← Back to Index

LetsDefend - MSHTML

Created: 15/01/2024 12:02 Last Updated: 19/01/2024 15:14


**MSHTML** ![1de1cf4534d94c2ca91bd78076294d05.png](/resources/1de1cf4534d94c2ca91bd78076294d05.png)

2021's 0-Day MSHTML

Challenge Files (pass: infected): Download

This challenge prepared by @Bohan Zhang Malware samples: MalwareBazaar


Start Investigation

Upon extracting the file, we received two folders: one containing challenge files and another containing tools that can be utilized for their analysis.

![af96f302ff0cf6b5c4c9d95a78f7ae28.png](/resources/af96f302ff0cf6b5c4c9d95a78f7ae28.png) ![baf66f06e43cf396625d611ef90d16c4.png](/resources/baf66f06e43cf396625d611ef90d16c4.png) I began by using oleid.py from the Oletools suite. Now that we've confirmed there's no VBA script embedded

we can move forward and use oleobj for the remaining tasks.

![16ebfa829d101d88e8a0edeccfad1f88.png](/resources/16ebfa829d101d88e8a0edeccfad1f88.png) After run oleobj with `Employees_Contact_Audit_Oct_2021.docx`, We got an IP address.

The results obtained from Oletools also confirm that this could be a potential exploit for the CVE-2021-40444 (Microsoft MSHTML Remote Code Execution Vulnerability) vulnerability.

Now let's dig the rest of challenge files with oleobj

![f6e9eba1e6494839880100527c75f275.png](/resources/f6e9eba1e6494839880100527c75f275.png) With `Employee_W2_Form.docx`, We got a domain name. ![3affda14e175713ee3e22810d1174e56.png](/resources/3affda14e175713ee3e22810d1174e56.png) With `Work_From_Home_Survey.doc`, We got an URL. ![291f0c764a7bbb9f1e5f4dab0c713f14.png](/resources/291f0c764a7bbb9f1e5f4dab0c713f14.png) With `income_tax_and_benefit_return_2021.docx`, We got an another URL.

for futher analysis, you can read it from here - VirusTotal


Examing the Employees_Contact_Audit_Oct_2021.docx file, what is the malicious IP in the docx file?

175.24.190.249

Examing the Employee_W2_Form.docx file, what is the malicious domain in the docx file?

arsenal.30cm.tw

Examing the Work_From_Home_Survey.doc file, what is the malicious domain in the doc file?

trendparlye.com

Examing the income_tax_and_benefit_return_2021.docx, what is the malicious domain in the docx file?

hidusi.com

What is the vulnerability the above files exploited?

CVE-2021-40444

Summary

This challenge was designed for us to gain a basic understanding of MSHTML vulnerability and how we can detect them from Microsoft Office documents.

![f51501f080f201a5258e81f6243f242e.png](/resources/f51501f080f201a5258e81f6243f242e.png) Badge Acquired