Skip Navigation
BlackBerry Blog

Emerging Threat Alert - CVE-2014-4114

The following emerging threat (CVE-2014-4114) has been analyzed by Cylance's research team.

During last week’s Patch Tuesday, Microsoft patched vulnerabilities related to the following identifiers:

CVE-2014-4114 (MS Advisory 14-060)
CVE-2014-6352 (MS Advisory 3010060)
• Sandworm
• BlackEnergy

Microsoft released MS14-060 to patch the vulnerabilities described in CVE-2014-4114. This patch left open some avenues of attack that still allowed remote code execution. On October 21, 2014, Microsoft followed up by releasing security advisory (3010060). This security advisory makes some recommendations for workaround and provides a Fix-IT download. CylancePROTECT™ provides protection for the known files downloaded during exploitation.

Observed files include:

 70b8d220469c8071029795d32ea91829f683e3fbbaa8b978a31a0974daee8aaf (PPT) 4b2b9c147ed28b8f908f96f0c0db8bf8a0da0ac47864bbe0b31c976a4229a2ea (doc) 30175747dda628bc4ad8353d8e71f17e44ec8dde36c81891ff539dcec5693420 (PPT) 2baba003ef1858b22c1968a2699269cb12d1c3ec117c4951d9775466eb4c7f76 (PPSX) 65a8bf996bfc23405be764266d7409a65fa936d19cee52b61ef83e29dcdd6230 (PPSX) bd2176b239d240232cdced2da9fc930e627a27190e7216142db93f6538b21006 (PPSX) 6732379efe230b522185cde9c186bc2640a5dfc7e154a6037ee3bbe067d6e705 (PPSX) 

Examining the Threat

For a little more information,we'll examine one hash that happens to be a PowerPoint file.


The 2 packager shell objects in slide1.xml:

<p:oleObj spid="_x0000_s1026" name="Packager Shell Object" r:id="rId4"
<p:oleObj spid="_x0000_s1027" name="Packager Shell Object" r:id="rId5"

<Relationship Id="rId5" Type="" Target="../embeddings/oleObject2.bin"/>

<Relationship Id="rId4" Type="" Target="../embeddings/oleObject1.bin"/>

 When slide1 is opened a slides.INF and a slide1.GIF file are copied locally.

Then based on parameters if slides.inf is loaded, it will install the .INF file. After that the .INF file will rename the .GIF file to .GIF.EXE and add the Trojan to the registry RUNONCE.

Known, in-the-wild executables that have been dropped as part of exploitation, are detected and prevented with CylancePROTECT. These include:

 f6a4c241b38226a8ba5cc7a954faef6d7dc0c308534722860d38f7b7aaadad75 2731d7cfcde172e6dde879f9c26bddaa0d2b1beba9a27680fbd2fa37f9bf12b7 ea72c79d15fb1b7765d40733a251f8e3b8aeb278cd2bbf429d64921155214b36 980d577d3448477dbfe65316b42f2b970c3972e5b01be9abe7abba3568aa1de7 0fda6c118fb7dc946440cb9225e32ab1825d87d4f088bb75a6eab7cef35433bc 0f63c8f8f080aff491ffb5bb4fcbb23a4719f86df9435e06af42f835b31dc79b 2E73379DAB7819B3C8A1956EA1E7CB647763E96DAF65024E05314BDA8044DF0B 



Cylance recommends the following threat mitigation steps:

1. Use a process of least-privileges to limit damage that may occur if malware is executed.
2. Educate users about proper browsing and email attachment handling.
3. Maintain a defense-in-depth strategy including patch management, firewalling, IPS, and anti-malware protections like CylancePROTECT on your endpoints.

Cylance VS. CVE-2014-4114

Using the sample 2baba003ef1858b22c1968a2699269cb12d1c3ec117c4951d9775466eb4c7f76, we were able to confirm that we would convict the dropped exe 37CA2ECB5E1FC89F73C6ADC188FF685D.
CylancePROTECT is the next generation of endpoint security product that effectively renders advanced threats useless. Through the use of advanced mathematics rather than reactive signature or trust-based systems, Cylance has developed the most accurate, efficient, and effective solution for stopping malware execution. If you feel you have been compromised and would like to request an incident response engagement with Cylance's expert professional services team, please contact us at 1-877-97DEFEND.

For questions or comments, please contact us at



Jason Carpenter

About Jason Carpenter

Principal Security Consultant at Cylance

Jason Carpenter is the Principal Security Consultant for Cylance, Japan, where he leads a team of malware researchers who analyze and classify malware. Prior to Cylance, Jason worked at Blue Coat Systems as a Malware Researcher. He has a MS in Information Assurance from Norwich University and a BS in Business Administration from Colorado Technical University.