Aliases: No associated aliases
Microsoft Defender Antivirus detects and removes this threat.
This threat uses malicious Office documents using dynamic data exchange (DDE) to deliver PowerShell downloaders. It runs when a user clicks on a pop-up dialog box that appears in malicious Office documents.
To learn more about mitigating DDE attack scenarios, read Microsoft Security Advisory 4053440.
Windows Defender Exploit Guard blocks DDE-based malware using Attack Surface Reduction (ASR) rules. ASR is a component within Windows Defender Exploit Guard that provides enterprises with a set of built-in intelligence that can block the underlying behaviors used by malicious documents to execute attacks without hindering product operation. To learn more about Windows Defender Exploit Guard, read: Windows Defender Exploit Guard: Reduce the attack surface against next-generation malware.
The trend towards increasingly sophisticated malware behavior, highlighted by the use of exploits and other attack vectors, makes older platforms so much more susceptible to ransomware attacks. From June to November 2017, Windows 7 devices were 3.4 times more likely to encounter ransomware compared to Windows 10 devices.
Use the following free Microsoft software to detect and remove this threat:
You should also run a full scan. A full scan might find hidden malware.
Use cloud protection to help guard against the latest malware threats. It’s turned on by default for Microsoft Security Essentials and Windows Defender for Windows 10.
Go to All settings > Update & security > Windows Defender and make sure that your Cloud-based Protection settings is turned On.
Read Microsoft Security Advisory 4053440 to learn how to securely open Microsoft Office documents that contain Dynamic Data Exchange (DDE) fields.