{"id":31602,"date":"2023-09-03T00:17:49","date_gmt":"2023-09-02T22:17:49","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=31602"},"modified":"2023-09-02T13:21:49","modified_gmt":"2023-09-02T11:21:49","slug":"maldoc-malicious-word-files-in-pdf-documents-bypass-malware-detection","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2023\/09\/03\/maldoc-malicious-word-files-in-pdf-documents-bypass-malware-detection\/","title":{"rendered":"MalDoc: Malicious Word files in PDF documents bypass malware detection"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2023\/09\/02\/maldoc-schdliche-word-dateien-in-pdf-dokumenten-umgehen-malware-erkennung\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]Another small addendum from this week: The Japanese CERT warns of a new technique used by cyber attackers who take malicious Word files and embed them in PDF documents. This \"packaging\" is intended to bypass the detection of the malicious Office documents by security software. JPCERT\/CC first observed such attack techniques, known as MalDoc, via infected PDF files in July 2023.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg01.met.vgwort.de\/na\/b48827939e9f42f7aeb66a49e560d3b7\" alt=\"\" width=\"1\" height=\"1\" \/>I already stumbled across the following message from the JPCERT\/CC on <a href=\"https:\/\/twitter.com\/_r_netsec\/status\/1696065858718818409\" target=\"_blank\" rel=\"noopener\">Twitter<\/a> a few days ago. The security agency documented the whole thing in the blog post <a href=\"https:\/\/blogs.jpcert.or.jp\/en\/2023\/08\/maldocinpdf.html\" target=\"_blank\" rel=\"noopener\">MalDoc in PDF &#8211; Detection bypass by embedding a malicious Word file into a PDF file<\/a>.<\/p>\n<p><a href=\"https:\/\/blogs.jpcert.or.jp\/en\/2023\/08\/maldocinpdf.html\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"MalDoc; Detection bypass\" src=\"https:\/\/i.postimg.cc\/gjvHMF0t\/image.png\" alt=\"MalDoc; Detection bypass\" \/><\/a><\/p>\n<p>It says that JPCERT\/CC confirmed that an attack in July 2023 used this new technique, called MalDoc, to bypass the detection of malicious files by security software. This involved embedding a malicious Word file in a PDF and then sending it to victims.<\/p>\n<p>A file created with MalDoc in PDF can be opened in Microsoft Word, even though it has the magic bytes and file structure of PDF documents. If the Word document file masked in this way contains a macro, the VBA code is executed when the document is opened in Word. Then malicious actions can be performed via VBA.<\/p>\n<p>Interestingly, the document file used in the attack confirmed by JPCERT\/CC had the .doc file extension, although it had the Magic Bytes as well as the structure of a PDF file. Once the .doc file type is configured in the Windows settings to open in Word (which is the default), the file created by MalDoc in PDF will open as a Word file.<\/p>\n<p>In the JPCERT\/CC post there is a video showing the attack. In addition, the blog post reveals some more details and the security agency gives some hints on what to try to detect such malicious files. A safe analysis of suspicious document files would be the tool <a href=\"https:\/\/github.com\/decalage2\/oletools\/wiki\/olevba\" target=\"_blank\" rel=\"noopener\">OLEVBA<\/a>, In addition, the experts of the security agency have published a <a href=\"https:\/\/de.wikipedia.org\/wiki\/YARA\" target=\"_blank\" rel=\"noopener\">YARA rule<\/a> for detecting such malware.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Another small addendum from this week: The Japanese CERT warns of a new technique used by cyber attackers who take malicious Word files and embed them in PDF documents. This \"packaging\" is intended to bypass the detection of the malicious &hellip; <a href=\"https:\/\/borncity.com\/win\/2023\/09\/03\/maldoc-malicious-word-files-in-pdf-documents-bypass-malware-detection\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,580,1547],"tags":[125,968,69],"class_list":["post-31602","post","type-post","status-publish","format-standard","hentry","category-office","category-security","category-software","tag-office","tag-pdf","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/31602","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=31602"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/31602\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=31602"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=31602"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=31602"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}