Cadastre-se agora para um orçamento mais personalizado!

Weaponized Powerpoint in the Wild

Oct, 16, 2014 Hi-network.com

This post was written by Jaeson Schultz.

On October 14th information related to a new Windows vulnerability, CVE-2014-4114, was published. This new vulnerability affects all supported versions of Microsoft Windows. Windows XP, however, is not affected by this vulnerability. The problem lies in Windows' OLE package manager. When triggered it allows for remote code execution.

In this case, attackers crafted a malicious Powerpoint document. Upon execution the Powerpoint document would extract two embedded OLE objects: a .inf file, and another executable. The .inf file is used to make changes to the host system, and launch the malicious executable. A key is added to the registry to keep the malware running after a system restart. While it has been alleged that this specific attack was initially used by threat actors in a specific region, Cisco Talos expects other attackers to begin using this technique as well because of the simplicity of the attack vector.

Here is a list of the IP address Indicators of Compromise:
95.143.193.131
46.165.222.6
78.46.40.239
144.76.119.48
37.220.34.56
46.4.28.218
95.143.193.182
5.61.38.31
94.185.80.66
95.211.122.36

The malicious Powerpoint document has a SHA256 hash value of:
70B8D220469C8071029795D32EA91829F683E3FBBAA8B978A31A0974DAEE8AAF

Advanced Malware Protection (AMP) customers are protected from this threat. Similarly, customers deploying Cisco IronPort Web Security Appliances (WSA) and users of Cisco Cloud Web Security (CWS) are also protected. Customers using Cisco IronPort Email Security Appliance (ESA) are protected from malicious attachments exploiting this vulnerability. Snort signatures 32186 and 32187 provide coverage for this vulnerability.


tag-icon Tags quentes : Cisco Talos Talos malware 0-day

Copyright © 2014-2024 Hi-Network.com | HAILIAN TECHNOLOGY CO., LIMITED | All Rights Reserved.