[CVE-2017-8570]: Analysis of Microsoft Office Remote Code Execution Vulnerability

Severe vulnerability in Microsoft Office Suites, enabling remote code execution and arbitrary code on target systems.

Severe vulnerability in Microsoft Office Suites, enabling remote code execution and arbitrary code on target systems.

Monday, 12 August, 2024

CVE-2017-8570 - Cyberware Hub
CVE-2017-8570 - Cyberware Hub
CVE-2017-8570 - Cyberware Hub

CVE-2017-8570 is a critical security vulnerability in Microsoft Office that allows remote attackers to execute arbitrary code on affected systems. This vulnerability, classified as a remote code execution (RCE) flaw, impacts various Microsoft Office applications, including Word, Excel, and PowerPoint. The flaw specifically arises from how Microsoft Office handles certain components within Rich Text Format (RTF) files. Attackers can exploit this vulnerability by tricking users into opening a specially crafted RTF file, enabling the execution of unauthorized code on the targeted system.

File Details:

Hash    : 864fd241f052d4f5e4efc5866b6b204ed7f9d4fc848b91f1e5ea91543b7340ab
Filename: SKAS_A.P._Ltd._Jepon_Project._PO.50017221.doc
FileType: Rich Text Format 
Size    : 298.07 KB (305226 bytes)

Vulnerability Score: 9.3 High (CVSS:V2.0)

Infection Chain:

How does it work?

The vulnerability is triggered by specially crafted Office documents, often distributed via email attachments in phishing campaigns. When the victim opens the malicious document, it can execute arbitrary code without any further user interaction beyond opening the file.

This vulnerability exploits Microsoft Windows Object Linking and Embedding (OLE) technology, which enables documents to embed objects like images, spreadsheets, or other files. Attackers embed malicious code within an RTF file using OLE objects. Once the document is opened in Microsoft Office, the embedded malicious content is executed automatically.

Technical Analysis of RTF:

An RTF (Rich Text Format) file is a document format created by Microsoft that allows text and basic formatting to be shared across different word processors. It supports features like bold, italics, and font changes, as well as embedding images and other objects. Due to its compatibility across various platforms, RTF files are widely used. However, their ability to embed objects also makes them a potential vector for delivering malware.

Initial Vector of RTF Document:

Once the user opens the attached document, the embedded equation editor is triggered, dropping a .SCT file into the %appdata% temp folder, initiating the infection of the victim's machine.

Embedded Equation Editor:

Dropped .SCT File:

An SCT file is a Windows Script Component used to execute scripts on a Windows system, often containing VBScript or JScript. It’s typically utilized for automating tasks, but attackers can exploit SCT files to run malicious code on a target machine. This makes them a common tool in phishing attacks or when embedded in compromised documents. Due to their ability to execute code, SCT files pose a significant security risk.

Main Content of .SCT File Script:

Embedded Functions:

Captured HTTP Packet:

While performing dynamic analysis, we captured an HTTP packet response originating from some randomized IP address. Let’s analyze the IP.

Sandbox Results:

MITRE ATT@CK MATRIX:

 Tactics				          Techniques.

Initial Access	       - Phishing Attachment (.RTF/.DOC).
Execution              - Native API.
		                 Exploitation for Client Execution.
                         Powershell.
Persistence	           - Scripting (.PS1).
                         Windows Service.
Privilege Escalation   - Process Injection.
                         Bypass User Account Control 
Defense Evasion	   	   - Virtualization/Sandbox Evasion.
                         Disable or Modify Tools.
                         Masquarding.
Discovery		       - Virtualization and Sandbox Evasion Technique.
                         Security Software Discovery.
                		 Application Window Discovery.
                         File and Directory Discovery.
Collection             - Archive Data Collection.
                         Email Collection.
                         Clipboard Data.
Command & Control	   - Non-Application Layer Protocol.
			             Application Layer Protocol.
                         Ingress Tool Transfer

Conclusion:

In conclusion, CVE-2017-8570 highlights the importance of strong cybersecurity practices. This critical vulnerability in Microsoft Office Suites allows remote code execution, making it a significant threat to both individuals and organizations. Regular software updates, robust security measures, and awareness of phishing threats are crucial in protecting against such vulnerabilities.

Happy Hunting !!