CVE-2017-11882 Vulnerability Exploitation Malicious Sample Analysis

sample information

file name

c11e2306a7926e55f4b2fcbbe7307690059572f1857724bd4aaa7974be6a4b56

File size

617.94 KB

file type

Win32 EXE

MD5

997cf4517ee348ea771fd05f489c07fe

SHA1

8feb8992f700c7ff9e19f45d0c3fd820d71aa044

CRC32

67DE9003

Table 1.1 Sample information

Analysis environment and tools

Environment: win7x86 bit

Tool: 010editor IDA Hash refobj OD

analysis target

Analyze malicious behavior and related functions of viruses.

Sample Behavior Analysis

Virustotal scans a 34/59 ratio to detect malicious behavior and determine that the document is malicious. ( This sample analysis report is earlier than 2019, and the current killing rate may be inconsistent with it)

 Attack process:

Malicious documents mainly use package objects to embed malicious programs.

The Rtfobj tool extracts the package object and releases it automatically. The inserted Package object is actually a malicious Scriptletfile (.sct) script file and %tmp%\\mico-audio.exe.

 Scriptletfile (.sct) script file.

 The released .sct script file exploits the vulnerability to run %tmp%\\mico-audio.exe under the c drive. Release the PE file Crome.exe, copy itself, write registry entries, and execute the PE file.

 Execute and create the file crome.exe to C:\Users\username\AppData\Roaming\google-Chrome\, pretend to be the google browser directory, and execute the corresponding file writing.

PE files run with remote access behavior.

 

Killing and preventive measures

Kill:

① At present, many security vendors can kill this malicious behavior, and the anti-virus software can be installed to complete the killing.

②Manual killing

  1. 1Delete Crome.exe under the specified directory C:\Users\username\AppData\Roaming\google-chrome\
  2. 2. The startup item disables the Crome.exe of the world icon
  3. 3. Delete the Chrome key value under L_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run in the registry.

Precautions

①Update online; open Windows Update. 
②Patch; Microsoft patch address: Security Update Guide - Microsoft Security Response Center

Guess you like

Origin blog.csdn.net/qq_37431937/article/details/125299257