diff --git a/README.md b/README.md index 71101eb..3e1bc59 100644 --- a/README.md +++ b/README.md @@ -84,6 +84,7 @@ including [Viper](http://viper.li/), [REMnux](https://remnux.org/), [pcodedmp](https://github.com/bontchev/pcodedmp), [dridex.malwareconfig.com](https://dridex.malwareconfig.com), [Snake](https://github.com/countercept/snake), +[DARKSURGEON](https://github.com/cryps1s/DARKSURGEON), and probably [VirusTotal](https://www.virustotal.com). (Please [contact me]((http://decalage.info/contact)) if you have or know a project using oletools) diff --git a/oletools/common/clsid.py b/oletools/common/clsid.py index b3c6cac..092c365 100644 --- a/oletools/common/clsid.py +++ b/oletools/common/clsid.py @@ -100,6 +100,7 @@ KNOWN_CLSIDS = { '14CE31DC-ABC2-484C-B061-CF3416AED8FF': 'Loads WUAEXT.DLL (Known Related to CVE-2015-6128)', '1D8A9B47-3A28-4CE2-8A4B-BD34E45BCEEB': 'UPnP.DescriptionDocument', '1EFB6596-857C-11D1-B16A-00C0F0283628': 'MSCOMCTL.TabStrip (may trigger CVE-2012-1856, CVE-2013-3906 - often used for heap spray)', + '233C1507-6A77-46A4-9443-F871F945D258': 'Shockwave Control Objects', '23CE100B-1390-49D6-BA00-F17D3AEE149C': 'UmOutlookAddin.UmEvmCtrl (potential exploit document CVE-2016-0042 / MS16-014)', '3018609E-CDBC-47E8-A255-809D46BAA319': 'SSCE DropTable Listener Object (can be used to bypass ASLR after triggering an exploit)', '3050F4D8-98B5-11CF-BB82-00AA00BDCE0B': 'HTML Application (may trigger CVE-2017-0199)', @@ -148,11 +149,13 @@ KNOWN_CLSIDS = { 'CDF1C8AA-2D25-43C7-8AFE-01F73A3C66DA': 'UmOutlookAddin.InspectorContext (potential exploit document CVE-2016-0042 / MS16-014)', 'CF4F55F4-8F87-4D47-80BB-5808164BB3F8': 'Microsoft Powerpoint.Show.12', 'D27CDB6E-AE6D-11CF-96B8-444553540000': 'Shockwave Flash Object (may trigger many CVEs)', + 'D27CDB70-AE6D-11CF-96B8-444553540000': 'Shockwave Flash Object (may trigger many CVEs)', 'D50FED35-0A08-4B17-B3E0-A8DD0EDE375D': 'UmOutlookAddin.PlayOnPhoneDlg (potential exploit document CVE-2016-0042 / MS16-014)', 'D7053240-CE69-11CD-A777-00DD01143C57': 'Microsoft Forms 2.0 CommandButton', 'D70E31AD-2614-49F2-B0FC-ACA781D81F3E': 'AutoCAD 2010-2012 Document', 'D93CE8B5-3BF8-462C-A03F-DED2730078BA': 'Loads WUAEXT.DLL (Known Related to CVE-2015-6128)', 'DD9DA666-8594-11D1-B16A-00C0F0283628': 'MSCOMCTL.ImageComboCtrl (may trigger CVE-2014-1761)', + 'DFEAF541-F3E1-4c24-ACAC-99C30715084A': 'Silverlight Objects', 'E5CA59F5-57C4-4DD8-9BD6-1DEEEDD27AF4': 'InkEd.InkEdit', 'E8CC4CBE-FDFF-11D0-B865-00A0C9081C1D': 'MSDAORA.1 (potential exploit CVE TODO)', # TODO 'E8CC4CBF-FDFF-11D0-B865-00A0C9081C1D': 'Loads OCI.DLL (Known Related to CVE-2015-6128)',