meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, April 11th, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 11 April 2023

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Analysising HTA Files; Apple Updates; MSI Attacks; MSFT Altered Netlogon Update Schedule

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Tuesday, April 11, 2023 edition of the Sansonet Stormer's Stormcast.

0:08.8

My name is Johannes Ulrich and today I'm recording from Jacksonville, Florida.

0:14.6

Today we got the second part of DDA's ongoing series about analyzing malicious HTA files.

0:22.9

HTA, that's HTML application.

0:26.1

It's sort of a Microsoft thing, but really what it is.

0:29.4

It's an archive of a web page, HTML page, and JavaScript and such,

0:35.7

essentially to sort of create self-contained complete copies

0:40.0

of an HTML5 application.

0:43.3

But as with so many things, it can be abused maliciously, in particular the JavaScript that's

0:48.7

loaded here, and that's sort of what the D.D.D.A. is going after. In the first part, he sort of showed how to take apart the HTA file.

0:58.0

And today it's about how to analyze the script that was then actually loaded, in this case,

1:04.6

a malicious PowerShell script.

1:07.0

The script itself was encrypted using AES, but as so often with this kind of malware, the encryption here was really more an obfuscation in that the key was part of the file.

1:18.6

And then, yeah, ECB mode was used for EES, which of course isn't great but perfectly adequate.

1:24.4

Of course, if you're delivering the key with the payload anyway. Like I said,

1:28.9

really more kind of an obfuscation here, and DDA is going over how to then decrypt the payload.

1:36.5

You also have to unsip it yet again, and then sort of how to further analyze and extract the resulting script.

1:46.7

In the end, we get to a bad file that's being downloaded from a website, so that

1:51.8

URL is the price of essentially decrypting and then further decoding the resulting

1:59.2

PowerShell script.

2:00.4

And I'm sure that he will tell us in a later episode what this particular bad file does.

2:08.7

And on Friday, I talked about Apple releasing patches for two Saturday vulnerabilities.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.