TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Huntress

Threat Advisory: Hackers Are Exploiting CVE-2021-40444 | Huntress

2021-09-09 · Read original ↗

ATT&CK techniques detected

8 predictions
T1112Modify Registry
100%
"/ d 00000003 / f reg add " hkey _ local _ machine \ software \ policies \ microsoft \ windows \ currentversion \ internet settings \ zones \ 0 " / v " 1004 " / t reg _ dword / d 00000003 / f reg add " hkey _ local _ machine \ software \ policies \ microsoft \ windows \ currentver…"
T1204.002Malicious File
86%
"there is no telling when we might see something available. for now, we need to prepare ourselves by understanding this attack chain, monitoring for artifacts and incidents of compromise and keeping our ears to the ground for new information and threat intelligence. we ’ ve create…"
T1112Modify Registry
81%
"settings \ zones \ 2 " / v " 1004 " / t reg _ dword / d 00000003 / f reg add " hkey _ local _ machine \ software \ policies \ microsoft \ windows \ currentversion \ internet settings \ zones \ 3 " / v " 1001 " / t reg _ dword / d 00000003 / f reg add " hkey _ local _ machine \ so…"
T1204.002Malicious File
76%
"opening the file and this invalidates microsoft ’ s workaround mitigation discussed below. for office files, no traditional vba macros are needed for this attack. any url beginning with mshtml : http will download a file passed to the mshtml parser engine, and potentially any way…"
T1564.004NTFS File Attributes
44%
"##6addf59d41834ea100fe9cededd3e3bad 2e328b32f8c7081fbe0aa8407b1b93d1120ac1c8a6aa930eeba1985c55a0daa0 4d5acce20cfa4ff5cf5003b03aa6081959db25e4eca795b2e5f4191c04c5be32 4477d161958522d5d0dd0cfc4e6d38b0459654184c4ee2b9bce78d2524d7bc9d a5f55361eff96ff070818640d417d2c822f9ae1cdd7e8fa0d…"
T1112Modify Registry
41%
"- exploit activity like the cobalt strike stager, other command and control behavior and / or ransomware detonation, then huntress will catch it and provide assisted remediation steps. as always, huntress will be monitoring the situation and keep this blog post as well as our soc…"
T1204.002Malicious File
40%
"updated their advisory to stop preview mode in windows explorer and offer a group policy option. - defender ’ s detection of the exploit looks to use a hardcoded domain. this might prevent this specific threat actor and that specific campaign, but it doesn ’ t fully detect the th…"
T1203Exploitation for Client Execution
40%
"there is no telling when we might see something available. for now, we need to prepare ourselves by understanding this attack chain, monitoring for artifacts and incidents of compromise and keeping our ears to the ground for new information and threat intelligence. we ’ ve create…"

Summary

Huntress is monitoring a new threat against Windows OS and Microsoft Office products (CVE-2021-40444). The MSHTML engine is vulnerable to arbitrary code execution.