<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Macros on Policy to Packets</title>
    <link>https://www.policytopackets.com/tags/macros/</link>
    <description>Recent content in Macros on Policy to Packets</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <managingEditor>reedveggleston@gmail.com (Reed Eggleston)</managingEditor>
    <webMaster>reedveggleston@gmail.com (Reed Eggleston)</webMaster>
    <copyright>© 2026 Reed Eggleston</copyright>
    <lastBuildDate>Thu, 26 Feb 2026 14:23:00 +0000</lastBuildDate><atom:link href="https://www.policytopackets.com/tags/macros/index.xml" rel="self" type="application/rss+xml" />
    
    <item>
      <title>(Writeup) LetsDefend EventID: 76 - [SOC137 - Malicious File/Script Download Attempt]</title>
      <link>https://www.policytopackets.com/writeups/letsdefend/soc/137_76/</link>
      <pubDate>Thu, 26 Feb 2026 14:23:00 +0000</pubDate>
      <author>reedveggleston@gmail.com (Reed Eggleston)</author>
      <guid>https://www.policytopackets.com/writeups/letsdefend/soc/137_76/</guid>
      <description>Investigating a malicious DOCM download attempt, validating the file hash via VirusTotal, confirming no execution or C2 communication occurred, and verifying the threat was successfully blocked before impact.</description>
      
    </item>
    
    <item>
      <title>(Writeup) LetsDefend EventID: 16 - [SOC105 - Requested T.I. URL address]</title>
      <link>https://www.policytopackets.com/writeups/letsdefend/soc/105_16/</link>
      <pubDate>Wed, 25 Feb 2026 15:45:00 +0000</pubDate>
      <author>reedveggleston@gmail.com (Reed Eggleston)</author>
      <guid>https://www.policytopackets.com/writeups/letsdefend/soc/105_16/</guid>
      <description>Investigating a threat intelligence alert after an endpoint connected to a known malicious domain, correlating firewall logs to a macro-enabled Excel file execution, validating the malware through VirusTotal, and initiating containment following confirmed C2 communication.</description>
      
    </item>
    
    <item>
      <title>(Writeup) LetsDefend EventID: 77 - [SOC138 - Detected Suspicious Xls File]</title>
      <link>https://www.policytopackets.com/writeups/letsdefend/soc/138_77/</link>
      <pubDate>Mon, 23 Feb 2026 13:36:00 +0000</pubDate>
      <author>reedveggleston@gmail.com (Reed Eggleston)</author>
      <guid>https://www.policytopackets.com/writeups/letsdefend/soc/138_77/</guid>
      <description>Investigating a suspicious Excel macro alert after a malicious XLSM file executed on an endpoint, validating malware through VirusTotal and Hybrid Analysis, correlating outbound encrypted traffic to a confirmed C2 server, and initiating containment following confirmed compromise.</description>
      
    </item>
    
    <item>
      <title>(Writeup) LetsDefend Challenge - Excel 4.0 Macros</title>
      <link>https://www.policytopackets.com/writeups/letsdefend/challenges/excel_4.0_macros/</link>
      <pubDate>Sat, 14 Feb 2026 00:39:00 +0000</pubDate>
      <author>reedveggleston@gmail.com (Reed Eggleston)</author>
      <guid>https://www.policytopackets.com/writeups/letsdefend/challenges/excel_4.0_macros/</guid>
      <description>Analyzing a malicious Excel 4.0 (XLM) macro document using XLMMacroDeobfuscator and oletools to identify process execution, regsvr32 abuse, and DLL payload behavior.</description>
      
    </item>
    
  </channel>
</rss>
