Skip to main content

Python tools to analyze security characteristics of MS Office and OLE files (also called Structured Storage, Compound File Binary Format or Compound Document File Format), for Malware Analysis and Incident Response #DFIR

Project description

vtx-oletools (Vertex Project Fork)

This is the Vertex Project fork of python-oletools, published as vtx-oletools on PyPI. The upstream project is maintained by Philippe Lagadec at decalage2/oletools.

python-oletools

PyPI

oletools is a package of python tools to analyze Microsoft OLE2 files (also called Structured Storage, Compound File Binary Format or Compound Document File Format), such as Microsoft Office 97-2003 documents, MSI files or Outlook messages, mainly for malware analysis, forensics and debugging. It is based on the olefile parser.

It also provides tools to analyze RTF files and files based on the OpenXML format (aka OOXML) such as MS Office 2007+ documents, XPS or MSIX files.

For example, oletools can detect, extract and analyse VBA macros, OLE objects, Excel 4 macros (XLM) and DDE links.

See http://www.decalage.info/python/oletools for more info.

Quick links: Home page - Download/Install - Documentation - Report Issues/Suggestions/Questions - Contact the Author - Repository - Updates on Twitter Cheatsheet

Note: python-oletools is not related to OLETools published by BeCubed Software.

News

  • 2026-05-13 v1.0.0 (Vertex Project fork):
    • Removed xxxswf third-party component (non-BSD license) (PR #1)
    • Removed pcodedmp runtime dependency (non-BSD license) (PR #1)
    • Dropped Python 2 support; requires Python 3.11+ (PR #2)
    • Release prep: LICENSE, pyproject.toml, bumpversion (PR #3)
  • 2025-05-22 v0.60.3:
    • olevba:
      • fixed a security issue in the CLI display when ANSI escape codes are present (PR #873)
      • encrypted files: password is now reported in the logs, added --decrypted_dir option (PR #842)
  • 2024-07-02 v0.60.2:
    • olevba:
      • fixed a bug in open_slk (issue #797, PR #769)
      • fixed a bug due to new PROJECTCOMPATVERSION record in dir stream (PR #723, issues #700, #701, #725, #791, #808, #811, #833)
    • oleobj: fixed SyntaxError with Python 3.12 (PR #855), SyntaxWarning (PR #774)
    • rtfobj: fixed SyntaxError with Python 3.12 (PR #854)
    • clsid: added CLSIDs for MSI, Zed
    • ftguess: added MSI, PNG and OneNote formats
    • pyxswf: fixed python 3.12 compatibility (PR #841, issue #813)
    • setup/requirements: allow pyparsing 3 to solve install issues (PR #812, issue #762)
  • 2022-05-09 v0.60.1:
    • olevba:
      • fixed a bug when calling XLMMacroDeobfuscator (PR #737)
      • removed keyword "sample" causing false positives
    • oleid: fixed OleID init issue (issue #695, PR #696)
    • oleobj:
      • added simple detection of CVE-2021-40444 initial stage
      • added detection for customUI onLoad
      • improved handling of incorrect filenames in OLE package (PR #451)
    • rtfobj: fixed code to find URLs in OLE2Link objects for Py3 (issue #692)
    • ftguess:
      • added PowerPoint and XPS formats (PR #716)
      • fixed issue with XPS and malformed documents (issue #711)
      • added XLSB format (issue #758)
    • improved logging with common module log_helper (PR #449)
  • 2021-06-02 v0.60:
    • ftguess: new tool to identify file formats and containers (issue #680)
    • oleid: (issue #679)
      • each indicator now has a risk level
      • calls ftguess to identify file formats
      • calls olevba+mraptor to detect and analyse VBA+XLM macros
    • olevba:
      • when XLMMacroDeobfuscator is available, use it to extract and deobfuscate XLM macros
    • rtfobj:
      • use ftguess to identify file type of OLE Package (issue #682)
      • fixed bug in re_executable_extensions
    • crypto: added PowerPoint transparent password '/01Hannes Ruescher/01' (issue #627)
    • setup: XLMMacroDeobfuscator, xlrd2 and pyxlsb2 added as optional dependencies

See the full changelog for more information.

Tools:

Tools to analyze malicious documents

  • oleid: to analyze OLE files to detect specific characteristics usually found in malicious files.
  • olevba: to extract and analyze VBA Macro source code from MS Office documents (OLE and OpenXML).
  • MacroRaptor: to detect malicious VBA Macros
  • msodde: to detect and extract DDE/DDEAUTO links from MS Office documents, RTF and CSV
  • pyxswf: to detect, extract and analyze Flash objects (SWF) that may be embedded in files such as MS Office documents (e.g. Word, Excel) and RTF, which is especially useful for malware analysis.
  • oleobj: to extract embedded objects from OLE files.
  • rtfobj: to extract embedded objects from RTF files.

Tools to analyze the structure of OLE files

  • olebrowse: A simple GUI to browse OLE files (e.g. MS Word, Excel, Powerpoint documents), to view and extract individual data streams.
  • olemeta: to extract all standard properties (metadata) from OLE files.
  • oletimes: to extract creation and modification timestamps of all streams and storages.
  • oledir: to display all the directory entries of an OLE file, including free and orphaned entries.
  • olemap: to display a map of all the sectors in an OLE file.

Projects using oletools:

oletools are used by a number of projects and online malware analysis services, including ACE, ADAPT, Anlyz.io, AssemblyLine, Binary Refinery, CAPE, CinCan, Cortex XSOAR (Palo Alto), Cuckoo Sandbox, DARKSURGEON, Deepviz, DIARIO, dridex.malwareconfig.com, EML Analyzer, EXPMON, FAME, FLARE-VM, GLIMPS Malware, Hybrid-analysis.com, InQuest Labs, IntelOwl, Joe Sandbox, Laika BOSS, MacroMilter, mailcow, malshare.io, malware-repo, Malware Repository Framework (MRF), MalwareBazaar, olefy, Pandora, PeekabooAV, pcodedmp, PyCIRCLean, QFlow, Qu1cksc0pe, Tylabs QuickSand, REMnux, Snake, SNDBOX, Splunk add-on for MS O365 Email, SpuriousEmu, Strelka, stoQ, Sublime Platform/MQL, Subparse, TheHive/Cortex, ThreatBoook, TSUGURI Linux, Vba2Graph, Viper, ViperMonkey, YOMI, and probably VirusTotal, FileScan.IO. And quite a few other projects on GitHub. (Please contact me if you have or know a project using oletools)

Download and Install:

The recommended way to download and install/update the latest stable release of oletools is to use pip:

  • On Linux/Mac: sudo -H pip install -U oletools[full]
  • On Windows: pip install -U oletools[full]

This should automatically create command-line scripts to run each tool from any directory: olevba, mraptor, rtfobj, etc.

The keyword [full] means that all optional dependencies will be installed, such as XLMMacroDeobfuscator. If you prefer a lighter version without optional dependencies, just remove [full] from the command line.

To get the latest development version instead:

  • On Linux/Mac: sudo -H pip install -U https://github.com/decalage2/oletools/archive/master.zip
  • On Windows: pip install -U https://github.com/decalage2/oletools/archive/master.zip

See the documentation for other installation options.

Documentation:

The latest version of the documentation can be found online, otherwise a copy is provided in the doc subfolder of the package.

How to Suggest Improvements, Report Issues or Contribute:

This is a personal open-source project, developed on my spare time. Any contribution, suggestion, feedback or bug report is welcome.

To suggest improvements, report a bug or any issue, please use the issue reporting page, providing all the information and files to reproduce the problem.

You may also contact the author directly to provide feedback.

The code is available in a GitHub repository. You may use it to submit enhancements using forks and pull requests.

License

This license applies to the python-oletools package, apart from the thirdparty folder which contains third-party files published with their own license.

The python-oletools package is copyright (c) 2012-2024 Philippe Lagadec (http://www.decalage.info)

All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

  • Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
  • Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.


olevba contains modified source code from the officeparser project, published under the following MIT License (MIT):

officeparser is copyright (c) 2014 John William Davison

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

vtx_oletools-1.0.0.tar.gz (3.1 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

vtx_oletools-1.0.0-py3-none-any.whl (903.3 kB view details)

Uploaded Python 3

File details

Details for the file vtx_oletools-1.0.0.tar.gz.

File metadata

  • Download URL: vtx_oletools-1.0.0.tar.gz
  • Upload date:
  • Size: 3.1 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.12

File hashes

Hashes for vtx_oletools-1.0.0.tar.gz
Algorithm Hash digest
SHA256 1538f1ddd558d250bfa55b429bc1940230dc23039e53e938b8b53cf73f9c00f4
MD5 2e755898edc8e8920a3e4635a53695ab
BLAKE2b-256 f0fc41a53c5e4c6d89c576b1d99d4f56e213ff96a8777f5727863c71c36d67c8

See more details on using hashes here.

File details

Details for the file vtx_oletools-1.0.0-py3-none-any.whl.

File metadata

  • Download URL: vtx_oletools-1.0.0-py3-none-any.whl
  • Upload date:
  • Size: 903.3 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.12

File hashes

Hashes for vtx_oletools-1.0.0-py3-none-any.whl
Algorithm Hash digest
SHA256 8024cc463b55792219f96aeb409448c1ba6b78adac11c439b1d7a33a2b0c3d9b
MD5 d952718abf9fb37c21905c3c191429fa
BLAKE2b-256 2301f3ba8df719463734c57df67e1c1aa28112075247a983bade0dc6ba88ad5d

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page