Reviving Internet Explorer: Threat Actors Exploit Zero-Day Vulnerabilities in Shortcut Files to Target Victims (CVE-2024-38112)

Check Point Research uncovered attackers using Windows .url shortcut files to lure victims into remote code execution via Internet Explorer. The attackers disguise an HTA payload as a PDF using the mhtml trick and hidden extensions, leading to patches for CVE-2024-38112. #CVE-2024-38112 #Mshta

Keypoints

  • Threat actors are using .url files to exploit Windows users for remote code execution.
  • The attacks leverage the retired Internet Explorer browser to bypass modern security measures.
  • Attackers utilize the β€œmhtml” trick to disguise malicious URLs.
  • Victims are misled into thinking they are opening PDF files, while they are actually executing .hta files.
  • Check Point has released protections against these attacks and reported findings to Microsoft, leading to patches.
  • Users are advised to be cautious with .url files from untrusted sources.

MITRE Techniques

  • [T1203] Exploitation for Client Execution – Exploitation of vulnerabilities in applications to execute malicious code. β€˜Exploitation of vulnerabilities in applications to execute malicious code.’
  • [T1204] User Execution – Users are tricked into executing malicious files, such as .hta files disguised as PDFs. β€˜Users are tricked into executing malicious files, such as .hta files disguised as PDFs.’
  • [T1218.005] Mshta – Mshta is used to execute HTA content downloaded via the URL. β€˜the opened file is actually a malicious .hta file being downloaded and executed.’
  • [T1036] Masquerading – Hiding malicious file extensions to evade detection. β€˜Hiding malicious file extensions to evade detection.’

Indicators of Compromise

  • [Domain] – cbmelipilla.cl
  • [URL] – http://cbmelipilla.cl/te/test1.html, https://cbmelipilla.cl/te/Books_A0UJKO.pdf%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80%E2%A0%80…hta
  • [Hash] – bd710ee53ef3ad872f3f0678117050608a8e073c87045a06a86fb4a7f0e4eff0
  • [Hash] – c9f58d96ec809a75679ec3c7a61eaaf3adbbeb6613d667257517bdc41ecca9ae

Read more: https://www.hendryadrian.com/reviving-internet-explorer-threat-actors-exploit-zero-day-vulnerabilities-in-shortcut-files-to-target-victims-cve-2024-38112/