<p>And then:<\/p>\n<ul>\n<li>C:\\Windows\\SysWOW64\\cmd.exe<\/li>\n<li>C:\\Windows\\System32\\cmd.exe<\/li>\n<\/ul>\n<p>As well as:<\/p>\n<ul>\n<li>C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe<\/li>\n<li>C:\\Windows\\SysWow64\\WindowsPowerShell\\v1.0\\powershell.exe<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Follow these steps in <strong>VirusScan Enterprise.<\/strong><\/p>\n<p>Open the VirusScan Console in Administrator Mode:<\/p>\n<p><em><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-12.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-81470 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-12.jpg\" alt=\"\" width=\"751\" height=\"487\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-12.jpg 751w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-12-300x195.jpg 300w\" sizes=\"auto, (max-width: 751px) 100vw, 751px\" \/><\/a>Figure 12.<\/em><\/p>\n<p>Click on Access Protection, User-Defined Rules, New:<\/p>\n<p><em><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-13.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-81471 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-13.jpg\" alt=\"\" width=\"757\" height=\"605\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-13.jpg 757w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-13-300x240.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-13-626x500.jpg 626w\" sizes=\"auto, (max-width: 757px) 100vw, 757px\" \/><\/a>Figure 13.<\/em><\/p>\n<p>Select New Rule Type and click OK:<\/p>\n<p><em><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-14.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-81472 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-14.jpg\" alt=\"\" width=\"757\" height=\"604\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-14.jpg 757w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-14-300x239.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-14-627x500.jpg 627w\" sizes=\"auto, (max-width: 757px) 100vw, 757px\" \/><\/a>Figure 14.<\/em><\/p>\n<p>Add the exception to block cmd.exe:<\/p>\n<p><em><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-15.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-81473 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-15.jpg\" alt=\"\" width=\"758\" height=\"649\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-15.jpg 758w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-15-300x257.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-15-584x500.jpg 584w\" sizes=\"auto, (max-width: 758px) 100vw, 758px\" \/><\/a>Figure 15.<\/em><\/p>\n<p>In VSE you must create rules for Word and Excel:<\/p>\n<ul>\n<li>winword.exe<\/li>\n<li>excel.exe<\/li>\n<\/ul>\n<p>In File or Folder to Block add:<\/p>\n<ul>\n<li>C:\\Windows\\SysWOW64\\cmd.exe<\/li>\n<li>C:\\Windows\\System32\\cmd.exe<\/li>\n<\/ul>\n<p>As well as:<\/p>\n<ul>\n<li>C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe<\/li>\n<li>C:\\Windows\\SysWow64\\WindowsPowerShell\\v1.0\\powershell.exe<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Microsoft\u2019s Dynamic Data Exchange protocol can be useful for creating dynamic reports in Office. But it is exploitable. Following this procedure in McAfee ENS and VSE will ensure that DDE does not open the door to potential malicious behavior.<\/p>\n<p>For an overview of this exploit, see <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/code-execution-technique-takes-advantage-of-dynamic-data-exchange\" target=\"_blank\" rel=\"noopener\">&#8220;Code Execution Technique Takes Advantage of Dynamic Data Exchange.&#8221;<\/a><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Resources<\/strong><\/h2>\n<p>SHA-256: dc8610e25f99ca22a49211decba26d80c5b4ceecf8495a339b90a6731e926529<\/p>\n<p>McAfee Detection Name: W97M\/MacroLess<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft Office macros are a popular method of distributing malware. Users can defend themselves against macro attacks by disabling macros&#8230;.<\/p>\n","protected":false},"author":770,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[1814,4452,338],"coauthors":[4486],"class_list":["post-81454","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-computer-security","tag-cybersecurity","tag-endpoint-protection"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Configuring McAfee ENS and VSE to Prevent Macroless Code Execution in Office Apps<\/title>\n<meta name=\"description\" content=\"Microsoft Office macros are a popular method of distributing malware. Users can defend themselves against macro attacks by disabling macros.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Configuring McAfee ENS and VSE to Prevent Macroless Code Execution in Office Apps\" \/>\n<meta property=\"og:description\" content=\"Microsoft Office macros are a popular method of distributing malware. Users can defend themselves against macro attacks by disabling macros.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/configuring-mcafee-ens-and-vse-to-prevent-macroless-code-execution-in-office-apps\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/yerko.grbic\" \/>\n<meta property=\"article:published_time\" content=\"2017-10-27T13:00:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-29T06:34:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1431\" \/>\n\t<meta property=\"og:image:height\" content=\"713\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Yerko Grbic\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Yerko_Grbic\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Yerko Grbic\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/configuring-mcafee-ens-and-vse-to-prevent-macroless-code-execution-in-office-apps\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/configuring-mcafee-ens-and-vse-to-prevent-macroless-code-execution-in-office-apps\/\"},\"author\":{\"name\":\"Yerko Grbic\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/6f3d786f48d4d3aa0ffaf0d54a53bc4f\"},\"headline\":\"Configuring McAfee ENS and VSE to Prevent Macroless Code Execution in Office Apps\",\"datePublished\":\"2017-10-27T13:00:45+00:00\",\"dateModified\":\"2025-05-29T06:34:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/configuring-mcafee-ens-and-vse-to-prevent-macroless-code-execution-in-office-apps\/\"},\"wordCount\":827,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/configuring-mcafee-ens-and-vse-to-prevent-macroless-code-execution-in-office-apps\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-1.jpg\",\"keywords\":[\"computer security\",\"cybersecurity\",\"endpoint protection\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/configuring-mcafee-ens-and-vse-to-prevent-macroless-code-execution-in-office-apps\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/configuring-mcafee-ens-and-vse-to-prevent-macroless-code-execution-in-office-apps\/\",\"name\":\"Configuring McAfee ENS and VSE to Prevent Macroless Code Execution in Office Apps\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/configuring-mcafee-ens-and-vse-to-prevent-macroless-code-execution-in-office-apps\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/configuring-mcafee-ens-and-vse-to-prevent-macroless-code-execution-in-office-apps\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-1.jpg\",\"datePublished\":\"2017-10-27T13:00:45+00:00\",\"dateModified\":\"2025-05-29T06:34:28+00:00\",\"description\":\"Microsoft Office macros are a popular method of distributing malware. Users can defend themselves against macro attacks by disabling macros.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/configuring-mcafee-ens-and-vse-to-prevent-macroless-code-execution-in-office-apps\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/configuring-mcafee-ens-and-vse-to-prevent-macroless-code-execution-in-office-apps\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/configuring-mcafee-ens-and-vse-to-prevent-macroless-code-execution-in-office-apps\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-1.jpg\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-1.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/configuring-mcafee-ens-and-vse-to-prevent-macroless-code-execution-in-office-apps\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Configuring McAfee ENS and VSE to Prevent Macroless Code Execution in Office Apps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/6f3d786f48d4d3aa0ffaf0d54a53bc4f\",\"name\":\"Yerko Grbic\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/8592f4bde0c38a3626ed4a7451ed3bdb\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/02\/Yerko-Grbic-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/02\/Yerko-Grbic-96x96.jpg\",\"caption\":\"Yerko Grbic\"},\"sameAs\":[\"https:\/\/www.facebook.com\/yerko.grbic\",\"https:\/\/www.linkedin.com\/in\/yerko-grbic-reyes-a56a1622\/\",\"https:\/\/x.com\/Yerko_Grbic\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/yerko-grbic\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Configuring McAfee ENS and VSE to Prevent Macroless Code Execution in Office Apps","description":"Microsoft Office macros are a popular method of distributing malware. Users can defend themselves against macro attacks by disabling macros.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Configuring McAfee ENS and VSE to Prevent Macroless Code Execution in Office Apps","og_description":"Microsoft Office macros are a popular method of distributing malware. Users can defend themselves against macro attacks by disabling macros.","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/configuring-mcafee-ens-and-vse-to-prevent-macroless-code-execution-in-office-apps\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/yerko.grbic","article_published_time":"2017-10-27T13:00:45+00:00","article_modified_time":"2025-05-29T06:34:28+00:00","og_image":[{"width":1431,"height":713,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171023-DDE-1.jpg","type":"image\/jpeg"}],"author":"Yerko Grbic","twitter_card":"summary_large_image","twitter_creator":"@Yerko_Grbic","twitter_site":"@McAfee","twitter_misc":{"Written by":"Yerko Grbic","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/configuring-mcafee-ens-and-vse-to-prevent-macroless-code-execution-in-office-apps\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/configuring-mcafee-ens-and-vse-to-prevent-macroless-code-execution-in-office-apps\/"},"author":{"name":"Yerko Grbic","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/6f3d786f48d4d3aa0ffaf0d54a53bc4f"},"headline":"Configuring McAfee ENS and VSE to Prevent Macroless Code Execution in Office Apps","datePublished":"2017-10-27T13:00:45+00:00","dateModified":"2025-05-29T06:34:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/configuring-mcafee-ens-and-vse-to-prevent-macroless-code-execution-in-office-apps\/"},"wordCount":827,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/configuring-mcafee-ens-and-vse-to-prevent-macroless-code-execution-in-office-apps\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-1.jpg","keywords":["computer security","cybersecurity","endpoint protection"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/configuring-mcafee-ens-and-vse-to-prevent-macroless-code-execution-in-office-apps\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/configuring-mcafee-ens-and-vse-to-prevent-macroless-code-execution-in-office-apps\/","name":"Configuring McAfee ENS and VSE to Prevent Macroless Code Execution in Office Apps","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/configuring-mcafee-ens-and-vse-to-prevent-macroless-code-execution-in-office-apps\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/configuring-mcafee-ens-and-vse-to-prevent-macroless-code-execution-in-office-apps\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-1.jpg","datePublished":"2017-10-27T13:00:45+00:00","dateModified":"2025-05-29T06:34:28+00:00","description":"Microsoft Office macros are a popular method of distributing malware. Users can defend themselves against macro attacks by disabling macros.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/configuring-mcafee-ens-and-vse-to-prevent-macroless-code-execution-in-office-apps\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/configuring-mcafee-ens-and-vse-to-prevent-macroless-code-execution-in-office-apps\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/configuring-mcafee-ens-and-vse-to-prevent-macroless-code-execution-in-office-apps\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-1.jpg","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171023-DDE-1.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/configuring-mcafee-ens-and-vse-to-prevent-macroless-code-execution-in-office-apps\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Configuring McAfee ENS and VSE to Prevent Macroless Code Execution in Office Apps"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/6f3d786f48d4d3aa0ffaf0d54a53bc4f","name":"Yerko Grbic","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/8592f4bde0c38a3626ed4a7451ed3bdb","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/02\/Yerko-Grbic-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/02\/Yerko-Grbic-96x96.jpg","caption":"Yerko Grbic"},"sameAs":["https:\/\/www.facebook.com\/yerko.grbic","https:\/\/www.linkedin.com\/in\/yerko-grbic-reyes-a56a1622\/","https:\/\/x.com\/Yerko_Grbic"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/yerko-grbic\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/81454","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/770"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=81454"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/81454\/revisions"}],"predecessor-version":[{"id":214682,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/81454\/revisions\/214682"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=81454"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=81454"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=81454"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=81454"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}