decalage2 / oletools

oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.
http://www.decalage.info/python/oletools
Other
2.94k stars 564 forks source link

CLSIDs (updated on 2018-05-09) #299

Closed ghost closed 6 years ago

ghost commented 6 years ago
Object_CLSIDs = {
    # Package Object
    "{F20DA720-C02F-11CE-927B-0800095AE340}": "OLE Package Object",
    "{00020C01-0000-0000-C000-000000000046}": "OLE Package Object",
    "{00022601-0000-0000-C000-000000000046}": "OLE Package Object",
    "{00022602-0000-0000-C000-000000000046}": "OLE Package Object",
    "{00022603-0000-0000-C000-000000000046}": "OLE Package Object",
    "{0003000C-0000-0000-C000-000000000046}": "OLE Package Object",
    "{0003000D-0000-0000-C000-000000000046}": "OLE Package Object",
    "{0003000E-0000-0000-C000-000000000046}": "OLE Package Object",

    # Equation Object
    "{00021700-0000-0000-C000-000000000046}": "Microsoft Equation 2.0 (Known Related to CVE-2017-11882 or CVE-2018-0802)",
    "{0002CE02-0000-0000-C000-000000000046}": "Microsoft Equation 3.0 (Known Related to CVE-2017-11882 or CVE-2018-0802)",
    "{0002CE03-0000-0000-C000-000000000046}": "MathType Equation Object",

    "{00020900-0000-0000-C000-000000000046}": "Word.Document.6",
    "{00020906-0000-0000-C000-000000000046}": "Word.Document.8",
    "{F4754C9B-64F5-4B40-8AF4-679732AC0607}": "Word.Document.12",
    "{00020810-0000-0000-C000-000000000046}": "Excel.Sheet.5",
    "{00020811-0000-0000-C000-000000000046}": "Excel.Chart.5",
    "{00020820-0000-0000-C000-000000000046}": "Excel.Sheet.8",
    "{00020821-0000-0000-C000-000000000046}": "Excel.Chart.8",
    "{00020830-0000-0000-C000-000000000046}": "Excel.Sheet.12",
    "{00020832-0000-0000-C000-000000000046}": "Excel.SheetMacroEnabled.12",
    "{00020833-0000-0000-C000-000000000046}": "Excel.SheetBinaryMacroEnabled.12",
    "{64818D10-4F9B-11CF-86EA-00AA00B929E8}": "Powerpoint.Show.8",
    "{64818D11-4F9B-11CF-86EA-00AA00B929E8}": "Powerpoint.Slide.8",
    "{CF4F55F4-8F87-4D47-80BB-5808164BB3F8}": "Powerpoint.Show.12",
    "{048EB43E-2059-422F-95E0-557DA96038AF}": "Powerpoint.Slide.12",

    "{00000300-0000-0000-C000-000000000046}": "StdOleLink (Known Related to CVE-2017-0199, CVE-2017-8570 or CVE-2017-8759)",
    "{00000535-0000-0010-8000-00AA006D2EA4}": "ADODB.RecordSet (Known Related to CVE-2015-0097)",
    "{05741520-C4EB-440A-AC3F-9643BBC9F847}": "otkloadr.WRLoader (Known Related to CVE-2015-1641)",
    "{0CF774D0-F077-11D1-B1BC-00C04F86C324}": "HTML.HostEncode",
    "{0D43FE01-F093-11CF-8940-00A0C9054228}": "Scripting.FileSystemObject",
    "{0E59F1D5-1FBE-11D0-8FF2-00A0D10038BC}": "MSScriptControl.ScriptControl  (Known Related to CVE-2015-0097)",
    "{1461A561-24E8-4BA3-8D4A-FFEEF980556B}": "BCSAddin.Connect (Known Related to CVE-2016-0042)",
    "{14CE31DC-ABC2-484C-B061-CF3416AED8FF}": "Loads WUAEXT.DLL (Known Related to CVE-2015-6128)",
    "{1D8A9B47-3A28-4CE2-8A4B-BD34E45BCEEB}": "UPnP.DescriptionDocument",
    "{1EFB6596-857C-11D1-B16A-00C0F0283628}": "MSCOMCTL.TabStrip (Known Related to CVE-2012-1856 & CVE-2013-3906)",
    "{23CE100B-1390-49D6-BA00-F17D3AEE149C}": "UmOutlookAddin.UmEvmCtrl (Known Related to CVE-2016-0042)",
    "{33BD73C2-7BB4-48F4-8DBC-82B8B313AE16}": "osf.SandboxManager (Known Related To CVE-2015-1770)",
    "{33FD0563-D81A-4393-83CC-0195B1DA2F91}": "UPnP.DescriptionDocumentEx",
    "{394C052E-B830-11D0-9A86-00C04FD8DBF7}": "Loads ELSEXT.DLL (Known Related to CVE-2015-6128)",
    "{3BA59FA5-41BF-4820-98E4-04645A806698}": "osf.SandboxContent (Known Related To CVE-2015-1770)",
    "{41B9BE05-B3AF-460C-BF0B-2CDD44A093B1}": "Search.XmlContentFilter",
    "{4315D437-5B8C-11D0-BD3B-00A0C911CE86}": "Device Moniker (Known Related to CVE-2016-0015)",
    "{4C599241-6926-101B-9992-00000B65C6F9}": "Forms.Image (Known Related to CVE-2015-2424)",
    "{44F9A03B-A3EC-4F3B-9364-08E0007F21DF}": "Control.TaskSymbol (Known Related to CVE-2015-1642 & CVE-2015-2424)",
    "{46E31370-3F7A-11CE-BED6-00AA00611080}": "Forms.MultiPage",
    "{4D3263E4-CAB7-11D2-802A-0080C703929C}": "AutoCAD 2000-2002 Document",
    "{5E4405B0-5374-11CE-8E71-0020AF04B1D7}": "AutoCAD R14 Document",
    "{6A221957-2D85-42A7-8E19-BE33950D1DEB}": "AutoCAD 2013 Document",
    "{6AD4AE40-2FF1-4D88-B27A-F76FC7B40440}": "BCSAddin.ManageSolutionHelper (Known Related to CVE-2016-0042)",
    "{6E182020-F460-11CE-9BCD-00AA00608E01}": "Forms.Frame",
    "{66833FE6-8583-11D1-B16A-00C0F0283628}": "MSCOMCTL.Toolbar (Known Related to CVE-2012-0158 & CVE-2012-1856)",
    "{799ED9EA-FB5E-11D1-B7D6-00C04FC2AAE2}": "Microsoft.VbaAddin (Known Related to CVE-2016-0042)",
    "{79EAC9D0-BAF9-11CE-8C82-00AA004BA90B}": "StdHlink",
    "{79EAC9D1-BAF9-11CE-8C82-00AA004BA90B}": "StdHlinkBrowseContext",
    "{79EAC9E2-BAF9-11CE-8C82-00AA004BA90B}": "(http:) Asychronous Pluggable Protocol Handler",
    "{79EAC9E3-BAF9-11CE-8C82-00AA004BA90B}": "(ftp:) Asychronous Pluggable Protocol Handler",
    "{79EAC9E5-BAF9-11CE-8C82-00AA004BA90B}": "(https:) Asychronous Pluggable Protocol Handler",
    "{79EAC9E6-BAF9-11CE-8C82-00AA004BA90B}": "(mk:) Asychronous Pluggable Protocol Handler",
    "{79EAC9E7-BAF9-11CE-8C82-00AA004BA90B}": "(file:, local:) Asychronous Pluggable Protocol Handler",
    "{7AABBB95-79BE-4C0F-8024-EB6AF271231C}": "AutoCAD 2007-2009 Document",
    "{85131630-480C-11D2-B1F9-00C04F86C324}": "JSFile.HostEncode",
    "{85131631-480C-11D2-B1F9-00C04F86C324}": "VBSFile.HostEncode",
    "{8627E73B-B5AA-4643-A3B0-570EDA17E3E7}": "UmOutlookAddin.ButtonBar (Known Related to CVE-2016-0042)",
    "{8E75D913-3D21-11D2-85C4-080009A0C626}": "AutoCAD 2004-2006 Document",
    "{975797FC-4E2A-11D0-B702-00C04FD8DBF7}": "Loads ELSEXT.DLL (Known Related to CVE-2015-6128)",
    "{A08A033D-1A75-4AB6-A166-EAD02F547959}": "otkloadr.WRAssembly  (Known Related to CVE-2015-1641)",
    "{B54F3741-5B07-11CF-A4B0-00AA004A55E8}": "VBS, VBScript",
    "{BDD1F04B-858B-11D1-B16A-00C0F0283628}": "MSCOMCTL.ListViewCtrl (Known Related to CVE-2012-0158)",
    "{C08AFD90-F2A1-11D1-8455-00A0C91F3880}": "ShellBrowserWindow",
    "{C62A69F0-16DC-11CE-9E98-00AA00574A4F}": "Forms.Form",
    "{C74190B6-8589-11D1-B16A-00C0F0283628}": "MSCOMCTL.TreeCtrl (Known Related to CVE-2012-0158)",
    "{CCD068CD-1260-4AEA-B040-A87974EB3AEF}": "UmOutlookAddin.RoomsCTP (Known Related to CVE-2016-0042)",
    "{CDDBCC7C-BE18-4A58-9CBF-D62A012272CE}": "osf.Sandbox (Known Related To CVE-2015-1770)",
    "{CDF1C8AA-2D25-43C7-8AFE-01F73A3C66DA}": "UmOutlookAddin.InspectorContext (Known Related to CVE-2016-0042)",
    "{D27CDB6E-AE6D-11CF-96B8-444553540000}": "Shockwave Flash Object",
    "{D50FED35-0A08-4B17-B3E0-A8DD0EDE375D}": "UmOutlookAddin.PlayOnPhoneDlg (Known Related to CVE-2016-0042)",
    "{D70E31AD-2614-49F2-B0FC-ACA781D81F3E}": "AutoCAD 2010-2012 Document",
    "{D93CE8B5-3BF8-462C-A03F-DED2730078BA}": "Loads WUAEXT.DLL (Known Related to CVE-2015-6128)",
    "{DD9DA666-8594-11D1-B16A-00C0F0283628}": "MSCOMCTL.ImageComboCtrl (Known Related to CVE-2014-1761)",
    "{E5CA59F5-57C4-4DD8-9BD6-1DEEEDD27AF4}": "InkEd.InkEdit",
    "{E8CC4CBF-FDFF-11D0-B865-00A0C9081C1D}": "Loads OCI.DLL (Known Related to CVE-2015-6128)",
    "{ECABAFC9-7F19-11D2-978E-0000F8757E2A}": "Loads MQRT.DLL (Known Related to CVE-2015-6128)",
    "{ECF44975-786E-462F-B02A-CBCCB1A2C4A2}": "UmOutlookAddin.FormRegionContext (Known Related to CVE-2016-0042)",
    "{F414C260-6AC0-11CF-B6D1-00AA00BBBB58}": "ECMAScript, JavaScript, JScript, LiveScript",
    "{F959DBBB-3867-41F2-8E5F-3B8BEFAA81B3}": "UmOutlookAddin.FormRegionAddin (Known Related to CVE-2016-0042)",
}
decalage2 commented 6 years ago

I merged all those CLSIDs in commits 1016bf9 and 7888b62. It would be easier to manage with pull requests. :-)