Reverse engineering the "A Letter Before Court 4.docx" malicious files exploting cve-2021-40444# cve-2021-40444
Reverse engineering the "A Letter Before Court 4.docx" malicious files exploting cve-2021-40444
Files (including malicious word and cab-file) may be downloaded on any.run: https://app.any.run/tasks/36c14029-9df8-439c-bba0-45f2643b0c70/#
**Note!**
The domain name in the original malicious code is **replaced with 127.0.0.1:8000** to avoid any mistakes executing malicious code.
So, if you want to serve your own championship.inf-file (which is actually a PE-file), just use:
python3 -m http.server
**The step 3 file**
In this step, the code is human readably enough to see how the cve-2021-40444 bug is used by the malicious word document.
**championship.inf**
This is the PE-file that is loaded on a successful attack.
**Stages**
1. Word file loads the web-address (internet address) as an OLE-object (side.html in this case)
2. Side.html uses ActiveX loading to download a .cab file from internet
3. Side.html javascript references the championship.inf contained in the .cab file as a loadable activex-object
4. Thereafter... code execution by the activex
[4.0K] /data/pocs/da863c808521de56bf4a1459e3622e8966c21cb5
├── [1.1K] README.md
├── [7.7K] side_step1.html
├── [6.2K] side_step2.html
└── [3.4K] side_step3.html
0 directories, 4 files