Staying Ahead of CVE-2022-30190 (Follina) 

Executive Summary

  • On May 27th 2022, @nao_sec identified a malicious Microsoft Word document using a “ms-msdt” protocol scheme for arbitrary code execution.
  • As the industry continues to identify novel ways to abuse this ability over the weekend, Microsoft assigned it as CVE-2022-30190.
  • Similar to what we observed with Log4j, the methods of execution and outcomes of this vulnerability continue to expand as it gains more researcher and attacker attention.
  • Specific attackers have been observed exploiting the vulnerability. Chinese APTs have potentially made use of it around May 20th, 2022, but first samples identified as easily as mid-April 2022.
  • Defenders should consider it a critical vulnerability and seek mitigation steps immediately. Additional effort should then be made to hunt for execution prior to public knowledge as attackers could have already abused it.

Background

Concerns are rising after Microsoft confirmed that its Microsoft Windows Support Diagnostic Tool (ms-msdt) contains a zero-click remote code execution vulnerability. The zero day appears to have been exploited in the wild since at least early April 2022, based on current reports.

The vulnerability, dubbed “Follina”, makes use of how the ms-msdt handles URLs. In its simplest form, calling ms-msdt can allow attackers to execute code on a machine. The vulnerability impacts all Windows versions currently supported by Microsoft.

The call to ms-msdt with code execution is most commonly being reported on through the abuse of Microsoft ,.doc and .rtf files. However, as we continue to gain new insight into the vulnerability, newer methods are coming to light. For example as Will Dormann observed, a WGET to an attacker domain can return HTML content with the call to ms-msdt to run code on the machine running the WGET.

Observed Threat Activity

Since we are in the very early stages of this vulnerability being publicly known, we expect to update this section as we continue our analysis and research. However, at the time of writing our colleagues from Malwarebytes identified the first public sample (f531a7c270d43656e34d578c8e71bc39) of a matching Word document on April 12th 2022. This sample is themed around the Russian invasion of Ukraine.

On May 27th 2022, @nao_sec tweeted about a file uploaded to VirusTotal from Belarus (52945af1def85b171870b31fa4782e52) that uses Word’s external link to load HTML and then uses the “ms-msdt” scheme to execute PowerShell code. In this sample, the file beacons out to xmlformats[.]com, which at the time of discovery resolved to 141[.]105.65.149. Note that the actor behind this particular sample began their infrastructure build around May 19th.

Subsequently, on May 30th 2022, a Chinese APT was observed by Proofpoint abusing the vulnerability through the C2 domain tibet-gov.web[.]app.

Mitigation Guidance

You can disable “Troubleshooting wizards” in one of two ways. Either through GPO:

HKLMSOFTWAREPoliciesMicrosoftWindowsScriptedDiagnostics - EnableDiagnostics - 0

or in the user interface:

Group Policy Editor -> Computer Configuration -> Administrative Templates -> System -> Troubleshooting and Diagnostics -> Scripted Diagnostics. Set "Troubleshooting: Allow users to access and run Troubleshooting Wizards" to "disabled".

Microsoft has also recommended disabling the MSDT URL Protocol by executing the following command:

reg delete HKEY_CLASSES_ROOTms-msdt /f

SentinelOne vs CVE-2022-30190 (Follina)

The SentinelOne agent detects the execution of known “Fallina” samples exploiting CVE-2022-30190.

SentinelOne customers can use the following STAR rule for real-time behavioral detection or as a hunting rule in Deep Visibility:

EndpointOS = "windows" AND
EventType = "Process Creation" AND
TgtProcName Contains Anycase "msdt.exe" AND
TgtProcCmdLine Contains Anycase "PCWDiagnostic" AND
(TgtProcCmdLine Contains Anycase "IT_BrowseForFile" OR 
TgtProcCmdLine Contains Anycase "IT_RebrowseForFile")

Additional Resources

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *