← Back to Index

LetsDefend - Malicious Doc

Created: 10/01/2024 14:04 Last Updated: 05/06/2024 20:03


**Malicious Doc** ![16aa99bfa9bd3c039f7dd134e595da91.png](/resources/16aa99bfa9bd3c039f7dd134e595da91.png)

Analyze malicious .doc file ~~File link: factura.zip~~ File: /root/Desktop/ChallengeFiles/factura.zip Password: infected

NOTE: Do not open on your local environment. It is malicious file.


Start Investigation

VirusTotal

Uploaded sample doc file to VirusTotal or if you prefer you can use this anyrun report as an alternative

![1e0687a1d57c74623aa4e61be6e04aca.png](/resources/1e0687a1d57c74623aa4e61be6e04aca.png) **41** security venders flagged this file as malicious and it might exploit a system using [**CVE-2017-11882**](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11882) ![df661f51817cb649165fa42aa86aa5a8.png](/resources/df661f51817cb649165fa42aa86aa5a8.png) ![68d68480297c213b5088a3e5de2420b6.png](/resources/68d68480297c213b5088a3e5de2420b6.png) This type of exploit is **rtf.exploit** ![1f916b9ca8e71df6899aec8674155657.png](/resources/1f916b9ca8e71df6899aec8674155657.png) ![4415cbc1e5aafb0e577ac65244758a90.png](/resources/4415cbc1e5aafb0e577ac65244758a90.png) It contacts a HTTP C2 server to download a payload stage as a real malware. ![bc976925dec87af3ff92ab0ddb5ccbcc.png](/resources/bc976925dec87af3ff92ab0ddb5ccbcc.png) ![58b6c1426d355c8b3ca8d3f1e7539552.png](/resources/58b6c1426d355c8b3ca8d3f1e7539552.png) It writes [**aro.exe**](https://www.virustotal.com/gui/file/5dfd85a1c9a3b450d9aa14d3ea0a6bac9db88623004e5e6d7b40e7ab3b17cd31) after it runs. ![1293452ab29564ae0d44233e58ec9eee.png](/resources/1293452ab29564ae0d44233e58ec9eee.png) File that dropped is also flagged as malcious by **55** security vendors

What type of exploit is running as a result of the relevant file running on the victim machine?

rtf.exploit

What is the relevant Exploit CVE code obtained as a result of the analysis?

CVE-2017-11882

What is the name of the malicious software downloaded from the internet as a result of the file running?

jan2.exe

What is the ip address and port information it communicates with?

185.36.74.48:80

What is the exe name it drops to disk after it runs?

aro.exe

Summary

This doc file is a crafted rtf file to exploit remote code execution vulnerability to a system using CVE-2017-11882. It is a stager that once it opened it tries to download an actual malware from a certain URL using HTTP GET method and It also drops a file after it runs.

![c16aaaec73126a07a2ffea7b541d0eb2.png](/resources/c16aaaec73126a07a2ffea7b541d0eb2.png) Badge Acquired