SWF_EXPLOYT.LPE

 Analysis by: Nikko Tamana

 ALIASES:

Troj/SwfExp-CM (Sophos), Exploit:SWF/ShellCode.U (Microsoft)

 PLATFORM:

Windows 2000, Windows Server 2003, Windows XP (32-bit, 64-bit), Windows Vista (32-bit, 64-bit), Windows 7 (32-bit, 64-bit)

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:
 INFORMATION EXPOSURE:

  • Threat Type: Trojan

  • Destructiveness: No

  • Encrypted: No

  • In the wild: Yes

  OVERVIEW

Infection Channel:

Downloaded from the Internet

This malware was involved in the Adobe Flash Player zero-day exploit incident reported on February 2014. It would automatically download onto users' systems once the user browsed a compromised website. It would then exploit certain vulnerabilities in order to download malware. Users affected by this malware may find malicious routines exhibited on their systems.

To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.

This Trojan executes when a user accesses certain websites where it is hosted.

It exploits a vulnerability identified as in a zero-day attack.

  TECHNICAL DETAILS

File Size:

4,539 bytes

File Type:

SWF

Initial Samples Received Date:

21 Feb 2014

Payload:

Downloads files

Arrival Details

This Trojan executes when a user accesses certain websites where it is hosted.

Other Details

This Trojan exploits a zero-day vulnerability. More information on the said vulnerability can be found in the following pages:

NOTES:

This malware checks if the affected machine's operating system and/or installed software is any of the following:

  • Windows XP
  • Windows 7 and Java 1.6
  • Windows 7 and an outdated version of Microsoft Office 2007 or 2010

If found, it attempts to bypass ASLR capability of these operating systems.

On Windows XP, it builds return-oriented programming (ROP) chain of Visual C runtime gadgets (MSVCRT) with hard-coded base addresses for English and Chinese language pack operating systems.

On Windows 7, it uses hard-coded ROP chain for MSVCR71.dll if the affected machine has Java 1.6, while a hard-coded ROP chain for HXDS.dll is used if the affected machine has Microsoft Office 2007 or 2010.

After performing ASLR bypass, it downloads its shell code as logo.gif. The URL where it downloads its shell code is the same as where this malware is uploaded.

  SOLUTION

Minimum Scan Engine:

9.700

FIRST VSAPI PATTERN FILE:

10.620.01

FIRST VSAPI PATTERN DATE:

21 Feb 2014

VSAPI OPR PATTERN File:

10.621.00

VSAPI OPR PATTERN Date:

22 Feb 2014

Step 1

Before doing any scans, Windows XP, Windows Vista, and Windows 7 users must disable System Restore to allow full scanning of their computers.

Step 2

Close all opened browser windows

Step 3

Scan your computer with your Trend Micro product to delete files detected as SWF_EXPLOYT.LPE. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.

Step 4

Download and apply these security patches Refrain from using these products until the appropriate patches have been installed. Trend Micro advises users to download critical patches upon release by vendors.


Did this description help? Tell us how we did.