Zeroska
  • 🐱Zeroska - The Bold
  • Computer/Cyber Security
    • ⭐Fresh off the boat - for new Blue Teamer/ SOC Analyst
    • 💀Necromancer (DFIR)
      • 🕵️DFIR and DFIR case
        • 🗃️Case Files
          • Misconfiguration 0x01
      • 📔My own DFIR notes
        • The Mark of The Web (MOTW)
        • LNK Shortcut
        • Prefetch, AmCache, ShimCache in Windows
        • Malicious Document (VBA, Office, PDF, ...)
        • SRUM (System Resource Usage Monitor)
        • Volatility notes
        • Understand Logon Session in Windows
        • "Very" Hidden sheets in Excel
        • Hidden Processes
      • 📔Notes
        • Useful Resources
        • Useful Resources DFIR
        • Saved Content (Backup for the OG content get deleted)
          • How to be best SOC analyst ever
    • 🧙‍♂️Defense Witchcraft
      • Data Analysis as a Defender
      • Active Directory
      • Windows Event Logs
        • Authentication (Windows Account Life Cycle Events)
      • MS Exchange
      • Windows
    • 💙My Current Blue Team Operation
      • VLAN Monitoring Template
      • Daily Monitoring Report
      • General Playbook
      • JupyterHub Configuration Guide
      • How to train your Blue Team
    • 🏭ICS/OT
      • Setup ICS/OT Simulation Learning Lab
      • Smart Grids
      • Learning Modbus TCP
      • Learning DNP3
      • Resources/Blogs/Links
    • 🥷Threat Intelligence
      • Small Cyber Threat Intelligence Program
      • Intelligence Analysis [VN]
      • OSINT Information Monitoring
        • Telegram Info-Stealer Monitoring
      • C2 Tracker
      • Fake Website Tracker
      • Dark Web Investigation Attempt
      • Threat Intelligence Quick Win
      • Resources/Blogs/Links
  • 😒Computer and Technology
    • My Home Lab Setup
    • 🐴ELK Stack
      • Useful Resources
      • ELK Stack - Container - Docker Compose - AWS ECS
      • ECS - Elastic Common Schema
      • Elasticsearch
      • Logstash
      • Troubleshooting and Problems
    • 🐧Linux
      • Setting up good SSH Authentication
      • Configure Auditd and how to leverage it
      • ELF Format
      • Useful Links
    • 📦Containers
      • Docker container logs is quite big
      • Worth Reading
    • 🪠Splunk Learning Experience
      • Splunk Test Lab
      • Data Collection Tier (How to get the data)
      • SC4S Custom Filter For Windows Event Log in Syslog Format (NXLog)
      • Useful Resources
  • Threat Hunting
    • Hunting for Implant
    • Using STRIDE and DREAD
    • 🐳Predators and Preys (Computing)
      • Tracks or Hunting Artifacts
    • 📦Network Packet Analysis
      • The Basic
      • Tshark | Zeek Copy & Paste
      • Network Analysis Resources
    • Grep | Powershell Search | Regex
    • Hunting Resources
  • 🎵In my remains
    • Choices
    • The Art of Facing Unknown Problems
    • Build the best DFIR team
    • Reverse Engineering - Đồ án hướng ngành A "Hụt" của tôi
Powered by GitBook
On this page
  • How to detect hidden sheets
  • Check the BOUNDSHEET value
  • Using oledump's plugin_biff

Was this helpful?

  1. Computer/Cyber Security
  2. Necromancer (DFIR)
  3. My own DFIR notes

"Very" Hidden sheets in Excel

Using oletool to analyse and detect hidden sheet

PreviousUnderstand Logon Session in WindowsNextHidden Processes

Last updated 2 years ago

Was this helpful?

Although Microsoft has disabled VBA Macro by default if it comes from external (from the internet) in August. The usage of VBA Excel 4.0 Macro has significantly decreased by 68%.

How to detect hidden sheets

The link above already explains very well about this topic, but I want to dig a little bit deeper.

Check the BOUNDSHEET value

The byte value at position 5 in a BOUNDSHEET record defines the visibility of a sheet:

  • Visible (0x00)

  • Hidden (0x01)

  • Very hidden (0x02)

What is BOUNDSHEET anyway? This record contains the name of a sheet in the Excel file along with the sheet type and the position of the sheet within a stream. It looks like this when you use oledump to analyze the excel file

Using oledump's plugin_biff

This plugin will carve the data out of the biff header which it can identify by looking for the biff header which is the first 8 bytes of the file below are BIFF version 5 and its magic compound number (you can check the format of biff header right here )

# urgh you must install the plugin which calls plugin_biff.py (maybe it has already been installed)
# And also you need to install oledump.py 
# https://blog.didierstevens.com/programs/oledump-py/
oledump.py -p /opt/oledump-files/plugin_biff.py --pluginoptions "-x" sample2-b5d469a07709b5ca6fee934b1e5e8e38.bin | less

💀
📔
https://isc.sans.edu/diary/Excel+Maldocs%3A+Hidden+Sheets/25876
https://clickallthethings.wordpress.com/2020/04/06/covid-19-excel-4-0-macros-and-sandbox-detection/
https://blog.reversinglabs.com/blog/excel-4.0-macros
https://www.openoffice.org/sc/compdocfileformat.pdf
https://www.openoffice.org/sc/compdocfileformat.pdf
The output of the plugin