Skip to content

Latest commit

 

History

History
37 lines (22 loc) · 1.23 KB

File metadata and controls

37 lines (22 loc) · 1.23 KB
description
Code execution with embedded HTML Form Objects

Phishing: Embedded HTML Forms

In this phishing lab I am just playing around with the POCs researched, coded and described by Yorick Koster in his blog post Click me if you can, Office social engineering with embedded objects

Execution

{% file src="../../../.gitbook/assets/Forms.HTML.ps1" %} Forms.ps1 {% endfile %}

{% file src="../../../.gitbook/assets/Forms.HTML.docx" %} Forms.docx {% endfile %}

Observations

These types of phishing documents can be identified by looking for the CLSID 5512D112-5CC6-11CF-8D67-00AA00BDCE1D in the embedded .bin files:

...as well as inside the activeX1.xml file:

As usual, MS Office applications spawning cmd.exe or powershell.exe should be investigated:

References

{% embed url="https://securify.nl/blog/SFY20180801/click-me-if-you-can_-office-social-engineering-with-embedded-objects.html" %}