{"id":85688,"date":"2018-02-05T15:42:34","date_gmt":"2018-02-05T10:12:34","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=85688"},"modified":"2018-02-05T17:53:12","modified_gmt":"2018-02-05T12:23:12","slug":"malspam-campaigns-exploiting-recent-ms-office-vulnerability-cve-2017-11882","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/malspam-campaigns-exploiting-recent-ms-office-vulnerability-cve-2017-11882\/","title":{"rendered":"Malspam campaigns exploiting recent MS Office vulnerability \u2018CVE-2017-11882\u2019 &#8211; An Analysis by Quick Heal Security Labs"},"content":{"rendered":"<p>No wonder malspam campaigns are a major medium to spread malware. Previously, we have written about such campaigns making use of MS Office malware such as malicious macro,\u00a0<a href=\"https:\/\/blogs.quickheal.com\/malspam-campaign-using-cve-2017-0199-targets-manufacturing-pharmaceutical-important-industries\/\">CVE-2017-0199<\/a>, <a href=\"https:\/\/blogs.quickheal.com\/recent-net-framework-zero-day-vulnerability-cve-2017-8759-dropping-infostealer-malware\/\"><u>CVE-2017-8759<\/u><\/a>\u00a0and <a href=\"https:\/\/blogs.quickheal.com\/emerging-trend-dde-based-office-malware-analysis-quick-heal-security-labs\/\"><u>DDE<\/u><\/a>-based attack. Recently, we have started observing various malspam campaigns exploiting the latest MS Office vulnerability <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-11882\"><u>CVE-2017-11882<\/u><\/a>.<\/p>\n<p>Let&#8217;s take a look at in-depth analysis of one such malspam campaign exploiting vulnerability \u2018<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-11882\"><u>CVE-2017-1188<\/u><u>2<\/u><\/a>\u2019 in the wild.<\/p>\n<p><strong><b>Attack chain<\/b><\/strong><\/p>\n<figure id=\"attachment_85689\" aria-describedby=\"caption-attachment-85689\" style=\"width: 542px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85689 \" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/02\/Fig1.png\" alt=\"Attack chain\" width=\"542\" height=\"651\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig1.png 984w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig1-249x300.png 249w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig1-768x924.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig1-324x390.png 324w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig1-789x949.png 789w\" sizes=\"(max-width: 542px) 100vw, 542px\" \/><figcaption id=\"caption-attachment-85689\" class=\"wp-caption-text\">Fig 1. Attack chain<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><strong><b>Vulnerability (CVE-2017-11882) analysis<\/b><\/strong><\/p>\n<p>A remote code execution vulnerability (<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-11882\"><u>CVE-2017-11882<\/u><\/a>) is triggered in the <a href=\"https:\/\/support.office.com\/en-us\/article\/Equation-Editor-6eac7d71-3c74-437b-80d3-c7dea24fdf3f\"><u>Microsoft Office Equation Editor<\/u><\/a><u>\u00a0<\/u>(EQNEDT32.EXE) component. The attacker can successfully exploit a stack buffer overflow vulnerability in the equation editor component of MS Office and execute an arbitrary code. The root cause of this vulnerability is copy unbounded string of FONT name defined within a FONT record structure of Equation EditorOLE object data.<\/p>\n<p>To exploit the vulnerability, attackers use specially crafted RTF files with doc extensions. This RTF file contains an embedded equation object class as shown in Fig 2.<\/p>\n<figure id=\"attachment_85690\" aria-describedby=\"caption-attachment-85690\" style=\"width: 699px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85690\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/02\/Fig2-650x251.png\" alt=\"Equation object class\" width=\"699\" height=\"270\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig2-650x251.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig2-300x116.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig2-768x297.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig2-789x305.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig2.png 1271w\" sizes=\"(max-width: 699px) 100vw, 699px\" \/><figcaption id=\"caption-attachment-85690\" class=\"wp-caption-text\">Fig 2. Equation object class<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>OLE file which is embedded inside the crafted RTF has a stream name &#8220;Equation Native&#8221; having the following header:<\/p>\n<table style=\"height: 218px\" width=\"667\">\n<tbody>\n<tr>\n<td width=\"239\"><strong><b>Size<\/b><\/strong><\/td>\n<td width=\"385\"><strong><b>Description<\/b><\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"239\">WORD<\/td>\n<td width=\"385\">Size of header(EQNOLEFILEHDR) == 28 (0x1C)<\/td>\n<\/tr>\n<tr>\n<td width=\"239\">DWORD<\/td>\n<td width=\"385\">Version<\/td>\n<\/tr>\n<tr>\n<td width=\"239\">WORD<\/td>\n<td width=\"385\">Clipboard format<\/td>\n<\/tr>\n<tr>\n<td width=\"239\">DWORD<\/td>\n<td width=\"385\">Size of (MTEF header + MTEF data)<\/td>\n<\/tr>\n<tr>\n<td width=\"239\">DWORD<\/td>\n<td width=\"385\">Reserved1<\/td>\n<\/tr>\n<tr>\n<td width=\"239\">DWORD<\/td>\n<td width=\"385\">Reserved2<\/td>\n<\/tr>\n<tr>\n<td width=\"239\">DWORD<\/td>\n<td width=\"385\">Reserved3<\/td>\n<\/tr>\n<tr>\n<td width=\"239\">DWORD<\/td>\n<td width=\"385\">Reserved4<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>MTEF is a Math Type equation format used by equation editor.<\/p>\n<p>MTEF header have the following structure.<\/p>\n<table style=\"height: 128px\" width=\"669\">\n<tbody>\n<tr>\n<td width=\"312\"><strong><b>Size<\/b><\/strong><\/td>\n<td width=\"312\"><strong><b>Description<\/b><\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"312\">BYTE<\/td>\n<td width=\"312\">MTEF version<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">BYTE<\/td>\n<td width=\"312\">Generating platform<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">BYTE<\/td>\n<td width=\"312\">Generating product<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">WORD<\/td>\n<td width=\"312\">Product version and subversion<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong><b>\u00a0<\/b><\/strong><\/p>\n<p>MTEF data consists of MTEF header followed by multiple records. These records can be of different types and sizes.<\/p>\n<p>FONT record which is defined in MTEF data object receives crafted FONT name and triggers the vulnerability.<\/p>\n<p>Following is the structure of MTEF data (FONT record).<\/p>\n<table style=\"height: 146px\" width=\"673\">\n<tbody>\n<tr>\n<td width=\"312\"><strong><b>Size<\/b><\/strong><\/td>\n<td width=\"312\"><strong><b>Description<\/b><\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"312\">BYTE<\/td>\n<td width=\"312\">FONT tag<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">BYTE<\/td>\n<td width=\"312\">Typeface number<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">BYTE<\/td>\n<td width=\"312\">Typeface style<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">STRING<\/td>\n<td width=\"312\">Font name<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">BYTE<\/td>\n<td width=\"312\">Null terminated<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>If FONT NAME is greater than 32 bytes, it indicates the exploit attempts.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><b>Exploit analysis<\/b><\/strong><\/p>\n<p>In this campaign, the initial attack vector uses spam emails with crafted RTF attachments with .doc extension.<\/p>\n<p>Fig 3 shows the spam email used in this campaign.<\/p>\n<figure id=\"attachment_85693\" aria-describedby=\"caption-attachment-85693\" style=\"width: 700px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85693\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/02\/Fig3-650x289.png\" alt=\"\" width=\"700\" height=\"312\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig3-650x289.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig3-300x134.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig3-768x342.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig3-789x351.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig3.png 1366w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><figcaption id=\"caption-attachment-85693\" class=\"wp-caption-text\">Fig 3. Spam mail with CVE-2017-11882 exploit<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>MS Word runs the malicious attachment and attempts to exploit. After successful exploitation, Microsoft Equation Editor starts the <a href=\"https:\/\/en.wikipedia.org\/wiki\/HTML_Application\"><u>mshta<\/u><\/a>\u00a0process.<\/p>\n<figure id=\"attachment_85694\" aria-describedby=\"caption-attachment-85694\" style=\"width: 700px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85694\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/02\/Fig4-650x250.png\" alt=\"\" width=\"700\" height=\"269\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig4-650x250.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig4-300x115.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig4-768x296.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig4-789x304.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig4.png 1273w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><figcaption id=\"caption-attachment-85694\" class=\"wp-caption-text\">Fig 4. Crafted font name<\/figcaption><\/figure>\n<p><strong><b>Let\u2019s dive into the assembly to know how it works.<\/b><\/strong><\/p>\n<p>The below figure is a snap that shows the stack buffer overflow scenario where 48 bytes of data gets copied into a local buffer which causes a buffer overflow and overwrites base pointer and returns address.<\/p>\n<figure id=\"attachment_85717\" aria-describedby=\"caption-attachment-85717\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-85717\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/02\/Fig5-1-650x283.png\" alt=\"\" width=\"650\" height=\"283\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig5-1-650x283.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig5-1-300x131.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig5-1-768x334.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig5-1-789x343.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig5-1.png 1298w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-85717\" class=\"wp-caption-text\">Fig 5. Stack-based buffer overflow<\/figcaption><\/figure>\n<p>Fig 6 shows the address (<strong><b>0x00430C12<\/b><\/strong>) which gets overwritten into the return address.<\/p>\n<figure id=\"attachment_85718\" aria-describedby=\"caption-attachment-85718\" style=\"width: 650px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-85718\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/02\/Fig6-1-650x284.png\" alt=\"\" width=\"650\" height=\"284\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig6-1-650x284.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig6-1-300x131.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig6-1-768x335.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig6-1-789x345.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig6-1.png 1298w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-85718\" class=\"wp-caption-text\">Fig 6. Overwritten return address<\/figcaption><\/figure>\n<p>The overwritten address is from EQUATION32.EXE and that instruction points to &#8220;<a href=\"https:\/\/msdn.microsoft.com\/en-us\/library\/windows\/desktop\/ms687393(v=vs.85).aspx\"><strong><u><b>WinExec<\/b><\/u><\/strong><\/a>&#8221; api as mentioned in Fig 7.<\/p>\n<figure id=\"attachment_85697\" aria-describedby=\"caption-attachment-85697\" style=\"width: 700px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85697\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/02\/Fig7-650x56.png\" alt=\"\" width=\"700\" height=\"60\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig7-650x56.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig7-300x26.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig7-768x66.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig7-789x68.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig7.png 1108w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><figcaption id=\"caption-attachment-85697\" class=\"wp-caption-text\">Fig.7. WinExec call<\/figcaption><\/figure>\n<p>After successful exploitation, <a href=\"https:\/\/en.wikipedia.org\/wiki\/HTML_Application\"><u>mshta<\/u><\/a>\u00a0process gets executed by <a href=\"https:\/\/msdn.microsoft.com\/en-us\/library\/windows\/desktop\/ms687393(v=vs.85).aspx\"><u>WinExec<\/u><\/a>\u00a0which downloads and executes the malicious <a href=\"https:\/\/en.wikipedia.org\/wiki\/HTML_Application\"><u>hta<\/u><\/a>\u00a0file. The hta file further acts as a downloader for an <strong><b>infostealer malware<\/b><\/strong>.<\/p>\n<p>At Quick Heal Security Labs, we have seen different variants of this exploit using mshta.exe, cmd.exe, and powershell.exe being executed by WinExec for carrying out further activities.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><b>File-less attacks<\/b><\/strong><\/p>\n<p>Below is a scenario where the exploit contains a code that directly executes a malware which is hosted on a public WebDav server. The payload is a typical network UNC path.<\/p>\n<p>Fig 8 shows the different malware hosted on public WebDav server <strong><b>185.45.195.7<\/b><\/strong>.<\/p>\n<figure id=\"attachment_85698\" aria-describedby=\"caption-attachment-85698\" style=\"width: 700px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85698\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/02\/Fig8.png\" alt=\"\" width=\"700\" height=\"150\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig8.png 640w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig8-300x64.png 300w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><figcaption id=\"caption-attachment-85698\" class=\"wp-caption-text\">Fig 8. WebDav server UNC path<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_85699\" aria-describedby=\"caption-attachment-85699\" style=\"width: 700px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85699\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/02\/Fig9-650x370.png\" alt=\"\" width=\"700\" height=\"399\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig9-650x370.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig9-300x171.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig9-768x438.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig9-789x449.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig9.png 976w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><figcaption id=\"caption-attachment-85699\" class=\"wp-caption-text\">Fig 9. Malicious WebDav server<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><strong><b>Obfuscation technique<\/b><\/strong><\/p>\n<p>To bypass signature-based detections, attackers used various obfuscation techniques in this campaign.<\/p>\n<p>One of the obfuscation techniques used is shown below (fig 10).<\/p>\n<figure id=\"attachment_85700\" aria-describedby=\"caption-attachment-85700\" style=\"width: 700px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-85700\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/02\/Fig11-650x250.png\" alt=\"\" width=\"700\" height=\"270\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig11-650x250.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig11-300x116.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig11-768x296.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig11-789x304.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/02\/Fig11.png 1275w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><figcaption id=\"caption-attachment-85700\" class=\"wp-caption-text\">Fig.10. Obfuscation<\/figcaption><\/figure>\n<p>RTF math control word &#8220;\\mmath &#8221; (math zone) is used as obfuscation in OLE embedded RTF file. Because of the use of \\mmath control word, the string cmd.exe gets divided as &#8220;c&#8221; and &#8220;md.exe&#8221; which can simply evade the signature-based detection where the signature pattern can be used is cmd.exe.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><b>Conclusion<\/b><\/strong><\/p>\n<p>To defend against such exploits, Microsoft has already implemented features like DEP and ASLR in their arsenal but attacker targeted eqnedt32.exe where both these features were disabled; so carrying out such attacks using readily available exploit POC&#8217;s becomes handy for attackers. From\u00a0Microsoft Office 2007 Service Pack 3,\u00a0all versions are vulnerable to this vulnerability. Microsoft has released a patch for this vulnerability so we recommend our users to apply the latest Microsoft update packages and keep their antivirus up to date.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><b>Safety measures<\/b><\/strong><\/p>\n<ul>\n<li>To stay away from such attacks, we recommend disabling Equation Editor 3.0 if it is not being used. For this, please refer to the below link:<br \/>\n<a href=\"https:\/\/support.microsoft.com\/en-in\/help\/4055535\/how-to-disable-equation-editor-3-0\"><u>https:\/\/support.microsoft.com\/en-in\/help\/4055535\/how-to-disable-equation-editor-3-0<\/u><\/a><\/li>\n<li>We have also mentioned some phishing techniques to identify phishing emails in our previous blog post<br \/>\n<a href=\"https:\/\/blogs.quickheal.com\/quick-heal-thwarts-attempts-java-jrat-phishing-campaign-targeting-international-embassy-india\/\"><u>https:\/\/blogs.quickheal.com\/quick-heal-thwarts-attempts-java-jrat-phishing-campaign-targeting-international-embassy-india\/<\/u><\/a><\/li>\n<\/ul>\n<p><strong><b>\u00a0<\/b><\/strong><\/p>\n<p><strong><b>Indicators of compromise:<\/b><\/strong><\/p>\n<p>1A74FD8314F303E96018002A9F73F1F1<br \/>\nF603D25DDF21A8B9C2FAE7C9DC118BE2<br \/>\nE64C7C14B4632E995C7922A81ABA5E15<br \/>\nhxxp:\/\/112.213.118[.]108:11882\/<br \/>\nhxxp:\/\/104.254.99[.]77\/x.txt<br \/>\n176.107.178.12<br \/>\n185.175.208.10<\/p>\n<p><strong><b>\u00a0<\/b><\/strong><\/p>\n<p><strong><b>Subject Matter Experts<\/b><\/strong><\/p>\n<p><strong><b>Aniruddha Dolas, Prashant Kadam | Quick Heal Security Labs<\/b><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>No wonder malspam campaigns are a major medium to spread malware. Previously, we have written about such campaigns making use of MS Office malware such as malicious macro,\u00a0CVE-2017-0199, CVE-2017-8759\u00a0and DDE-based attack. Recently, we have started observing various malspam campaigns exploiting the latest MS Office vulnerability CVE-2017-11882. Let&#8217;s take a look at in-depth analysis of one [&hellip;]<\/p>\n","protected":false},"author":38,"featured_media":85721,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[289,24,5,1395],"tags":[1173,1547,1431,38],"class_list":["post-85688","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-safety","category-malware","category-security","category-vulnerability","tag-exploit","tag-ms-office","tag-rtf","tag-vulnerability"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/85688"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=85688"}],"version-history":[{"count":20,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/85688\/revisions"}],"predecessor-version":[{"id":85724,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/85688\/revisions\/85724"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/85721"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=85688"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=85688"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=85688"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}