The ASEC analysis team has recently discovered the distribution of malicious files that include a new vulnerability CVE-2021-40444 which was revealed by Microsoft in September. It is noteworthy that the confirmed document files are all North Korea-related materials. North Korea-related malicious files have been evolving in new ways since the past. Seeing that the attackers are using a new vulnerability, they are quickly applying the new techniques in their distribution.
CVE-2021-40444 is a vulnerability that allows remote code execution of MSHTML. MSHTML is a browser rendering engine of Internet Explorer and Office applications. This vulnerability works on Internet Explorer and Office document applications. Magniber ransomware has also been exploiting the vulnerability since September, and it is being distributed even now via Internet Explorer.
Office document files that include this vulnerability are being distributed with the following filenames, tricking users into thinking that they are North Korea-related materials.
● (2021-1118) Korea Institute for ******** Unification – Graduate School of *********** Joint Seminar Program (final).docx
● +Seminar on Promotion of Cross-border Corporation between Russia, China, and North Korea.docx
The external URL shown in the following figure was used to activate CVE-2021-40444, and the steps of attack are as follows:
- Approaches malicious URL via MHTML (MIME HTML) protocol
- Downloads CAB file, loads malicious DLL file with INF extension inside CAB file, and executes malicious behavior
Once the malicious behavior is executed, the text inside the file can be seen. It details an agenda of Unification Institution’s seminar that takes place on November 18.
Given that the two North Korea-related document files access the same URL, we suspect that one attacker is the author of these files. The server is currently open, but the access is blocked.
Like this, malicious document files related to North Korea are continuously being distributed using various vulnerabilities. As the files actually contain North Korea-related materials, making it difficult for users to acknowledge that they are malicious files even after running them, we would advise users to take extra caution.
V3 products detect such files using the following aliases:
Subscribe to AhnLab’s next-generation threat intelligence platform ‘AhnLab TIP’ to check related IOC and detailed analysis information.