4.9 • 696 Ratings
🗓️ 26 January 2023
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Thursday, January 26, 2020, |
0:05.5 | 3 edition of the Sansanet Storm Center's Stormcast. |
0:10.1 | My name is Johannes Ulrich, and I'm recording from Jacksonville, Florida. |
0:16.0 | I mentioned a couple of podcasts ago about Microsoft's OneNote being abused in order to deliver |
0:24.4 | scripts to victims. Well, Xavier now wrote up one example to walk you through the process |
0:32.1 | of actually analyzing these malicious documents. The typical extension here is dot one and DDE. |
0:41.2 | Luckily, wrote a tool to help you analyze it. So that's what Xavier uses here in order to walk |
0:48.9 | you through how to extract the script in this particular case and introduce the mechanics of how these malicious |
0:56.0 | documents work. It all starts with, well, a one-note document, of course, that has a big click |
1:03.1 | to view a document button, and that's really sort of the entire or the big trick here, by clicking |
1:09.4 | the button, the user will inadvertently open a document |
1:13.2 | that will then launch the script. |
1:16.3 | If you wonder why that button is kind of big and ugly, well, part of it maybe to make it easier |
1:21.9 | to hit the button, but also the actual malicious script is then hidden behind the button. |
1:28.6 | The button is just a PNG and, well, serves not just to trigger execution, but also to hide the actual malicious content. |
1:38.6 | If you run into any documents like that, well, please forward them, always interested in a newish malware. |
1:46.0 | Blocking the dot one extension or dot on e, so it's spelled out, one extension is a commonly |
1:56.0 | recommended countermeasure here. Just be careful that users don't actually email OneNote documents to each other. |
2:05.4 | Typically, I see them being shared via cloud services, not so much as email attachments, |
2:11.7 | but certainly possible that some people are sending them around as email. |
2:17.2 | Now, one thing attackers like to install on compromised systems is software that allows them |
2:22.8 | to remote control the system. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.