Lucene search

K
malwarebytesJérôme SeguraMALWAREBYTES:197219DC341BA8DE850FF6435F75C3A4
HistorySep 13, 2017 - 10:49 p.m.

PSA: New Microsoft Word 0day used in the wild

2017-09-1322:49:19
Jérôme Segura
blog.malwarebytes.com
950

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.97 High

EPSS

Percentile

99.7%

Microsoft has just patched an important vulnerability in Microsoft Word during its latest patch Tuesday cycle. According to the security firm that found it [1], this new zero-day (CVE-2017-8759) was used in targeted attacks to install a piece of malware known as FinFisher.

Microsoft Office has been in the line of fire throughout the year with malware distributors employing various social engineering techniques to trick users into opening up booby-trapped documents laced with exploits or macros. Indeed, while drive-by download activity has plummeted, malicious spam has been the dominant threat.

In this blog post, we do a quick review of this latest exploit and how future attackers are likely to add it to their own campaigns.

Infection flow

CVE-2017-8759 leverages an improper validation in a parsing module of the Web Services Description Language (WSDL) which leads to arbitrary code injection and execution. As we have seen it many times in previous attacks, mshta.exe is used to retrieve a script and eventually the malware payload.

Figure 1: Traffic view showing script and payload retrieval

Figure 2: Process view showing infection technique

Payload delivery implications

Depending on how the malicious document is delivered, it can require little or no user interaction in order to infect the target. In the former case, the document could be downloaded from a website or come as spam. It would bear the Mark of the Web and be flagged. In the latter case where the document was packaged - for example using 7zip - it could lose that MotW [2].

Figure 3: Side-by-side comparison of the same file, distributed differently.

In the first case, the user will be prompted to “Enable Editing” (which admittedly is less suspicious than enabling macros). This, in turn, will trigger the malicious code to execute.

Figure 4: CVE-2017-8759 attempt blocked (Protected View mode)

In the second case, where the MotW has been lost, the malicious Word document will immediately run its payload:

Figure 5: CVE-2017-8759 attempt blocked (normal mode)

If you haven’t done it yet, we strongly advise you to run Windows updates and apply the latest security patches. If experience serves well, each time a new zero-day is exposed, other online criminals jump in and rush to add it to their arsenal. This means that what was a small and targeted attack can all of the sudden become a widespread campaign.

Malwarebytes users were already protected against this exploit when it was still a zero-day. Additionally, we detect and block the FinFisher malware payload.

References

[1] FireEye, <https://www.fireeye.com/blog/threat-research/2017/09/zero-day-used-to-distribute-finspy.html&gt;

[2] Eric Lawrence, <https://textslashplain.com/2016/04/04/downloads-and-the-mark-of-the-web/&gt;

Indicators of compromise

Malicious Word document:

0b4ef455e385b750d9f90749f1467eaf00e46e8d6c2885c260e1b78211a51684

FinFisher:

b035ca2d174e5e4fd2d66fd3c8ce4ae5c1e75cf3290af872d1adb2658852afb8

Network traffic:

91.219.236[.]207/img/office.png
91.219.236[.]207/img/word.db
91.219.236[.]207/img/left.jpg

The post PSA: New Microsoft Word 0day used in the wild appeared first on Malwarebytes Labs.

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.97 High

EPSS

Percentile

99.7%