From 72f62e65e077ac9d793dca8387cf584f5da5e55c Mon Sep 17 00:00:00 2001
From: StrangerealIntel <54320855+StrangerealIntel@users.noreply.github.com>
Date: Mon, 9 Sep 2019 15:40:06 +0200
Subject: [PATCH] Update Malware analysis 27-08-19.md
---
Indian/APT/Patchwork/27-08-19/Malware analysis 27-08-19.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/Indian/APT/Patchwork/27-08-19/Malware analysis 27-08-19.md b/Indian/APT/Patchwork/27-08-19/Malware analysis 27-08-19.md
index c3f53fa..738a19b 100644
--- a/Indian/APT/Patchwork/27-08-19/Malware analysis 27-08-19.md
+++ b/Indian/APT/Patchwork/27-08-19/Malware analysis 27-08-19.md
@@ -12,7 +12,7 @@
## Malware analysis
### Initial vector
-###### The initial vector is an INP file (format used for the software InPage) with the exploit cve-2017-12824, we can see here the 0x7E and 0x72 represent a class of type in the stream for use, an ole stream for launch the first binary file.
+###### The initial vector is an INP file (format used for the software InPage) with the exploit CVE-2017-12824, we can see here the 0x7E and 0x72 represent a class of type in the stream for use, an ole stream for launch the first binary file.
![alt text](https://raw.githubusercontent.com/StrangerealIntel/CyberThreatIntel/master/Indian/APT/Patchwork/27-08-19/Images/Exploit.png "")
###### We can see on the strings on the dll, what extract the file in the temp folder and create a thread for the second PE file.
![alt text](https://raw.githubusercontent.com/StrangerealIntel/CyberThreatIntel/master/Indian/APT/Patchwork/27-08-19/Images/bin1-String.PNG "")