meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Friday, April 7th, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 7 April 2023

⏱️ 7 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Malicious SFX Files; loldrivers; Trellix Priv Esc; HP LasterJet Vuln

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Friday, April 7, 2020, 3 edition of the Santernat Storm Center's Stormcast.

0:08.8

My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:15.0

Still catching up a little bit here, and one issue that I haven't mentioned yet is the use of self-extracting files or

0:23.1

SFX files that was reported by CrowdStrike in a blog post.

0:29.2

You've probably all used self-extracting files in some form.

0:32.9

They are executables and that's sort of where it gets tricky with data and then when you run the executable,

0:38.8

the data is being extracted.

0:41.4

Now, a couple of things that CrowdStrike found.

0:44.7

First of all, where these SFX files are being then associated with Utelman.

0:51.8

Now, or Utilman, not sure how to pronounce it correctly. This is the tool that

0:56.5

sort of provides some input aids on the login screen. If you ever reset sort of a Windows password,

1:02.9

you may have done that by swapping this out for like command.exe in order to sort of bypass the login

1:10.4

prompt. And the reason that's sort of bypass the login prompt.

1:18.2

And the reason that's sort of an interesting program is that it can be run before the user logs in.

1:32.8

Now, one interesting feature of these SFX archives are being used here, and that's well the ability to run commands. Unsuccessful extraction, any command can be run.

1:39.3

That's of an option that can be specified. The trick here is that in doing so, the actual SFX file does not contain any malware. It just contains a little command at the end that will then, for example, download malware

1:48.4

or a run additional malware on the system.

1:52.8

So the SFX file, AskRout strike points out, was actually empty in this case.

2:00.0

So SFX files is certainly a file type that you should have on your radar.

2:05.1

It is legitimately used.

2:06.9

It's not quite as commonly used as, for example, SIP files and such,

2:11.8

but shares many of the same properties.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.