Categories: Malware

PowerPoint Slide Show Infected by New Malware that Exploiting Zero-day RCE Vulnerability

New Malware that abuses MS Power point slide show by Exploiting the CVE-2017-0199 (Zero-day remote code execution vulnerability) flow Exists in Windows OLE (Object Linking and Embedding).

Malicious Rich Text File (RTF) documents used for Exploit this Vulnerability by using Microsoft Office interface to Deliver this Malware.

This Malware used by the same Method of DRIDEX Trojan that was integrated with Auto Bomb Technique.

Cyber security Firm Trend Micro Discover this Trojan as TROJ_CVE20170199.JVU through Phishing Main Campaign.

Malware Working Flow

Same as other Malware, spear-phishing email method is used for spreading this Trojan with attached Malicious PPSX file.

The attacker uses Fraudulent Email send address look like a legitimate Business partner that involved in the electronics manufacturing industry.

Malicious Email with Attached PPSX file

This Email seems to be an order request but it contains Attacked Malicious PPSX file.

It shows CVE-2017-8570 once the Powerpoint slide is opened, that is meant to be different Microsoft Vulnerability.But instead of that it actually Performing an Exploitation of Another Microsoft Vulnerability (CVE-2017-0199).

Once this Malware triggered in victims machine exploit runs the remote code at “http://192.166.218.230:3550/logo.doc” which is a VPN or hosting service that is abused by the attacker.
Image Source: Trend Micro

Abused VPN or Hosting IP

Later it will Download the Malicious logo.doc File from the Command & Control server

Image Source: Trend Micro

Malware Execution Road MAP

According to Trend Micro ,This logo.doc file is an XML format with Embedded JavaScript Code that will runs a PowerShell command to download and execute the file known as RATMAN.EXE .

The executable is actually a trojanized version of the REMCOS remote access tool (RAT) from the (C&C) server: http://192.166.218.230:3550/ratman[.]exe, which is located in Poland.

Finally RATMAN.EXE connect to the C&C Server(5.134.116.146:3550 ) for the Execution and allow the remote code to Execute into the victims machine.

REMCOS RAT Capability

REMCOS RAT is legitimate Remote Access tool that can help to control the system from anywhere is the World.

It can able to Execute the remote commands on the user’s system  Once REMCOS is executed.

The tool’s capabilities are quite comprehensive, and includes a download & execute command, a keylogger, a screen logger, and recorders for both webcam and microphone.Trend Micro said.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

View Comments

Recent Posts

Authorities Seize $31 Million Linked to Crypto Exchange Hack

U.S. authorities announced the seizure of $31 million tied to the 2021 Uranium Finance decentralized…

12 minutes ago

Google, Meta, and Apple Power the World’s Biggest Surveillance System

Imagine a government that tracks your daily movements, monitors your communications, and catalogs your digital…

18 minutes ago

Docusnap for Windows Flaw Exposes Sensitive Data to Attackers

A recently disclosed vulnerability in Docusnap's Windows client software (CVE-2025-26849) enables attackers to decrypt sensitive…

2 hours ago

CISA Warns of Active Exploitation of Microsoft Windows Win32k Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2018-8639, a decade-old Microsoft Windows privilege…

2 hours ago

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under limited,…

4 hours ago

BigAnt Server 0-Day Vulnerability Lets Attackers Run Malicious Code Remotely

A critical vulnerability in BigAntSoft's enterprise chat server software has exposed ~50 internet-facing systems to…

5 hours ago