12.07.2015 Views

sR6uWE

sR6uWE

sR6uWE

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

INTERNALS: INITIALIZATIONMSO.sub_00AD0245()Job Object RestrictionsUnkObj.fAlternateWinStation==1Creates unique sandbox name, lpSandboxName:• lpSandboxName = "OICE_15_974FA576_32C1D314_“Creates sandbox job object, hSandboxJob, with lpSandboxNameSets hSandboxJob with JobObjectBasicUIRestrictions restrictions(UnkObj.fAlternateWinStation==0 && UnkObj.Offset_2A==0)JOBOBJECT_BASIC_UI_RESTRICTIONS.UIRestrictionsClass=0xE8DefaultJOBOBJECT_BASIC_UI_RESTRICTIONS.UIRestrictionsClas=0xFFJOBOBJECT_BASIC_UI_RESTRICTIONS.UIRestrictionsClass=0x00Sets hSandboxJob with JobObjectExtendedLimitInformation restrictions:• JOBOBJECT_BASIC_LIMIT_INFORMATION.ActiveProcessLimit = 1• JOBOBJECT_BASIC_LIMIT_INFORMATION.LimitFlags = 0x2408LowIntegrity-modeActions according to sandbox modeAppContainer-modeSandbox-SID = “S-1-5-21-1734954099-297494”Access Token RestrictionsCreates sandbox token, hSandboxToken, with restricted rights:• Disable these SIDs from TokenGroups:• Domain-Users, Administrators, Console Logon, This Organization,NTLM Authentication, Medium Mandatory Level• Restricting these SIDs from TokenGroups:• Restricted Code, Everyone, Users, Logon Session, Sandbox-SIDSandbox-SID = DeriveAppContainerSidFromAppContainerName() with lpSandboxNameOrange: Differences between Low-Integrity mode and AppContainer mode• If HKLM\Software\Microsoft\Office\15.0\Common\Security\UserAppContainer == 1• If GetProcAddress() for Userrenv.DeriveAppContainerSidFromAppContainerName()and Userrenv.GetAppContainerFolderPath() succeedsGreen: Differences due to application settingsLabs.mwrinfosecurity.com | © MWR Labs 15

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!