<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Microsoft HTML Help System — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/microsoft-html-help-system/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 18:30:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/microsoft-html-help-system/feed.xml" rel="self" type="application/rss+xml"/><item><title>Process Activity via Compiled HTML File Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-compiled-html-execution/</link><pubDate>Wed, 03 Jan 2024 18:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-compiled-html-execution/</guid><description>Adversaries may conceal malicious code in compiled HTML files (.chm) and deliver them to a victim for execution, using the HTML Help executable (hh.exe) to proxy the execution of scripting interpreters and bypass security controls.</description><content:encoded><![CDATA[<p>Attackers are known to deliver malicious payloads within compiled HTML files (.chm) to bypass security measures and gain initial access to systems. This technique leverages the Microsoft HTML Help system and its associated executable, hh.exe, to proxy the execution of malicious code. Compiled HTML files can contain various types of content, including HTML documents, images, and scripting languages like VBA, JScript, Java, and ActiveX. By embedding malicious scripts or executables within a .chm file, attackers can trick users into executing them when they open the file. This is particularly effective because hh.exe is a signed binary, which may allow it to bypass certain security controls. The scope of this technique affects Windows systems where the HTML Help system is installed.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious .chm file containing embedded malicious code, such as a PowerShell script or executable.</li>
<li>The attacker delivers the .chm file to the victim via social engineering, such as phishing or malicious websites.</li>
<li>The victim opens the .chm file, causing hh.exe to launch.</li>
<li>hh.exe processes the .chm file, rendering its content, which includes the embedded malicious script or executable.</li>
<li>The malicious code executes, often spawning a scripting interpreter like <code>powershell.exe</code> or <code>cmd.exe</code>.</li>
<li>The scripting interpreter executes commands to download additional payloads or perform malicious actions on the system.</li>
<li>The attacker gains initial access to the victim&rsquo;s system.</li>
<li>The attacker escalates privileges and moves laterally within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to initial access, code execution, and potentially full system compromise. This can result in data theft, malware installation, and further lateral movement within the network. The severity and impact depend on the permissions of the user running hh.exe and the nature of the malicious payload.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Compiled HTML File Spawning Suspicious Processes&rdquo; to your SIEM to detect instances where <code>hh.exe</code> is the parent process of scripting interpreters.</li>
<li>Enable Sysmon process creation logging to provide the necessary data for the Sigma rule to function correctly.</li>
<li>Monitor process execution chains for unknown processes originating from <code>hh.exe</code>, as mentioned in the investigation guide.</li>
<li>Implement email filtering and security awareness training to prevent users from opening malicious .chm files delivered via phishing.</li>
<li>Block the execution of unsigned or untrusted executables in the environment to reduce the risk of malicious code execution.</li>
<li>Use endpoint detection and response (EDR) solutions like Elastic Defend, CrowdStrike, Microsoft Defender XDR, and SentinelOne to detect and respond to malicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>execution</category><category>defense-evasion</category><category>compiled-html</category><category>windows</category><category>proxy-execution</category></item></channel></rss>