X
Tech

A (Microsoft) Codename a day: Wringer

The Microsoft MOICE project isn't new, but the codename and its origins were new to me. MOICE is designed to "wring out" malicious content from Office documents.
Written by Mary Jo Foley, Senior Contributing Editor

As I announced last week, I'm holding a short but sweet Microsoft codename contest this week, with the prize being a free signed copy of my Microsoft 2.0 book (which I will ship anywhere in the world to the winner).

Since I announced the rules and regulations, I've gotten more than a few interesting submissions. I was seeking from readers new (but real and existing) Microsoft codenames which I've had yet to detail as part of my growing Microsoft Codename list. I am running some of the best ones (as judged by yours truly) on my blog this week.

Without further ado, let's get to it.

Codename of the day: Wringer

Best guess on what it is: MOICE - the Microsoft Office Isolated Conversion Environment

Meaning/context of the codename: The MOICE project isn't new, but the codename and its origins were new to me. MOICE is designed to "wring out" malicious content from Office documents.

Hold onto your hats for the full explanation from Software Security Engineer Robert Hensing's blog:

"(B)asically what MOICE does is it hijacks the file associations in the registry and redirects them to a process called 'MOICE.EXE'.  This process basically spawns the Office 2007 file format converter to up-convert the double-clicked Office 2003 document to the new Open XML file format.  Oh and the converter runs in its own desktop with a super-locked down token (Dave is the freaking man!).  Why run the converter in its own desktop with a super restricted token?  Simple - what if the act of converting the file leads to an exploitable bug and / or code execution.  This is effectively dropping the rights of the logged on user to *below* standard user levels in order to do the file conversion.  Anyhoo - after the file is up-converted to the new Office 2007 file format - the theory is that the vulnerability will have been 'wrung' out (indeed the code name for this project was 'Wringer')."

Back story: Office remains a big hacker target -- something of which Microsoft is quite aware. As Hensing blogged:

"(I)t's no secret that Office was used in some targetted attacks last year . . . some attacks involving 0-day vulnerabilities for which our customers had no way of protecting themselves (short of not opening documents). Had MOICE been available these customers could have deployed it to mitigate these attacks."

Additional info: The National Security Agency published a fact sheet on Wringer, as well as a Wringer deployment guide.

Got a Microsoft code name you’ve been wondering about? Send it my way. All submitters will be kept confidential.Meanwhile, if you want to keep track of the full month’s worth of Microsoft code names I end up posting, bookmark this “Microsoft Codenames” page.

"(B)asically what MOICE does is it hijacks the file associations in the registry and redirects them to a process called 'MOICE.EXE'.  This process basically spawns the Office 2007 file format converter to up-convert the double-clicked Office 2003 document to the new Open XML file format.  Oh and the converter runs in its own desktop with a super-locked down token (Dave is the freaking man!).  Why run the converter in its own desktop with a super restricted token?  Simple - what if the act of converting the file leads to an exploitable bug and / or code execution.  This is effectively dropping the rights of the logged on user to *below* standard user levels in order to do the file conversion.  Anyhoo - after the file is up-converted to the new Office 2007 file format - the theory is that the vulnerability will have been 'wrung' out (indeed the code name for this project was 'Wringer')."

Back story: Office remains a big hacker target -- something of which Microsoft is quite aware. As Hensing blogged:

"(I)t's no secret that Office was used in some targetted attacks last year . . . some attacks involving 0-day vulnerabilities for which our customers had no way of protecting themselves (short of not opening documents). Had MOICE been available these customers could have deployed it to mitigate these attacks."

Additional info: The National Security Agency published a fact sheet on Wringer, as well as a Wringer deployment guide.

Got a Microsoft code name you’ve been wondering about? Send it my way. All submitters will be kept confidential.

Editorial standards