{"id":12723,"date":"2018-07-02T14:10:06","date_gmt":"2018-07-02T22:10:06","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/07\/02\/news-6491\/"},"modified":"2018-07-02T14:10:06","modified_gmt":"2018-07-02T22:10:06","slug":"news-6491","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/07\/02\/news-6491\/","title":{"rendered":"New macro-less technique to distribute malware"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Mon, 02 Jul 2018 21:12:47 +0000<\/strong><\/p>\n<p>One of the most common and effective infection vectors, especially for businesses, is the use of malicious Office documents. This year alone, we witnessed two zero-days for both <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/02\/new-flash-player-zero-day-comes-inside-office-document\/\" target=\"_blank\" rel=\"noopener\">Flash<\/a> and the <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/05\/internet-explorer-zero-day-browser-attack\/\" target=\"_blank\" rel=\"noopener\">VBScript engine<\/a>, which were first actually embedded into Office documents before gaining wider adoption in web exploit kits.<\/p>\n<p>In addition to leveraging software vulnerabilities, attackers are regularly abusing normal Office features, such as macros, or more obscure ones like\u00a0<a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/10\/old-ms-office-feature-weaponized-in-malspam-attacks\/\" target=\"_blank\" rel=\"noopener\">Dynamic Data Exchange<\/a>\u00a0(DDE), and of course Object Linking and Embedding (OLE) attacks, which can also be <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/10\/decoy-microsoft-word-document-delivers-malware-through-rat\/\" target=\"_blank\" rel=\"noopener\">mixed with exploits<\/a>. System administrators can harden endpoints by disabling certain features company-wide, for example to foil certain social engineering schemes that try to trick users to enable a malicious macro. <a href=\"https:\/\/support.office.com\/en-us\/article\/packager-activation-in-office-365-desktop-applications-52808039-4a7c-4550-be3a-869dd338d834\" target=\"_blank\" rel=\"noopener\">In recent versions of Office<\/a>, Microsoft is also blocking the activation of objects considered high risk, based on a list of extensions that can be customized via Group Policy.<\/p>\n<p>But a <a href=\"https:\/\/posts.specterops.io\/the-tale-of-settingcontent-ms-files-f1ea253e4d39\" target=\"_blank\" rel=\"noopener\">recent discovery<\/a> by security researcher <a href=\"https:\/\/twitter.com\/enigma0x3\" target=\"_blank\" rel=\"noopener\">Matt Nelson<\/a>, shows that yet another infection vector can be tapped into, one that circumvents the current protection settings and even Microsoft&#8217;s new\u00a0<a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-defender-exploit-guard\/attack-surface-reduction-exploit-guard\">Attack Surface Reduction<\/a>\u00a0technology. By embedding specially-crafted settings files into an Office document, an attacker can trick a user to run malicious code without any further warning or notification.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/bait_doc.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24425\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/07\/new-macro-less-technique-used-distribute-malware\/attachment\/bait_doc\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/bait_doc.png\" data-orig-size=\"889,647\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"bait_doc\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/bait_doc-300x218.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/bait_doc-600x437.png\" class=\"size-full wp-image-24425 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/bait_doc.png\" alt=\"\" width=\"889\" height=\"647\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/bait_doc.png 889w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/bait_doc-300x218.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/bait_doc-600x437.png 600w\" sizes=\"auto, (max-width: 889px) 100vw, 889px\" \/><\/a><\/p>\n<p>The file format, specific to Windows 10 called <strong>.SettingContent.ms<\/strong>, is essentially XML code that is used to create shortcuts to the Control Panel. This feature can be abused because one of its elements (DeepLink) allows for any binary with parameters to be executed.\u00a0All that an attacker needs to do is add his own command using Powershell.exe or Cmd.exe. And the rest is history.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/xml.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24426\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/07\/new-macro-less-technique-used-distribute-malware\/attachment\/xml-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/xml.png\" data-orig-size=\"761,418\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"xml\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/xml-300x165.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/xml-600x330.png\" class=\"size-full wp-image-24426 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/xml.png\" alt=\"\" width=\"761\" height=\"418\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/xml.png 761w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/xml-300x165.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/xml-600x330.png 600w\" sizes=\"auto, (max-width: 761px) 100vw, 761px\" \/><\/a><\/p>\n<p>A new script<a href=\"https:\/\/twitter.com\/ItsReallyNick\/status\/1013765611065921536\" target=\"_blank\" rel=\"noopener\"> found by Nick Carr<\/a> shows an attack where PowerShell is invoked to download and execute a Trojan (<a href=\"https:\/\/www.virustotal.com\/en\/file\/09666731EFAB134CB6C882902D64B5E22D664FCAA4B97211D8C66AAC966709A4\/analysis\/\" target=\"_blank\" rel=\"noopener\">VT report<\/a>). <a href=\"https:\/\/twitter.com\/enigma0x3\/status\/1013409656264421379\" target=\"_blank\" rel=\"noopener\">According to Matt Nelson<\/a>, who discovered this new technique, Microsoft is not going to fix it, at least for the time being.<\/p>\n<p>We tested this sample in our lab and are happy to report that <a href=\"https:\/\/www.malwarebytes.com\/\" target=\"_blank\" rel=\"noopener\">Malwarebytes<\/a> users are already protected:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/SettingContent-ms.gif\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"24427\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/07\/new-macro-less-technique-used-distribute-malware\/attachment\/settingcontent-ms\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/SettingContent-ms.gif\" data-orig-size=\"867,632\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"SettingContent-ms\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/SettingContent-ms-300x219.gif\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/SettingContent-ms-600x437.gif\" class=\"size-full wp-image-24427 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/07\/SettingContent-ms.gif\" alt=\"\" width=\"867\" height=\"632\" \/><\/a><\/p>\n<p>During the past few years, while there has been little development with <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/06\/exploit-kits-spring-2018-review\/\" target=\"_blank\" rel=\"noopener\">web exploit kits<\/a>, there has been a lot of activity with document exploit kits such as <a href=\"https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/microsoft-word-intruder-integrates-cve-2017-0199-utilized-cobalt-group-target\" target=\"_blank\" rel=\"noopener\">Microsoft Word Intruder<\/a> (WMI) or <a href=\"https:\/\/www.proofpoint.com\/us\/threat-insight\/post\/unraveling-ThreadKit-new-document-exploit-builder-distribute-The-Trick-Formbook-Loki-Bot-malware\" target=\"_blank\" rel=\"noopener\">Threadkit<\/a>. These toolkits allow attackers to craft lures and embed the exploit(s) of their choice before either spear phishing their victims or sending the file via larger spam campaigns. At the same time, it looks like classic social engineering attacks aren&#8217;t going anywhere anytime soon and will keep capitalizing on the human element.<\/p>\n<p>It is import for end users and businesses to recognize that malicious documents represent a very real threat and require adequate protection and training to fend against.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/07\/new-macro-less-technique-used-distribute-malware\/\">New macro-less technique to distribute malware<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/07\/new-macro-less-technique-used-distribute-malware\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Mon, 02 Jul 2018 21:12:47 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/07\/new-macro-less-technique-used-distribute-malware\/' title='New macro-less technique to distribute malware'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/shutterstock_377764417.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>The latest macro-less technique to distribute malware via Office documents does not involve exploits. Just a little bit of social engineering.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/deeplink\/\" rel=\"tag\">deeplink<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/macro-less\/\" rel=\"tag\">macro-less<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware\/\" rel=\"tag\">malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/office\/\" rel=\"tag\">Office<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/settingcontent-ms\/\" rel=\"tag\">settingcontent-ms<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/07\/new-macro-less-technique-used-distribute-malware\/' title='New macro-less technique to distribute malware'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/07\/new-macro-less-technique-used-distribute-malware\/\">New macro-less technique to distribute malware<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[18892,18893,3764,3245,18894,10494],"class_list":["post-12723","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-deeplink","tag-macro-less","tag-malware","tag-office","tag-settingcontent-ms","tag-threat-analysis"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12723","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12723"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12723\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12723"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12723"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12723"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}