<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Malicious-File — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/malicious-file/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 17:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/malicious-file/feed.xml" rel="self" type="application/rss+xml"/><item><title>Network Connection via Compiled HTML File</title><link>https://feed.craftedsignal.io/briefs/2024-01-hh-exe-network-connection/</link><pubDate>Wed, 03 Jan 2024 17:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-hh-exe-network-connection/</guid><description>This rule detects network connections initiated by hh.exe, the HTML Help executable, which may indicate the execution of malicious code embedded in compiled HTML files (.chm) to deliver malicious payloads, bypass security controls, and gain initial access via social engineering.</description><content:encoded><![CDATA[<p>Adversaries may conceal malicious code in a compiled HTML file (.chm) and deliver it to a victim for execution. CHM content is loaded by the HTML Help executable program (hh.exe). Attackers can use CHM files to proxy the execution of malicious payloads via a signed binary to bypass security controls, and also to gain initial access to environments via social engineering methods. This rule identifies network connections done by hh.exe, which can potentially indicate abuse to download malicious files or tooling, or masquerading. The detection logic focuses on network connections originating from hh.exe to external IPs, excluding private or reserved IP ranges.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The user receives a compiled HTML file (.chm), often through social engineering tactics such as phishing.</li>
<li>The user opens the .chm file, which is then executed by the HTML Help executable (hh.exe).</li>
<li>The hh.exe process loads and renders the HTML content within the .chm file.</li>
<li>Embedded within the HTML content is malicious JavaScript or other scripting code.</li>
<li>The malicious script executes, initiating a network connection via hh.exe to an external server.</li>
<li>The external server hosts a malicious payload, such as a reverse shell or an executable file.</li>
<li>Hh.exe downloads the malicious payload to the victim&rsquo;s machine.</li>
<li>The downloaded payload is executed, granting the attacker initial access or performing other malicious actions like data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to initial access to a victim&rsquo;s system, potentially bypassing security controls through a signed Microsoft binary. This can result in the download and execution of arbitrary payloads, leading to data exfiltration, lateral movement within the network, or installation of malware. The exploitation can spread rapidly through social engineering, affecting multiple users within an organization. While the severity is rated as medium, the potential for escalation to a critical compromise is high if the attacker gains a foothold in the environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process and network monitoring on Windows endpoints, focusing on hh.exe activity (Data Source: Elastic Defend, Sysmon, SentinelOne).</li>
<li>Deploy the Sigma rule <code>Network Connection via Compiled HTML File</code> to your SIEM and tune for your environment to detect suspicious network connections initiated by hh.exe.</li>
<li>Monitor for hh.exe spawning child processes, which could indicate the execution of downloaded payloads. Create a Sigma rule to detect such events.</li>
<li>Implement network segmentation to limit the impact of a compromised host and restrict lateral movement.</li>
<li>Conduct regular security awareness training to educate users about the risks of opening unsolicited .chm files.</li>
<li>Inspect the digital signatures of hh.exe and other system binaries to ensure their integrity and authenticity.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>execution</category><category>defense-evasion</category><category>command-and-control</category><category>malicious-file</category><category>html-help</category></item></channel></rss>