Stuxnet VB2010
Stuxnet VB2010
• • Discovery
Click to edit Master text styles
• Nemesis
– Second level
• Third level
• Analy(sz)ing Stuxnet
– Fourth level
• Shared printers» Fifth level
VB2010 Vancouver 2
Discovery
Click to edit Master title style
• • Early
ClickJuly – fellow
to edit researchers
Master text styles at VBA
––Main
Secondpointlevel
was stolen digital certificates
– VBA discovered
• Third level the LNK vulnerability and reported to
MS – Fourth level
– First focus» Fifth
on level
signed RealTek drivers
– This was just the beginning
• Questions:
– What was the purpose of the worm?
– Full functionality?
– Show me the money!!!
VB2010 Vancouver 3
Nemesis
Click to edit Master title style
• • Incident
Click toresponse
edit Masterteam
textatstyles
KL
• Stuxnet
– Secondclearly
levelrequired cross departmental
investigation – eventually cross-vendor
• Third level
• Results:
– Fourth level
» Fifth level
– Huge amount of code
– Parallel investigation with multiple people/teams
– In the end took 2 months
– MS08-067 – but different exploit code from Conficker
– Fully patched computers got infected
– Created virtual test environments
– Used 2 networks – only one remotely infected
VB2010 Vancouver 4
Stuxnet
Click to edit Master title style
VB2010 Vancouver 5
Hands up please
Click to edit Master title style
VB2010 Vancouver 6
New 0-day
Click to edit Master title style
• • Allowed
Click toStuxnet
edit Master to text styles
remotely infect computers
– Second level
with shared printers
• Third level
• Already –researching
Fourth level
another vulnerability
» Fifth level
exploited by Stuxnet – an
EoP
• Finding two 0-day
vulnerabilities in two days
was a big surprise for us
VB2010 Vancouver 7
Remote infection
Click to edit Master title style
• • Stuxnet
Click tocopies two files
edit Master textvia MS10-061 exploit:
styles
––the wormlevel
Second body “winsta.exe” in %system%
– and “sysnullevent.mof”
• Third level in %system%\mof\
– Fourth level
• Windows uses MOFCompiler functionality to
» Fifth level
automatically add contents of “.mof” file to the WMI
repository
• Next, Windows attempts to act on the instruction from
the repository
• Result - the body of the worm is executed
VB2010 Vancouver 8
MOF-file (Managed Object Format)
Click to edit Master title style
VB2010 Vancouver 9
Windiff of repositories
Click to edit Master title style
MOF file contains Visual Basic code which completes three actions
VB2010 Vancouver 10
Was it really 0-day?
Click to edit Master title style
• • Hakin9
Click tomagazine
edit Master published an article in
text styles
April 2009
– Second level
• Carsten level – “Print Your Shell”
Kohler
• Third
• Describes a method
– Fourth level to copy arbitrary
» Fifth level
data to remote systems
• Exactly what Stuxnet used
• Fixed via MS10-061
VB2010 Vancouver 11
An EoP vulnerability
Click to edit Master title style
•• 0-day
Click EoP,
to editfound
Master bytext styles
Maxim Golovkin
– Second level
• Vulnerability in
• Third level
win32k.sys – Fourth level
» Fifth level
• NtUserSendInput
function
• Reported to MS via
MAPP
• MSRC advisory
issued, patch pending
VB2010 Vancouver 12
Conclusions
Click to edit Master title style