4.9 • 696 Ratings
🗓️ 5 May 2023
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Friday, May 5th, 2023 edition of the Sansanet Storm Center's Stormcast. My name is Johannes Ulrich, |
0:10.3 | and today I'm recording from Jacksonville, Florida. Xavier found a word document that uses an interesting |
0:17.9 | trick to get users to start a malicious executable. |
0:23.5 | Most of the time when you're dealing with malicious VIRD documents, you're dealing with macros. |
0:29.7 | But of course, these days enabling macros isn't really all that easy. |
0:34.4 | So attackers are looking for other ways to actually launch malicious payloads. |
0:40.6 | And we have seen a lot like with OneNote documents and the like some tricks here to bypass |
0:46.4 | some of these newer restrictions. |
0:49.4 | What Xavier found is actually quite simple and appears to be doing the trick here to trick the user into |
0:58.1 | launching malicious code without giving them any warning. This particular Word document has just |
1:05.6 | a straightforward Windows executable enabled and then ask the user to double click on the embedded executable |
1:13.9 | to launch it. Now, of course, this is not what the Word document says here. The Word document |
1:20.6 | does display sort of a small thumbnail image, which is really the application icon that looks |
1:26.0 | like, yeah, could be an invoice, but really too small to see. |
1:30.4 | And then it has a text telling the user, hey, this is really too small here because it was |
1:36.7 | created with a newer version of Word. |
1:38.8 | But by double-clicking on this thumbnail, you'll actually get the full-size version. What you actually |
1:46.8 | do when double-clicking is then launch the embedded executable. The dot-net executable turned out to be |
1:54.1 | an infesteeler. It collects data from the infected host and then exfiltrates them via email. |
2:02.4 | Xavier was able to extract the email configuration and posted it as part of the write-up. |
2:10.8 | The mail server happens to be in Saudi Arabia, mail.tcc.org.s.a. |
2:18.3 | And Cisco released a bulletin regarding a critical vulnerability in the Cisco SPA 112 to port phone adapter. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.