T1559.002 Dynamic Data Exchange Mappings

Adversaries may use Windows Dynamic Data Exchange (DDE) to execute arbitrary commands. DDE is a client-server protocol for one-time and/or continuous inter-process communication (IPC) between applications. Once a link is established, applications can autonomously exchange transactions consisting of strings, warm data links (notifications when a data item changes), hot data links (duplications of changes to a data item), and requests for command execution.

Object Linking and Embedding (OLE), or the ability to link data between documents, was originally implemented through DDE. Despite being superseded by Component Object Model, DDE may be enabled in Windows 10 and most of Microsoft Office 2016 via Registry keys. (Citation: BleepingComputer DDE Disabled in Word Dec 2017) (Citation: Microsoft ADV170021 Dec 2017) (Citation: Microsoft DDE Advisory Nov 2017)

Microsoft Office documents can be poisoned with DDE commands (Citation: SensePost PS DDE May 2016) (Citation: Kettle CSV DDE Aug 2014), directly or through embedded files (Citation: Enigma Reviving DDE Jan 2018), and used to deliver execution via Phishing campaigns or hosted Web content, avoiding the use of Visual Basic for Applications (VBA) macros. (Citation: SensePost MacroLess DDE Oct 2017) DDE could also be leveraged by an adversary operating on a compromised machine who does not have direct access to a Command and Scripting Interpreter. DDE execution can be invoked remotely via Remote Services such as Distributed Component Object Model (DCOM).(Citation: Fireeye Hunting COM June 2019)

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name
AC-4 Information Flow Enforcement Protects T1559.002 Dynamic Data Exchange
AC-6 Least Privilege Protects T1559.002 Dynamic Data Exchange
CM-10 Software Usage Restrictions Protects T1559.002 Dynamic Data Exchange
CM-2 Baseline Configuration Protects T1559.002 Dynamic Data Exchange
CM-6 Configuration Settings Protects T1559.002 Dynamic Data Exchange
CM-7 Least Functionality Protects T1559.002 Dynamic Data Exchange
CM-8 System Component Inventory Protects T1559.002 Dynamic Data Exchange
RA-5 Vulnerability Monitoring and Scanning Protects T1559.002 Dynamic Data Exchange
SC-18 Mobile Code Protects T1559.002 Dynamic Data Exchange
SC-3 Security Function Isolation Protects T1559.002 Dynamic Data Exchange
SC-7 Boundary Protection Protects T1559.002 Dynamic Data Exchange
SI-2 Flaw Remediation Protects T1559.002 Dynamic Data Exchange
SI-3 Malicious Code Protection Protects T1559.002 Dynamic Data Exchange
SI-4 System Monitoring Protects T1559.002 Dynamic Data Exchange