New Four Step Attack Installs a Keylogger

We have talked about new Office document exploits that don’t require macros to run.  Here is a new one with more twists and turns than a mountain road.  Trustwave has reported instances of a new attack that starts as a spam or phishing email with a Word document (.DOCX) attachment.  Open the Word document and it will call out for another document download, this one in Rich Text Format (RTF) that takes advantage of known vulnerability CVE-2017-11882.  This document downloads an HTML document (HTA), that spawns Powershell with a Visual Basic script (VBS), which finally downloads a keylogger in PHP.  If all this has your head spinning, it is having a similar effect on the anti-malware software we rely on to protect us from these sorts of attacks.  Here’s the path again in a simple flowchart.

EML >> DOCX >> RTF >> HTA >> PS >> VBS >> PHP

Typical email subject lines include:

  • TNT STATEMENT OF ACCOUNT – {random numbers}……………
  • Request for Quotation (RFQ) – <{random numbers}>
  • Telex Transfer Notification

I removed a bit of malware from a client system recently, and it had spawned a browser page that looked a lot like and Adobe Flash Player update.  See the following image.  Notice the attempted download of the HTA file, and the obviously wrong web address in the browser address bar.

You will need to be on the lookout for pages like this one.  Running the HTA file would have installed the keylogger.  A keylogger is a malware program that captures your keystrokes as you type, and is used for collecting user names, passwords, credit card number, social security numbers, and other personal information.

I encourage you to check out the Trustwave article for more examples and images.

More information:


About the Author:

Cybersecurity analyst, pen-tester, trainer, and speaker. Serving small business owners in the St Paul, Minneapolis, and western Wisconsin area since 2001. Cybersecurity and hacking have been a passion of mine since I entered the computer and networking business in 2000. I hold several cybersecurity certifications including Certified Information Systems Security Professional (CISSP), Certified Advanced Security Pratitioner (CASP), and Certified Ethical Hacker (CEH). Other computer industry certifications include A+, Network+ and Microsoft Certified System Engineer (MCSE). As Cybersecurity Analyst at The WyzCo Group, I help our clients experience high levels of security on their computers, networks, and websites. In addition to consulting on security products and services, we also conduct security audits, vulnerability assessments and full penetration tests. We also work with companies and organizations that need to certify compliance with regulations such as PCI-DSS (credit card processing), HIPAA/HITECH (medical records), and GLBA. We also provide Cybersecurity Awareness Training for clients and their employees. I am a frequent speakers at cybersecurity conferences such as the Minnesota Bloggers Conference, Secure360 Security Conference, the (ISC)2 World Congress, and the ISSA International Conference, and many local community organizations, Chambers of Commerce, SCORE, and several school districts. I have been blogging on cybersecurity since 2008.

Add a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.