<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Xsl-Script — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/xsl-script/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 26 Jan 2024 18:22:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/xsl-script/feed.xml" rel="self" type="application/rss+xml"/><item><title>XSL Script Execution via COM Interface in Microsoft Office</title><link>https://feed.craftedsignal.io/briefs/2024-01-xsl-script-execution-via-com/</link><pubDate>Fri, 26 Jan 2024 18:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-xsl-script-execution-via-com/</guid><description>Adversaries may exploit Microsoft Office applications to execute malicious JScript or VBScript by leveraging the Microsoft.XMLDOM COM interface to process and transform XML documents using XSL scripts, potentially leading to initial access or defense evasion.</description><content:encoded><![CDATA[<p>Attackers are increasingly leveraging the Microsoft.XMLDOM COM interface in Microsoft Office applications to execute malicious scripts. This technique involves embedding malicious JScript or VBScript within XSL transformations, which are then processed by Office applications like Word, Excel, PowerPoint, and Publisher. The exploitation begins when a user opens a specially crafted document. This campaign abuses legitimate functionalities for malicious purposes. This technique can be used for initial access, defense evasion, and execution of arbitrary code. The observed behavior includes the loading of <code>msxml3.dll</code> and the spawning of child processes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user receives a phishing email containing a malicious Office document.</li>
<li>The user opens the document in Microsoft Word (winword.exe), Excel (excel.exe), PowerPoint (powerpnt.exe), or Publisher (mspub.exe).</li>
<li>The Office application loads <code>msxml3.dll</code> to process XML content within the document.</li>
<li>The document contains an embedded XSL script with malicious JScript or VBScript code.</li>
<li>The XSL transformation is initiated, executing the embedded script via the COM interface.</li>
<li>The script spawns a new process (cmd.exe, powershell.exe, or mshta.exe) to execute arbitrary commands.</li>
<li>The spawned process downloads and executes a payload from a remote server.</li>
<li>The payload establishes persistence, escalates privileges, and performs malicious activities such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, potentially compromising sensitive data and allowing attackers to gain initial access to the targeted system. This can result in data breaches, financial losses, and reputational damage. The scope of impact includes any Windows systems running vulnerable versions of Microsoft Office. If successful, the attacker can achieve persistence, perform lateral movement and compromise other systems on the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;XSL Script Execution via COM&rdquo; to your SIEM to detect the execution of hosted XSL scripts using the Microsoft.XMLDOM COM interface.</li>
<li>Monitor for the loading of <code>msxml3.dll</code> by Microsoft Office applications and subsequent process creations to identify potential exploitation attempts.</li>
<li>Implement application whitelisting to restrict the execution of unauthorized scripts and executables, particularly those not located in standard directories.</li>
<li>Block the execution of unusual or unsigned child processes spawned by Microsoft Office applications to prevent malicious script execution.</li>
<li>Educate users about the risks of opening suspicious attachments or clicking on links in phishing emails (T1566).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>xsl-script</category><category>com-interface</category><category>office-macro</category></item></channel></rss>