Hackers using Weaponized Office Document to Exploit Windows Search RCE

by Esmeralda McKenzie
Hackers using Weaponized Office Document to Exploit Windows Search RCE

Hackers using Weaponized Office Document to Exploit Windows Search RCE

Hackers the utilization of Weaponized Situation of job Doc to Exploit Windows Search RCE

A brand recent attack chain campaign has been stumbled on, which entails the exploitation of CVE-2023-36884 and CVE-2023-36584. CVE-2023-36884 became a distant code execution vulnerability, and CVE-2023-36584 became a security bypass vulnerability which can furthermore be weak to milk CVE-2023-36884.

CVE-2023-36884 became given a severity rating of 8.8 (Excessive), and CVE-2023-36584’s severity rating became 5.4 (Medium). On the opposite hand, the threat actor attributed to the exploit chain became a professional-Russian APT crew is named Storm-0978 aka RomCom Community.

EHA

Doc

Free Webinar

Are residing API Attack Simulation Webinar

Within the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface point out how APIs will be hacked. The session will camouflage: an exploit of OWASP API High 10 vulnerability, a brute force fable take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP would possibly perchance well bolster security over an API gateway

Windows Search RCE Flaw

As allotment of the preliminary attack chain, a .docx file became stumbled on that became no longer tagged as MotW (Label of the Net), leading to the “protected leer” being disabled when opening the file.

An MS-DOCX file is a compressed ZIP archive file that includes an XML file at word/file.xml and includes the file’s textual speak material and formatting.

On the opposite hand, the file.xml file includes an anchor for imported exterior speak material part altchunk which imports an RTF speak material. This RTF file afchunk.rtf comprises two malicious Object Linking and Embedding (OLE) objects.

First Stage of the Exploit Chain

The malicious OLE objects in afchunk.rtf requests speak material from two URLs,

  • \104.234.239[.]26share1MSHTML_C7file001.url
  • hxxp://74.50.94[.]156/MSHTML_C7/commence.xml

If the sufferer hosts accesses \104.234.239[.]26share1MSHTML_C7file001.url, the sufferer’s NTLM credentials, which dangle the hostname and username, leaked to the threat actor-managed SMB server. On the opposite hand, the URLs define two recordsdata: file001.url and file001.htm.

Abusing the Windows Search Handler

The file001.htm has a JS that uses iframes to load extra than one recordsdata. The main filename includes the sufferer’s IP address and 5 5-digit identifier that ends with file001.search-ms. Following this, three HTTP requests the utilization of the string .zip_k* in the URLs are made.

Original MotW Bypass – CVE-2023-36584

Windows search scans for extensions of every file to resolve the contents. When it finds internet recordsdata, it writes the file to a short-interval of time listing and adds MotW to it. This operation has a bustle situation which can furthermore be exploited to bypass the MitW.

There were three ways that were linked to Server Facet ZIP Swap (Metadata TOCTOU), Server Facet Lengthen (Shut Operation) and Server Facet Lengthen (Be taught Operation).

Server Facet ZIP Swap – Metadata TOCTOU

This trend is exploitable when the ZIP archive is downloaded from a distant server. The zipfldr.dll file reads the ZIP file’s header and caches the files in memory.

Once the file header is read, the ZIP with MotW would possibly perchance well furthermore be replaced with a official file title the utilization of the TOCTOU situation, bypassing the MotW to the file.

Server Facet Lengthen – Shut Operation

This trend is expounded with the Zone. Identifier ADS, that shall be provided with a time lengthen the utilization of a SMB server. This trend became conceivable attributable to the SMB2 protocol’s shut operation, which comprises a shut request and a shut response.

Supply: Palo Alto
Supply: Palo Alto

Server Facet Lengthen – Be taught Operation

Windows reads a allotment of big recordsdata that are from a distant portion. If there is random files at the stay of the file, the writing of the file would possibly perchance well furthermore be delayed from the SMB server earlier than Windows adds MotW to the file.

The file is usable through the writing process because it is opened with read/write dwShareMode.

A entire file concerning the attack chain has been published by Palo Alto, which gives detailed details about exploitation ways, strategies of operation, and other files.

Indicators of Compromise

Be taught: SHA256 hash – Filename

  • a61b2eafcf39715031357df6b01e85e0d1ea2e8ee1dfec241b114e18f7a1163f – Overview_of_UWCs_UkraineInNATO_campaign.docx
  • 0896e7c5433b2d426a30a43e7f4ef351fa870be8bd336952a0655392f8f8052d – word/file.xml
  • b5731baa7920b4649add429fc4a025142ce6a1e1adacb45850470ca4562d5e37 – word/_rels/file.xml.rels
  • e7cfeb023c3160a7366f209a16a6f6ea5a0bc9a3ddc16c6cba758114dfe6b539 – afchunk.rtf
  • 3d0dae359325e8e96cf46459c38d086279865457379bd6380523727db350de43 – file001.url
  • 48142dc7fe28a5d8a849fff11cb8206912e8382314a2f05e72abad0978b27e90 – commence.xml
  • bfe3ebcc92a4a7d294b63ce0d7eba6313980d982709a27b337abe32651b63856 – file001.zip
  • c94e2bfd4e2241fed42113049c84ac333fcff340cc202afe8926f8e885d5fca3 – 2222.chm
  • f08cc922c5dab73f6a2534f8ceec8525604814ae7541688b7f65ac9924ace855 – 1111.htm
  • cdc39ce48f8f587c536450a3bd0feb58bf40b59b310569797c1c9ae8d28b2914 – RFile.asp
  • fd4fd44ff26e84ce6587413271cf7ff3960471a55eb0d51b0a9870b577d66f4a – file001.htm
  • 4fc768476ee92230db5dbc4d8cbca49a71f8433542e62e093c3ad160f699c98d – redir_obj.htm
  • 0adb2734a1ca0ccaf27d8a46c08b2fd1e19cb1fbd3fea6d8307851c691011f0f – file1.htm
  • 7a1494839927c20a4b27be19041f2a2c2845600691aa9a2032518b81463f83be – file1.mht
  • 20f58bd5381509072e46ad79e859fb198335dcd49c2cb738bd76f1d37d24c0a7 – fileH.htm
  • ee46f8c9769858aad6fa02466c867d7341ebe8a59c21e06e9e034048013bf65a – fileH.mht
  • c187aa84f92e4cb5b2d9714b35f5b892fa14fec52f2963f72b83c0b2d259449d – ex001.url

The following network paths referenced in this learn are linked with the July 2023 lure:

  • \104.234.239[.]26share1MSHTML_C7file001.url
  • \104.234.239[.]26share1MSHTML_C7ex001.url
  • file[:]//104.234.239[.]26/share1/MSHTML_C7/1/
  • file[:]//104.234.239[.]26/share1/MSHTML_C7/ex001.zip/file001.vbs
  • hxxp://74.50.94[.]156/MSHTML_C7/commence.xml
  • hxxp://74.50.94[.]156/MSHTML_C7/zip_k.asp?d=
  • hxxp://74.50.94[.]156/MSHTML_C7/zip_k2.asp?d=
  • hxxp://74.50.94[.]156/MSHTML_C7/zip_k3.asp?d=
  • hxxps://www.ukrainianworldcongress[.]files/internet sites/default/recordsdata/file/varieties/2023/Overview_of_UWCs_UkraineInNATO_campaign.docx

Source credit : cybersecuritynews.com

Related Posts