meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Monday, November 7th 2016

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 7 November 2016

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min infosec news summary. News, patches, vulnerabilities and trends in information security. Hancitor Maldoc Whitelisting Bypass; EMET Support Extended; IMSI Catcher Via WiFi

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Monday, November 7, 2016 edition of the Sands and Storms and a Stormcast.

0:07.8

My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida.

0:13.1

Did he did an interesting write-up about some malicious word documents that he found that use a new technique to bypass whitelisting.

0:23.0

Whitelisting of course is often seen as of the ultimate replacement for antivirus, given

0:28.8

that we want to enumerate all the processes that we want to run, not just malicious processes.

0:36.2

Now what this particular word document does is that first of all,

0:40.3

it loads a PNG file. Now this PNG file is really only one pixel but includes additional

0:47.3

data which is an executable. Then it runs a script that will execute this executable data after the PNG file,

0:57.8

and that now, of course, runs inside the vert process, which already has been approved.

1:04.3

Next, it goes forward and downloads additional malware.

1:07.8

Now, the additional malware would typically then be safe to disk and

1:12.2

ran, which of course is where antivirus and whitelisting would step in and prevent this

1:18.6

malware from running. However, this particular new version is suspending an existing process

1:26.3

like Explorer.exe,

1:28.3

then adding the new malware to this process in memory

1:33.3

and then releasing the process, starting it up again,

1:37.3

and with that also starting the maver that was just downloaded.

1:42.3

So everything runs inside an approved process. This is a

1:46.3

technique that's rather difficult to monitor for you essentially have to look for all

1:51.1

of the possible API calls and such that could be used in order to inject and then

1:55.9

start the additional process. Now of course this would not would not survive a reboot of the system, but

2:04.0

given a trade-off that you do get a stealth malware running, that's pretty much hidden from

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.