Microsoft Office Zero-Day CVE-2023-36884 Exploited in the Wild | Threat Intelligence | CloudSEK
Tags
attack-pattern: | Data Exploits - T1587.004 Exploits - T1588.005 Malicious File - T1204.002 Malware - T1587.001 Malware - T1588.001 Software - T1592.002 |
Common Information
Type | Value |
---|---|
UUID | 59adfb83-8b5b-4a24-89b7-3b5fc251ce04 |
Fingerprint | 256b6b25eb222fc7 |
Analysis status | DONE |
Considered CTI value | 1 |
Text language | |
Published | July 25, 2023, midnight |
Added to db | Nov. 19, 2023, 5:58 a.m. |
Last updated | Nov. 17, 2024, 6:54 p.m. |
Headline | Microsoft Office Zero-Day CVE-2023-36884 Exploited in the Wild |
Title | Microsoft Office Zero-Day CVE-2023-36884 Exploited in the Wild | Threat Intelligence | CloudSEK |
Detected Hints/Tags/Attributes | 29/1/13 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 89 | ✔ | CloudSEK Threat Intelligence | https://cloudsek.com/threatintelligence/rss.xml | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 119 | cve-2023-36884 |
|
Details | File | 3 | payload.url |
|
Details | File | 199 | excel.exe |
|
Details | File | 18 | graph.exe |
|
Details | File | 91 | msaccess.exe |
|
Details | File | 102 | mspub.exe |
|
Details | File | 14 | powerpoint.exe |
|
Details | File | 86 | visio.exe |
|
Details | File | 15 | winproj.exe |
|
Details | File | 323 | winword.exe |
|
Details | File | 90 | wordpad.exe |
|
Details | Microsoft Threat Actor Naming Taxonomy (Groups in development) | 79 | Storm-0978 |
|
Details | Windows Registry Key | 11 | HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet |