POC详情: 6807188d853a29a54ca956517201c8deb40b4863

来源
关联漏洞
标题: WinRAR 安全漏洞 (CVE-2023-38831)
描述:WinRAR是一款文件压缩器。该产品支持RAR、ZIP等格式文件的压缩和解压等。 RARLabs WinRAR 6.23之前版本存在安全漏洞。攻击者利用该漏洞可以执行任意代码。
描述
KQL Hunting for WinRAR CVE-2023-38831
介绍
# CVE-2023-38831 - WinRAR File Extension Spoofing Vulnerability

## Description
Cybercriminals have exploited a vulnerability allowing them to spoof file extensions. This means they can hide the launch of malicious scripts within archives pretending to be common file types such as `.jpg`, `.txt`, etc. This vulnerability was reported to both RARLAB and MITRE Corporation, with the latter assigning it the identifier CVE-2023-38831. Notably, the cybercriminals have used ZIP archives to deliver various malware families such as DarkMe, GuLoader, and Remcos RAT. 

**Impact**:
- Distributed through specialist forums for traders, 130 traders' devices are currently known to be infected.
- While the total number of infected devices remains uncertain, the cybercriminals have been withdrawing money from broker accounts.
- The cybercriminals are leveraging this vulnerability to distribute tools previously used in the DarkCasino campaign as described by NSFOCUS.

## KQL Query for Microsoft Defender for Endpoint (MDE)

This KQL query is designed specifically for use with Microsoft Defender for Endpoint (MDE). The main table utilized in the query is `DeviceFileEvents`.

## Interpretation of KQL Search Results

- **Timestamp**: When the event occurred.
- **DeviceName**: Name of the device where the event was logged.
- **Filename with extension**: Actual name of the file.
- **Shown File Name**: The file name as presented to the user (potential spoofed name).
- **FolderPath**: Path of the file.
- **SHA256**: Hash of the file.
- **Known Hash?**: Indicates whether the file's hash matches any known malicious hash.
- **User Account**: Account initiating the process.

## Sources and Acknowledgments
- The Indicators of Compromise (IOCs) used in this query are sourced from Group-IB's analysis of CVE-2023-38831.(https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/)
- The Proof of Concept (PoC) for this vulnerability was generated using the exploit generator by b1tg, available at b1tg's GitHub repository.(https://github.com/b1tg/CVE-2023-38831-winrar-exploit)

## Notes

- This KQL query is basic in nature and does not guarantee comprehensive detection of malicious activity. It is important to continually refine and expand the search criteria based on evolving threats.
- The hash values used in the query are sourced from a specific site (https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/) and often relate to complete archives. As such, the "Known Hash?" column should be treated with caution.
- It's crucial to understand that the results from this query do not guarantee a compromise. There might be legitimate business use cases that can produce similar results. Always investigate and interpret the findings in the context of your environment.

## Disclaimer

**All information provided is "as is" without any guarantees. Use of this information and the provided query is at your own risk and responsibility.**
文件快照

[4.0K] /data/pocs/6807188d853a29a54ca956517201c8deb40b4863 ├── [ 761] detection_results.md ├── [6.1K] MDE-Query.kql └── [2.9K] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。