Scenario: Auto DDE - Fileless Malware

OVERVIEW: Dynamic Data Exchange is an old Microsoft technology that can be abused to execute code from within MS Office documents. It does not use macros so bypasses security warnings.

BUSINESS PROBLEM: Employees may receive a file that includes DDE field codes, without their knowledge.

THREAT: Usage of the feature does not require a macro and will not show the user a security warning. The only indication for a user is a popup from the Office document requesting to auto update links. The payload is automated once the popup is accepted.

SAMPLE 1:

Sample CV in Word Doc (Auto DDE redirects to website)

TEST USING GX PLATFORM:


UPDATE

  • Microsoft updated Office to disable AutoDDE by default
  • If the update is applied to the test PC then it will be necessary to re-enable the feature to complete the test
  • Also - most Anti Virus products are now updated to blacklist any file containing AutoDDE

  • With CTR DISABLED
    (i.e. the ICAP profile is disabled on the Web Proxy / or the browser is set to bypass)

  • Download the file to your local drive
  • Open the file in Word - it will prompt you to update links from another document
  • When accepted, your browser will launch - it should connect to an external website (BBC in this example)

  • With CTR ENABLED

  • Download the file
  • Open the Word file
  • Examine the small text - this is the AutoDDE function - you can no longer toggle the code!

  • OUTCOME
  • Deep Secure assume all data is hostile - regardless
  • The Word file is subject to Content Transforms
  • The field code does not transform and only the (harmless) business information remains
  • This means the business information is carried through to the user rather than the whole file being quarantined by Anti Virus