<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Macros — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/macros/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 26 Jan 2024 16:25:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/macros/feed.xml" rel="self" type="application/rss+xml"/><item><title>Malicious Word Document Targeting macOS Delivers Meterpreter</title><link>https://feed.craftedsignal.io/briefs/2024-01-mac-word-malware/</link><pubDate>Fri, 26 Jan 2024 16:25:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-mac-word-malware/</guid><description>A malicious Word document targeting macOS users employs macros to download and execute a Meterpreter payload, leveraging a sandbox escape vulnerability and launch agent plist for persistence.</description><content:encoded><![CDATA[<p>A malicious Microsoft Word document, discovered in December 2018, specifically targets macOS users. The document, named BitcoinMagazine-Quidax_InterviewQuestions_2018.docm, contains embedded VBA macros designed to download and execute a second-stage payload. The macros leverage a previously identified sandbox escape technique, allowing the malware to bypass Microsoft Word&rsquo;s intended restrictions. The ultimate goal is to establish persistence via a launch agent and execute a Meterpreter payload, granting the attacker remote access and control over the compromised macOS system. This highlights the importance of macro security settings, and the risk of running macros from untrusted sources, even if those sources appear to be benign documents.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The user opens the malicious Word document (BitcoinMagazine-Quidax_InterviewQuestions_2018.docm) on a macOS system.</li>
<li>If macros are enabled, the <code>Document_Open()</code> subroutine is executed.</li>
<li>The macro decodes a base64-encoded Python script, storing it in the <code>payload</code> variable.</li>
<li>The macro constructs a path to a launch agent plist file: <code>~/Library/LaunchAgents/~$com.xpnsec.plist</code>.</li>
<li>The macro creates a launch agent plist file (com.xpnsec.plist) containing the decoded Python script, configured to run at load.</li>
<li>The macro saves the launch agent plist to disk using the <code>system</code> command, bypassing sandbox restrictions.</li>
<li>The Python script connects to 109.202.107.20:9622 to download the Meterpreter payload.</li>
<li>The downloaded Meterpreter payload is executed, granting the attacker remote access to the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute arbitrary commands, exfiltrate files, and perform other malicious activities on the compromised macOS system.  The attacker gains a persistent foothold, allowing them to maintain access even after the initial Word document is closed. While the number of victims is unknown, the targeting of macOS users indicates a potential interest in specific user groups or environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process-creation logging to activate the rules below.</li>
<li>Block connections to the C2 IP address <code>109.202.107.20</code> at the firewall.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>macos</category><category>word</category><category>macros</category><category>meterpreter</category><category>sandbox escape</category></item></channel></rss>