当前位置:网站首页>Phishing & filename inversion & Office remote template

Phishing & filename inversion & Office remote template

2022-07-06 06:32:00 zxl2605

This article involves procedures / Technical principles can be offensive , Only for safety research and teaching , Be sure to experiment in a simulated environment , Do not use it for other purposes .
The consequences caused thereby shall be borne by oneself , In case of violation of national laws, it shall bear all legal responsibilities by itself , It has nothing to do with the author and the sharer

0x01 Piece name reversal

In the process of infiltration , Sometimes you need to spread some Trojan files by fishing , These Trojan files need careful camouflage .RLO namely Start Of Right-to-Left override. We can insert Unicode Control characters RLO To achieve the effect of reversing file names
d421c5b12c4bdc1193d98d6269fe6b63.png

With CobaltStrike Generated Trojan BypassAV.exe For example
1、 Generating Trojan files
eb389b78e97d34bfb6b665d181c75503.png
2e133d739edbd5c0e7794a7069dac7b9.png
679c23c938c0cf29bf80266912d750f7.png
2、 Join us and we want this trojan horse to be disguised as zip The file of
because RLO It's from right to left , We edit the file and choose Rename , stay .exe Front input piz
64e99ba9252b24334595f2ad921f51af.png
3、 stay BypassAV after piz Right click the front position to select Unicode Control characters , And then choose RLO
779126bddec485e490915192ca47dbd4.png
4、 Check the file properties. The file suffix has become zip
19c9f0ff7cb1147f6480d06f50f943bc.png

0x02 Self decompression release execution

Self extracting is a way to bundle files , utilize WinRAR Compress the normal file with the Trojan , And create a self extracting exe file , After the decompression process, you can automatically run the released file

Operation steps
1、 We put the generated Trojan horse in the same level directory with the files that need to be compressed ( You can also use different levels of directories ), Name the Trojan file envchk.exe
d6522d12a04d975a5ab31da52767ab0d.png
2、 Right click all to select the file to be compressed , And then click " Add to compressed file "
9d7781f2e0e5b99f92801f44531b46ab.png
3、 Choose to create a compressed file in self extracting format
9c3837fc20c6e4474b80b06f3816301a.png
4、 Select the self extracting option in the advanced options
aacad76ec467093566df44bc124b242e.png
5、 Configure the decompression path , The release path of the program after level 1 runs
Here we configure C:\PragramData Catalog
f8e4b3c8f72c8562cbe2b94891602eed.png
6、 In the Settings tab, set the program to be run after the program is decompressed
The path here is filled in the absolute path or relative path after file decompression
1fe306c51c9eb3257dabbfa56fd3523c.png
7、 Quiet mode in mode is configured to hide all
43ec378525f0622df58cd63b5d7b734f.png
8、 Configure shortcuts
At advanced level > Add shortcuts to shortcuts
89b809aee1c3fa4cc3f58b4bc415f9e4.png
9、 Click Finish to generate the self extracting package
183e6f6f58a6ee5cc6b7437cf2775cbc.png
10、 Run the generated self decompression to find that the software can be opened normally ,CS You can also go online normally
40a115246d0bff6fd97e847011693b1a.png
see Programdata Catalog , You can see that the file was released successfully
cbf6e94e969063928ebd1bb3cb9217fc.png

0x3 Office Load remote template

Remote macro template technology , It is based on the principle that documents created with templates will load templates at startup , Replace its loaded normal template with a malicious template with a macro virus , Two documents are mainly involved :

1、docx: Documents created using templates normally

2、dotm: Compared with sending macro documents directly, malicious macro template files with macro viruses , Sent in this way docx The document will be more hidden , It will not be detected by the killing software , Because the document itself does not contain macros .

office Load templates remotely
1、 First create a macro template file
7af70e0ef39e0fd8daa45b279adbc37d.png
2、 Select the macro location as the current document , Then create a macro
dcee4dace7f0861e632bb2e834f31398.png
3、 Write and save the macro code as dotm file
bbf9540cbbcb9bb95da305f7e2613990.png
4、 Upload the macro template file to the Internet
cd199ac490e28a283ee7373738f468c4.png
5、 Use the template to create a docx file
0794247224a41f1de4f7161153ecdec7.png
6、 After saving the document , Change the suffix to zip Format , And will word_res\settings.xml.res Extract the file
add266d2fd51ee6603886836ff3e46fe.png
7、 modify settings.xml.res Medium tartget Field , Replace it with the macro virus template file on the Internet , And compress the file into a document
4a3d16e6c9974118f6068a9fb61464eb.png
8、 Open the modified document , I saw that the template with macro virus was downloaded from the Internet when the document was opened
8a1161e5f6d94ef395c129da4377f932.png
9、 Then click enable macro , Find out CS Online
5a6f6a54af76103c818ecc29f832c04a.png
4cb9e659e3a744a4815cfc13209bd6ce.png

原网站

版权声明
本文为[zxl2605]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/187/202207060624381721.html