{"id":9281,"date":"2017-09-13T20:56:36","date_gmt":"2017-09-14T04:56:36","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/09\/13\/news-3054\/"},"modified":"2017-09-13T20:56:36","modified_gmt":"2017-09-14T04:56:36","slug":"news-3054","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/09\/13\/news-3054\/","title":{"rendered":"PSA: New Microsoft Word 0day used in the wild"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Wed, 13 Sep 2017 22:49:19 +0000<\/strong><\/p>\n<p>Microsoft has just <a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2017\/09\/12\/exploit-for-cve-2017-8759-detected-and-neutralized\/\" target=\"_blank\" rel=\"noopener\">patched<\/a> an important vulnerability in Microsoft Word during its latest patch Tuesday cycle. According to the security firm that found it [1], this new zero-day (<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-8759\" target=\"_blank\" rel=\"noopener\">CVE-2017-8759<\/a>) was used in targeted attacks to install a piece of malware known as FinFisher.<\/p>\n<p>Microsoft Office has been <a href=\"https:\/\/www.scmagazine.com\/microsoft-office-in-the-line-of-fire\/article\/652209\/\" target=\"_blank\" rel=\"noopener\">in the line of fire<\/a> throughout the year with malware distributors employing various social engineering techniques to trick users into opening up booby-trapped documents laced with exploits or macros. Indeed, while drive-by download activity has plummeted, malicious spam has been the dominant threat.<\/p>\n<p>In this blog post, we do a quick review of this latest exploit and how future attackers are likely to add it to their own campaigns.<\/p>\n<h3>Infection flow<\/h3>\n<p>CVE-2017-8759 leverages an improper validation in a parsing module of the Web Services Description Language (<a href=\"https:\/\/msdn.microsoft.com\/en-us\/library\/ms996486.aspx\" target=\"_blank\" rel=\"noopener\">WSDL<\/a>) which leads to arbitrary code injection and execution. As we have seen it many times in previous attacks, <em>mshta.exe<\/em> is used to retrieve a script and eventually the malware payload.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/traffic_flow.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19699 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/traffic_flow.png\" alt=\"\" width=\"919\" height=\"839\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/traffic_flow.png 919w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/traffic_flow-300x274.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/traffic_flow-600x548.png 600w\" sizes=\"auto, (max-width: 919px) 100vw, 919px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 1: Traffic view showing script and payload retrieval<\/em><\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/process_view.png\" target=\"_blank\" rel=\"noopener\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19698 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/process_view.png\" alt=\"\" width=\"861\" height=\"211\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/process_view.png 861w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/process_view-300x74.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/process_view-600x147.png 600w\" sizes=\"auto, (max-width: 861px) 100vw, 861px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 2: Process view showing infection technique<\/em><\/p>\n<h3>Payload delivery implications<\/h3>\n<p>Depending on how the malicious document is delivered, it can require little or no user interaction in order to infect the target. In the former case, the document could be downloaded from a website or come as spam. It would bear the <a href=\"https:\/\/msdn.microsoft.com\/en-us\/library\/dn392609.aspx\" target=\"_blank\" rel=\"noopener\">Mark of the Web<\/a> and be flagged. In the latter case where the document was packaged &#8211; for example using 7zip &#8211; it could lose that MotW [2].<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/MoTW.png\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19695 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/MoTW.png\" alt=\"\" width=\"772\" height=\"527\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/MoTW.png 772w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/MoTW-300x205.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/MoTW-600x410.png 600w\" sizes=\"auto, (max-width: 772px) 100vw, 772px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 3: Side-by-side comparison of the same file, distributed differently.<\/em><\/p>\n<p>In the first case, the user will be prompted to &#8220;Enable Editing&#8221; (which admittedly is less suspicious than enabling macros). This, in turn, will trigger the malicious code to execute.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/CVE-2017-8759.gif\" target=\"_blank\" rel=\"noopener\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19696 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/CVE-2017-8759.gif\" alt=\"\" width=\"902\" height=\"704\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 4:\u00a0CVE-2017-8759 attempt blocked (Protected View mode)<\/em><\/p>\n<p>In the second case, where the MotW has been lost, the malicious Word document will immediately run its payload:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/CVE-2017-87592.gif\" target=\"_blank\" rel=\"noopener\" data-rel=\"lightbox-4\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19697 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/CVE-2017-87592.gif\" alt=\"\" width=\"1465\" height=\"806\" \/><\/a><\/p>\n<p style=\"text-align: center\"><em>Figure 5:\u00a0CVE-2017-8759 attempt blocked (normal mode)<\/em><\/p>\n<p>If you haven&#8217;t done it yet, we strongly advise you to run Windows updates and apply the latest security patches. If experience serves well, each time a new zero-day is exposed, other online criminals jump in and rush to add it to their arsenal. This means that what was a small and targeted attack can all of the sudden become a widespread campaign.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/\" target=\"_blank\" rel=\"noopener\">Malwarebytes<\/a> users were already protected against this exploit when it was still a zero-day. Additionally, we detect and block the FinFisher malware payload.<\/p>\n<h3>References<\/h3>\n<p>[1] FireEye,\u00a0<a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2017\/09\/zero-day-used-to-distribute-finspy.html\" target=\"_blank\" rel=\"noopener\">https:\/\/www.fireeye.com\/blog\/threat-research\/2017\/09\/zero-day-used-to-distribute-finspy.html<\/a><\/p>\n<p>[2] Eric Lawrence,\u00a0<a href=\"https:\/\/textslashplain.com\/2016\/04\/04\/downloads-and-the-mark-of-the-web\/\" target=\"_blank\" rel=\"noopener\">https:\/\/textslashplain.com\/2016\/04\/04\/downloads-and-the-mark-of-the-web\/<\/a><\/p>\n<h3>Indicators of compromise<\/h3>\n<p>Malicious Word document:<\/p>\n<pre>0b4ef455e385b750d9f90749f1467eaf00e46e8d6c2885c260e1b78211a51684<\/pre>\n<p>FinFisher:<\/p>\n<pre>b035ca2d174e5e4fd2d66fd3c8ce4ae5c1e75cf3290af872d1adb2658852afb8<\/pre>\n<p>Network traffic:<\/p>\n<pre>91.219.236[.]207\/img\/office.png  91.219.236[.]207\/img\/word.db  91.219.236[.]207\/img\/left.jpg<\/pre>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/09\/psa-new-microsoft-word-0day-used-wild\/\">PSA: New Microsoft Word 0day used in the wild<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/09\/psa-new-microsoft-word-0day-used-wild\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Wed, 13 Sep 2017 22:49:19 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/09\/psa-new-microsoft-word-0day-used-wild\/' title='PSA: New Microsoft Word 0day used in the wild'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/09\/zeroday2_.png' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Read more about the latest Microsoft Word Zero-Day and how to protect yourself against it.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/exploits-threat-analysis\/\" rel=\"category tag\">Exploits<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/0day\/\" rel=\"tag\">0day<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cve-2017-8759\/\" rel=\"tag\">CVE-2017-8759<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/microsoft\/\" rel=\"tag\">microsoft<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/microsoft-word\/\" rel=\"tag\">microsoft word<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/patch\/\" rel=\"tag\">patch<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/word\/\" rel=\"tag\">word<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/zero-day\/\" rel=\"tag\">zero day<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/09\/psa-new-microsoft-word-0day-used-wild\/' title='PSA: New Microsoft Word 0day used in the wild'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/09\/psa-new-microsoft-word-0day-used-wild\/\">PSA: New Microsoft Word 0day used in the wild<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[14741,14742,10987,10516,12280,14244,10494,10882,11524],"class_list":["post-9281","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-0day","tag-cve-2017-8759","tag-exploits","tag-microsoft","tag-microsoft-word","tag-patch","tag-threat-analysis","tag-word","tag-zero-day"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9281","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=9281"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9281\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=9281"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=9281"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=9281"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}