{"id":5097,"date":"2018-07-02T15:00:00","date_gmt":"2018-07-02T15:00:00","guid":{"rendered":"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/?p=83911"},"modified":"2018-07-02T15:00:00","modified_gmt":"2018-07-02T15:00:00","slug":"taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset\/","title":{"rendered":"Taking apart a double zero-day sample discovered in joint hunt with ESET"},"content":{"rendered":"<p>In late March 2018, I analyzed an interesting PDF sample found by <a href=\"https:\/\/www.welivesecurity.com\/2018\/05\/15\/tale-two-zero-days\/\">ESET senior malware researcher\u00a0Anton Cherepanov<\/a>. The sample was initially reported to Microsoft as a potential exploit for an unknown Windows kernel vulnerability. During my investigation in parallel with ESET researchers, I was surprised to discover two new zero-day exploits in the same PDF. One exploit affected Adobe Acrobat and Reader, while the other exploit affected older platforms, Windows 7 and Windows Server 2008. Microsoft and Adobe have since released corresponding security updates:<\/p>\n<p>The first exploit attacks the Adobe JavaScript engine to run shellcode in the context of that module. The second exploit, which does not affect modern platforms like Windows 10, allows the shellcode to escape Adobe Reader sandbox and run with elevated privileges from Windows kernel memory. ESET provided an analysis of the <a href=\"https:\/\/www.welivesecurity.com\/2018\/05\/15\/tale-two-zero-days\/\">exploitation routines in the sample PDF<\/a>.<\/p>\n<p>Although the PDF sample was found in VirusTotal, we have not observed actual attacks perpetrated using these exploits. The exploit was in early development stage, given the fact that the PDF itself did not deliver a malicious payload and appeared to be proof-of-concept (PoC) code.<\/p>\n<p>Finding and neutralizing a double zero-day exploit before an attacker had a chance to use it was an amazing result of the great collaboration between ESET, Microsoft, and Adobe security researchers.<\/p>\n<p>Here\u2019s some more information about the exploit process. This analysis is based on a sample we found after additional hunting (<em>SHA-256: 4b672deae5c1231ea20ea70b0bf091164ef0b939e2cf4d142d31916a169e8e01<\/em>).<\/p>\n<h2>Exploit overview<\/h2>\n<p>The Adobe Acrobat and Reader exploit is incorporated in a PDF document as a malicious JPEG 2000 stream containing the JavaScript exploit code. The following diagram provides an overview of the exploit process.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83914\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/07\/fig-1-overview-exploit-process.png\" alt=\"\" width=\"1000\" height=\"532\"\/><\/p>\n<p><em>Figure 1. Overview of the exploit process<\/em><\/p>\n<p>As shown in the diagram, the exploit process takes place in several stages:<\/p>\n<ol>\n<li>JavaScript lays out heap spray memory.<\/li>\n<li>Malicious JPEG 2000 stream triggers an <em>out-of-bounds<\/em> access operation.<\/li>\n<li>The access operation is called upon out-of-bounds memory laid out by the heap spray.<\/li>\n<li>The access operation corrupts the <em>virtual function table (vftable)<\/em>.<\/li>\n<li>The corrupted <em>vftable<\/em> transfers execution to a <em>return-oriented programming (ROP)<\/em> chain.<\/li>\n<li>The ROP chain transfers execution to the main shellcode.<\/li>\n<li>The main elevation-of-privilege (EoP) module loads through reflective DLL loading.<\/li>\n<li>The main PE module launches the loaded Win32k EoP exploit.<\/li>\n<li>When the EoP exploit succeeds, it drops a .vbs file in the <em>Startup<\/em> folder. The .vbs file appears to be proof-of-concept malware designed to download additional payloads.<\/li>\n<\/ol>\n<h2>Malicious JPEG 2000 stream<\/h2>\n<p>The malicious JPEG 2000 stream is embedded with the following malicious tags.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83950\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/07\/fig-2-malicious-JPEG-2000-stream.png\" alt=\"\" width=\"627\" height=\"416\"\/><\/p>\n<p><em>Figure 2. Malicious JPEG 2000 stream<\/em><\/p>\n<p>The following image shows the <em>CMAP<\/em> and <em>PCLR<\/em> tags with malicious values. The length of CMAP array (<em>0xfd<\/em>) is smaller than the index value (0xff) referenced in PCLR tags\u2014this results in the exploitation of the out-of-bounds memory free vulnerability.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-83953\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/07\/fig-3-out-of-bounds-index-CMAP-array.png\" alt=\"\" width=\"750\" height=\"381\"\/><\/p>\n<p><em>Figure 3. Out-of-bounds index of CMAP array<\/em><\/p>\n<p>Combined with heap-spray technique used in the JavaScript, the out-of-bounds exploit leads to corruption of the <em>vftable<\/em>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83929\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/07\/fig-4-vftable-corruption-ROP-chain-to-code-execution.png\" alt=\"\" width=\"639\" height=\"437\"\/><\/p>\n<p><em>Figure 4. vftable corruption with ROP chain to code execution<\/em><\/p>\n<p>The shellcode and portable executable (PE) module is encoded in JavaScript.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83932\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/07\/fig-5-shellcode-in-javascript.png\" alt=\"\" width=\"717\" height=\"238\"\/><\/p>\n<p><em>Figure 5 Shellcode in JavaScript<\/em><\/p>\n<h2>Reflective DLL loading<\/h2>\n<p>The shellcode (pseudocode shown below) loads the main PE module through reflective DLL loading, a common technique seen in advanced attacks to attempt staying undetected in memory. On Windows 10, the <a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2017\/11\/13\/detecting-reflective-dll-loading-with-windows-defender-atp\/\">reflective DLL loading technique is exposed<\/a> by Windows Defender Advanced Threat Protection (Windows Defender ATP).<\/p>\n<p>The shellcode searches for the start of the PE record and parses PE sections, copying them to the newly allocated memory area. It then passes control to an entry point in the PE module.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83935\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/07\/fig-6-copying-PE-sections-to-allocated-memory.png\" alt=\"\" width=\"661\" height=\"273\"\/><\/p>\n<p><em>Figure 6. Copying PE sections to allocated memory<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83938\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/07\/fig-7-passing-control-to-an-entry-point-in-the-loaded-dll.png\" alt=\"\" width=\"510\" height=\"62\"\/><\/p>\n<p><em>Figure 7. Passing control to an entry point in the loaded DLL<\/em><\/p>\n<h2>Main Win32k EoP exploit<\/h2>\n<p>The main Win32k elevation-of-privilege (EoP) exploit runs from the loaded PE module. It appears to target machines running Windows 7 SP1 and takes advantage of the previously unreported <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-8120\">CVE-2018-8120<\/a> vulnerability, which is not present on Windows 10 and newer products. The exploit uses a NULL page to pass malicious records and copy arbitrary data to an arbitrary kernel location. The NULL page dereference exploitation technique is also mitigated by default for x64 platforms running Windows 8 or later.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-83941\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/07\/fig-8-EoP-exploit-flow.png\" alt=\"\" width=\"600\" height=\"649\"\/><\/p>\n<p><em>Figure 8. EoP exploit flow<\/em><\/p>\n<p>Here\u2019s how the main exploit proceeds:<\/p>\n<ol>\n<li>The exploit calls <em>NtAllocateVirtualMemory<\/em> following <em>sgdt<\/em> instructions to allocate a fake data structure at the NULL page.<\/li>\n<li>It passes a malformed MEINFOEX structure to the <em>SetImeInfoEx<\/em> Win32k kernel function.<\/li>\n<li><em>SetImeInfoEx<\/em> picks up the fake data structure allocated at the NULL page.<\/li>\n<li>The exploit uses the fake data structure to copy malicious instructions to <em>+0x1a0<\/em> on the Global Descriptor Table (GDT).<\/li>\n<li>It calls an FWORD instruction to call into the fake GDT entry instructions.<\/li>\n<li>The exploit successfully calls instructions in the fake GDT entry.<\/li>\n<li>The instructions run shellcode allocated in user mode from kernel mode memory space.<\/li>\n<li>The exploit modifies the <em>EPROCESS.Token<\/em> of the shellcode process to grant SYSTEM privileges.<\/li>\n<\/ol>\n<p>On Windows 10, the <em>EPROCESS.Token<\/em> modification behavior would be surfaced by Windows Defender ATP.<\/p>\n<p>The malformed <em>IMEINFOEX<\/em> structure in combination with fake data at the NULL page triggers corruption of the GDT entry as shown below.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83944\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/07\/fig-9-corrupted-gdt-entry.png\" alt=\"\" width=\"622\" height=\"213\"\/><\/p>\n<p><em>Figure 9. Corrupted GDT entry<\/em><\/p>\n<p>The corrupted GDT has actual instructions that run through call gate through a call <em>FWORD<\/em> instruction.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83917\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/07\/fig-10-patched-gdt-entry-instructions.png\" alt=\"\" width=\"407\" height=\"129\"\/><\/p>\n<p><em>Figure 10. Patched GDT entry instructions<\/em><\/p>\n<p>After returning from these instructions, the extended instruction pointer (EIP) returns to the caller code in user space with kernel privileges. The succeeding code elevates privileges of the current process by modifying the process token to <em>SYSTEM<\/em>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-83920\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/07\/fig-11-process-token-pointer.png\" alt=\"\" width=\"750\" height=\"372\"\/><\/p>\n<p><em>Figure 11. Replacing process token pointer<\/em><\/p>\n<h2>Persistence<\/h2>\n<p>After privilege escalation, the exploit code drops the .vbs, a proof-of-concept malware, into the local <em>Startup<\/em> folder.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83923\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/07\/fig-12-code-that-drops-the-vbs-file-to-the-startup-folder.png\" alt=\"\" width=\"506\" height=\"409\"\/><\/p>\n<p><em>Figure 12. Code that drops the .vbs file to the Startup folder<\/em><\/p>\n<h2>Recommended defenses<\/h2>\n<p>To protect against attacks leveraging the exploits found in the PDF:<\/p>\n<p>While we have not seen attacks distributing the PDF, Office 365 Advanced Threat Protection (<a href=\"https:\/\/products.office.com\/en-us\/exchange\/online-email-threat-protection?ocid=cx-blog-mmpc\">Office 365 ATP<\/a>) would block emails that carry malformed PDF and other malicious attachments. Office 365 ATP uses a robust detonation platform, heuristics, and <a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/05\/10\/enhancing-office-365-advanced-threat-protection-with-detonation-based-heuristics-and-machine-learning\/\">machine learning<\/a> to inspect attachments and links for malicious content in real-time.<\/p>\n<p>Windows 10 users are not impacted by the dual exploits, thanks to platform hardening and exploit mitigations. For attacks against Windows 10, Windows Defender Advanced Threat Protection (<a href=\"https:\/\/www.microsoft.com\/en-us\/windowsforbusiness\/windows-atp?ocid=cx-blog-mmpc\">Windows Defender ATP<\/a>) would surface kernel attacks with similar exploitation techniques that use <a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2017\/01\/13\/hardening-windows-10-with-zero-day-exploit-mitigations\/\">process token modification to elevate privileges<\/a>, as shown below (sample process privilege escalation alert).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83926\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/07\/fig-13-token-modification-wdatp.png\" alt=\"\" width=\"882\" height=\"1011\"\/><\/p>\n<p><em>Figure 13. Sample Windows Defender ATP alert for process token modification<\/em><\/p>\n<p>With <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-defender-atp\/advanced-hunting-windows-defender-advanced-threat-protection\">Advanced hunting in Windows Defender ATP<\/a>, customers can hunt for related exploit activity using the following <a href=\"https:\/\/github.com\/Microsoft\/WindowsDefenderATP-Hunting-Queries\/blob\/master\/Exploits\/AcroRd-Exploits.txt\">query<\/a> we added to the <a href=\"https:\/\/github.com\/Microsoft\/WindowsDefenderATP-Hunting-Queries\">Github repository<\/a>:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83947\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/07\/fig-14-advanced-hunting-query.png\" alt=\"\" width=\"734\" height=\"182\"\/><\/p>\n<p><em>Figure 14. Advanced hunting query<\/em><\/p>\n<p>Windows Defender ATP provides complete endpoint protection platform (EPP) and endpoint detection response (EDR) solutions for Windows 10, Windows Server 2012, Windows Server 2012 R2, and Windows Server 2016. Additional support for devices running Windows 7 and Windows 8.1 is currently in <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-defender-atp\/preview-windows-defender-advanced-threat-protection\">preview<\/a>. Additionally, Windows Defender ATP can surface threats on <a href=\"https:\/\/blogs.windows.com\/business\/2017\/11\/08\/microsoft-partners-extend-windows-defender-atp-across-platforms\/\">macOS, Linux, and Android devices<\/a> via security partners.<\/p>\n<p>Windows Defender ATP integrates with other technologies in Windows, Office 365, and Enterprise Mobility + Security platforms to automatically update protection and detection and orchestrate remediation across Microsoft 365.<\/p>\n<p><strong>To experience the power of Windows Defender ATP for yourself, <a href=\"https:\/\/www.microsoft.com\/en-us\/windowsforbusiness\/windows-atp?ocid=cx-blog-mmpc\">sign up for a free trial now<\/a>.<\/strong><\/p>\n<h2>Indicators of compromise<\/h2>\n<p>SHA-256: dd4e4492fecb2f3fe2553e2bcedd44d17ba9bfbd6b8182369f615ae0bd520933<br \/>SHA-1: 297aef049b8c6255f4461affdcfc70e2177a71a9<br \/>File type: PE<br \/>Description: Win32k exploit<\/p>\n<p>SHA-256: 4b672deae5c1231ea20ea70b0bf091164ef0b939e2cf4d142d31916a169e8e01<br \/>SHA-1: 0d3f335ccca4575593054446f5f219eba6cd93fe<br \/>File type: PDF<br \/>Description: Test exploit<\/p>\n<p>SHA-256: 0608c0d26bdf38e064ab3a4c5c66ff94e4907ccaf98281a104fd99175cdf54a8<br \/>SHA-1: c82cfead292eeca601d3cf82c8c5340cb579d1c6<br \/>File type: PDF<br \/>Description: PDF exploit testing sample (Win32k part missing)<\/p>\n<p>SHA-256: d2b7065f7604039d70ec393b4c84751b48902fe33d021886a3a96805cede6475<br \/>SHA-1: edeb1de93dce5bb84752276074a57937d86f2cf7<br \/>File type: JavaScript<br \/>Description: JavaScript embedded in 0608c0d26bdf38e064ab3a4c5c66ff94e4907ccaf98281a104fd99175cdf54a8<\/p>\n<p><em><strong>Matt Oh<\/strong><\/em><br \/><em>Windows Defender ATP Research<\/em><\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/windowsforbusiness\/windows-atp?ocid=cx-blog-mmpc\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-83215\" src=\"https:\/\/cloudblogs.microsoft.com\/uploads\/prod\/2018\/04\/windows-defender-atp-8.png\" alt=\"\" width=\"820\" height=\"150\"\/><\/a><\/p>\n<hr\/>\n<h4><strong>Talk to us<\/strong><\/h4>\n<p>Questions, concerns, or insights on this story? Join discussions at the <a target=\"_blank\" href=\"https:\/\/answers.microsoft.com\/en-us\/protect\" rel=\"noopener\">Microsoft community<\/a> and <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/wdsi\" rel=\"noopener\">Windows Defender Security Intelligence<\/a>.<\/p>\n<p>Follow us on Twitter <a target=\"_blank\" href=\"https:\/\/twitter.com\/WDSecurity\" rel=\"noopener\">@WDSecurity<\/a> and Facebook <a target=\"_blank\" href=\"https:\/\/www.facebook.com\/MsftWDSI\/\" rel=\"noopener\">Windows Defender Security Intelligence<\/a>.<\/p>\n<p> READ MORE <a href=\"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/2018\/07\/02\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In late March 2018, I analyzed an interesting PDF sample found by ESET senior malware researcherAnton Cherepanov. The sample was initially reported to Microsoft as a potential exploit for an unknown Windows kernel vulnerability. During my investigation in parallel with ESET researchers, I was surprised to discover two new zero-day exploits in the same PDF. Read more READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":5098,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[1705,1706,1707,347,1708,234,1709,1064,1065,357,232,718,1710],"class_list":["post-5097","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-advanced-hunting","tag-cve-2018-4990","tag-cve-2018-8120","tag-cybersecurity","tag-elevation-of-privilege-eop","tag-exploit","tag-reflective-dll-loading","tag-security-intelligence","tag-security-response","tag-windows","tag-windows-10","tag-windows-defender-atp","tag-zero-day-exploit"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Taking apart a double zero-day sample discovered in joint hunt with ESET 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Taking apart a double zero-day sample discovered in joint hunt with ESET 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-02T15:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"532\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Taking apart a double zero-day sample discovered in joint hunt with ESET\",\"datePublished\":\"2018-07-02T15:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset\\\/\"},\"wordCount\":1397,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset.png\",\"keywords\":[\"Advanced hunting\",\"CVE-2018-4990\",\"CVE-2018-8120\",\"Cybersecurity\",\"elevation of privilege (EoP)\",\"Exploit\",\"Reflective DLL loading\",\"Security Intelligence\",\"Security Response\",\"Windows\",\"Windows 10\",\"Windows Defender ATP\",\"zero-day exploit\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset\\\/\",\"name\":\"Taking apart a double zero-day sample discovered in joint hunt with ESET 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset.png\",\"datePublished\":\"2018-07-02T15:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset.png\",\"width\":1000,\"height\":532},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Advanced hunting\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/advanced-hunting\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Taking apart a double zero-day sample discovered in joint hunt with ESET\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Taking apart a double zero-day sample discovered in joint hunt with ESET 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset\/","og_locale":"en_US","og_type":"article","og_title":"Taking apart a double zero-day sample discovered in joint hunt with ESET 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-07-02T15:00:00+00:00","og_image":[{"width":1000,"height":532,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Taking apart a double zero-day sample discovered in joint hunt with ESET","datePublished":"2018-07-02T15:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset\/"},"wordCount":1397,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset.png","keywords":["Advanced hunting","CVE-2018-4990","CVE-2018-8120","Cybersecurity","elevation of privilege (EoP)","Exploit","Reflective DLL loading","Security Intelligence","Security Response","Windows","Windows 10","Windows Defender ATP","zero-day exploit"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset\/","url":"https:\/\/www.threatshub.org\/blog\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset\/","name":"Taking apart a double zero-day sample discovered in joint hunt with ESET 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset.png","datePublished":"2018-07-02T15:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/07\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset.png","width":1000,"height":532},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/taking-apart-a-double-zero-day-sample-discovered-in-joint-hunt-with-eset\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Advanced hunting","item":"https:\/\/www.threatshub.org\/blog\/tag\/advanced-hunting\/"},{"@type":"ListItem","position":3,"name":"Taking apart a double zero-day sample discovered in joint hunt with ESET"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/5097","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=5097"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/5097\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/5098"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=5097"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=5097"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=5097"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}