Malware Static Analysis on Microsoft Macro Attack

Redho Maland Aresta, Ero Wahyu Pratomo, Vicky Geraldino, Achmad Fauzi, Joko Dwi Santoso


In the 21st century, technology is increasing rapidly, the increase in technology is the potential for cyber attacks on today's technological infrastructure. Malware that is designed to damage computer systems without the owner's knowledge at a considerable cost becomes a cyber crime. This macro malware analysis is to study the code and behavior of malware when run on an operating system. To analyze this malware, this study uses a static analysis method by analyzing malware without running the program.


Malware Analysis; Static Analysis; Dynamic Analysis; Cyber attack; Macro Malware

Full Text:



R. Adenansi and L. A. Novarina, “Malware dynamic,” J. Educ. Inf. Commun. Technol., vol. 1, no. 1, pp. 37–43, 2017.

T. Pajar Setia, N. Widiyasono, and A. Putra Aldya, “Analysis Malware Flawed Ammyy RAT Dengan Metode Reverse Engineering,” J. Inform. J. Pengemb. IT, vol. 3, no. 3, pp. 371–379, 2018.

C. Sampson, J. G. Drever, and B. Third, “The use of Static Analysis to detect malware in embedded systems,” IET Conf. Publ., vol. 2013, no. 620 CP, pp. 1–5, 2013.

U. Mishra, “Detecting Macro Viruses- A TRIZ Based Analysis,” SSRN Electron. J., 2012.

P. D. A. Pamungkas, “Analisis Cara Kerja Sistem Infeksi Virus Komputer,” Bina Insa. ICT J., vol. 1, no. 1, pp. 15–40, 2014.



  • There are currently no refbacks.

Copyright (c) 2021 Redho Maland Aresta, Ero Wahyu Pratomo, Vicky Geraldino, Achmad Fauzi, Joko Dwi Santoso

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Mobile and Forensics (MF)

ISSN Online: 2714-6685 | Print: 2656-6257
Organized by Department of Magister Teknik Informatika
Published by Universitas Ahmad Dahlan 
Website : 
Email 1 :
Email 2 :

View My Stats