

įor C0011, Transparent Tribe used malicious VBA macros within a lure document as part of the Crimson malware installation process onto a compromised host. īumblebee can create a Visual Basic script to enable persistence. īRONZE BUTLER has used VBS and VBE scripts for execution.

īisonal's dropper creates VBS scripts on the victim’s machine. īandook has used malicious VBA code against the target system. īackConfig has used VBS to install its downloader component and malicious documents with VBA macro code. Īstaroth has used malicious VBS e-mail attachments for execution.

ĪPT39 has utilized malicious VBS scripts in malware. ĪPT38 has used VBScript to execute commands and other operational tasks. ĪPT37 executes shellcode and a VBA script to decode Base64 strings. ĪPT33 has used VBScript to initiate the delivery of payloads. ĪPT32 has used macros, COM scriptlets, and VBS scripts. ĪPT29 has written malware variants in Visual Basic. ĪPT-C-36 has embedded a VBScript within a malicious Word document which is executed upon the document opening. Common malicious usage includes automating execution of behaviors with VBScript or embedding VBA content into Spearphishing Attachment payloads (which may also involve Mark-of-the-Web Bypass to enable execution). Īdversaries may use VB payloads to execute malicious commands. VBScript is a default scripting language on Windows hosts and can also be used in place of JavaScript on HTML Application (HTA) webpages served to Internet Explorer (though most modern browsers do not come with VBScript support). VBA enables documents to contain macros used to automate the execution of tasks and other functionality on the host. VBA is an event-driven programming language built into Microsoft Office, as well as several third-party applications. ĭerivative languages based on VB have also been created, such as Visual Basic for Applications (VBA) and VBScript. Although tagged as legacy with no planned future evolutions, VB is integrated and supported in the. VB is a programming language created by Microsoft with interoperability with many Windows technologies such as Component Object Model and the Native API through the Windows API. Adversaries may abuse Visual Basic (VB) for execution.
