Posts

Sandworm: a Windows vulnerability being actively exploited in the wild

The Dell SonicWall Threats Research team observed reports of a Malware named GAV: CVE-2014-4114.A (Sandworm) actively spreading in the wild. The Sandworm attacks thorough a vulnerability in Windows known as CVE-2014-4114, patched in Bulletin MS14-060 of Microsoft’s October 2014 Patch Tuesday.

The vulnerability allows an attacker to remotely execute arbitrary code to download and execute INF files thorough a crafted PowerPoint slideshow file (.PPSX). This vulnerability impacting all versions of the Windows operating from Vista SP2 to Windows 8.1

Translated to English:

Office of Prosecutor General of Ukraine established ties between members of Ukrainian congress and pro-Russian rebels. Lead investigator for the Ministry of Internal Affairs of Ukraine submitted information to the unified register of pre-trial investigations concerning theft of funds intended for the ATO (Anti-Terrorist Operation) by officials of Ukraine.

SECURITY SERVICE of Ukraine is conducting investigation of members of congress who supported terrorists.

Infection Cycle:

Md5: 330e8d23ab82e8a0ca6d166755408eb1

The Trojan adds the following files to the system:

  • slide1.gif [Executable file renamed to gif named GAV: BlackEnergy.B (Trojan)]
  • slides.inf [INF Configuration file]

The Trojan adds the following keys to the Windows registry to ensure persistence upon reboot:

  • HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRunOnce
  • Install,,%1%Slides1.gif.exe

The Malware it has two embedded files inside, oleObject1.bin and oleObject2.bin (List of congressmen.ppsx)

These files use drive-by-download technique to download following files from remote server:

  • 94.185.85.122/public/slide1.gif
  • 94.185.85.122/public/slides.inf

The downloaded files have the innocent-looking names slides.inf and slide1.gif, as though they were part of the presentation itself. Slide1.gif is actually an executable file, and slides.inf is an installer file that renames slide1.gif to slide1.gif.exe before adding a registry entry that will run the offending program when you next logon, after restart the malware execute following commands:

Malware Traffic

Sandworm has communication over port 445 and 80. Uses requests to statically defined IPs are made on a regular basis. These requests such as the following:

SonicWALL Gateway AntiVirus provides protection against this threat via the following signature:

  • CVE-2014-4114.A

Microsoft Security Bulletin Coverage (October 14, 2014)

Dell SonicWALL has analyzed and addressed Microsoft’s security advisories for the month of October, 2014. A list of issues reported, along with Dell SonicWALL coverage information are as follows:

MS14-056 Cumulative Security Update for Internet Explorer (2987107)

  • CVE-2014-4123 Internet Explorer Elevation of Privilege Vulnerability
    Local Elevation of Privilege
  • CVE-2014-4124 Internet Explorer Elevation of Privilege Vulnerability
    Local Elevation of Privilege
  • CVE-2014-4126 Internet Explorer Memory Corruption Vulnerability
    IPS: 5719 “Internet Explorer Memory Corruption Vulnerability (MS14-056) 5”
  • CVE-2014-4127 Internet Explorer Memory Corruption Vulnerability
    IPS: 5752 “Internet Explorer Memory Corruption Vulnerability (MS14-056) 7”
  • CVE-2014-4128 Internet Explorer Memory Corruption Vulnerability
    IPS: 5739 “Internet Explorer Memory Corruption Vulnerability (MS14-056) 6 “
  • CVE-2014-4129 Internet Explorer Memory Corruption Vulnerability
    IPS: 7454 “HTTP Client Shellcode Exploit 35a “
  • CVE-2014-4130 Internet Explorer Memory Corruption Vulnerability
    IPS: 5416 “HTTP Client Shellcode Exploit 15a “
  • CVE-2014-4132 Internet Explorer Memory Corruption Vulnerability
    IPS: 5694 “Internet Explorer Memory Corruption Vulnerability (MS14-056) 2”
  • CVE-2014-4133 Internet Explorer Memory Corruption Vulnerability
    SPY: 1027 “Malformed-File html.MP.48 “
  • CVE-2014-4134 Internet Explorer Memory Corruption Vulnerability
    SPY: 1051 “Malformed-File html.MP.49 “
  • CVE-2014-4137 Internet Explorer Memory Corruption Vulnerability
    IPS: 5695 “Internet Explorer Memory Corruption Vulnerability (MS14-056) 3”
  • CVE-2014-4138 Internet Explorer Memory Corruption Vulnerability
    IPS: 5696 “Internet Explorer Memory Corruption Vulnerability (MS14-056) 4”
  • CVE-2014-4140 Internet Explorer ASLR Bypass Vulnerability
    IPS: 5688 “Internet Explorer ASLR Bypass Vulnerability (MS14-056) “
  • CVE-2014-4141 Internet Explorer Memory Corruption Vulnerability
    IPS: 5690 “Internet Explorer Memory Corruption Vulnerability (MS14-056) 1”

MS14-057 Vulnerabilities in .NET Framework Could Allow Remote Code Execution (3000414)

  • CVE-2014-4073 .NET ClickOnce Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4121 .NET Framework Remote Code Execution Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4122 .NET ASLR Vulnerability
    There are no known exploits in the wild.

MS14-058 Vulnerability in Kernel-Mode Driver Could Allow Remote Code Execution (3000061)

  • CVE-2014-4113 Win32k.sys Elevation of Privilege Vulnerability
    There are no known exploits in the wild.
  • CVE-2014-4148 TrueType Font Parsing Remote Code Execution Vulnerability
    There are no known exploits in the wild.

MS14-059 Vulnerability in ASP.NET MVC Could Allow Security Feature Bypass (2990942)

  • CVE-2014-4075 MVC XSS Vulnerability
    There are no known exploits in the wild.

MS14-060 Vulnerability in Windows OLE Could Allow Remote Code Execution (3000869)

  • CVE-2014-4114 OLE Remote Code Execution Vulnerability
    SPY: 1061 “Malformed-File pps.MP.1 “

MS14-061 Vulnerability in Microsoft Word and Office Web Apps Could Allow Remote Code Execution (3000434)

  • CVE-2014-4117 Microsoft Word File Format Vulnerability
    There are no known exploits in the wild.

MS14-062 Vulnerability in Message Queuing Service Could Allow Elevation of Privilege (2993254)

  • CVE-2014-4971 MQAC Arbitrary Write Privilege Escalation Vulnerability
    There are no known exploits in the wild.

MS14-063 Vulnerability in FAT32 Disk Partition Driver Could Allow Elevation of Privilege (2998579)

  • CVE-2014-4115 Windows Disk Partition Driver Elevation of Privilege Vulnerability
    There are no known exploits in the wild.