New Steganography-Based Attack Exploits MS Office Flaw to Deliver AsyncRAT

A sophisticated attack campaign has been observed leveraging steganography to conceal malicious payloads within benign-looking image files, exploiting a known Microsoft Office vulnerability (CVE-2017-0199) to deliver the AsyncRAT remote access trojan.

This technique highlights the innovative means attackers employ to evade detection and achieve covert code execution.

Attack Flow and Exploitation Mechanics

The infection chain begins with a phishing email delivering a malicious MS Office document crafted to exploit CVE-2017-0199, a remote code execution vulnerability.

Upon opening the document, the vulnerability is triggered, leading to the execution of a remote script typically an HTA file without further user interaction.

AsyncRAT
Stego-Campaign flow

According to the Report, this script downloads a trojanized copy of the legitimate Prnport.vbs script, which is a Windows utility for managing printer ports.

Malicious code is inserted at the start of the Prnport.vbs, causing it to assemble and execute a multi-stage PowerShell command chain.

The script fragments obfuscate the command structure, hindering analysis and static detection.

Through this PowerShell execution, an image file containing an embedded, base64-encoded injector DLL is downloaded from an attacker-controlled server.

The downloaded image file appears innocuous, but contains base64-encoded data marked by custom delimiters (e.g., <<BASE64_START>>).

Manual inspection reveals that this section decodes to a Windows DLL, originally named Microsoft.Win32.TaskScheduler.

Attackers use PowerShell to extract, decode, and load this DLL in-memory via reflection, avoiding the need for disk writes and making detection more challenging.

The DLL acts as an injector, dynamically invoking a method named VAI to retrieve the final AsyncRAT payload.

Notably, the payload URL is obfuscated and reversed in transit; after download, the data must be reversed again and decoded from base64 within memory.

Process Hollowing and AsyncRAT Deployment

The final step involves process hollowing (MITRE ATT&CK T1055.012), whereby the injector spawns a legitimate MSBuild.exe process in a suspended state, hollows its memory, and injects the decoded AsyncRAT payload.

AsyncRAT
The process hollowing flow used in this attack

The process is then resumed, running the RAT under the guise of a trusted Windows executable. This fileless execution pathway further complicates detection and forensic analysis.

AsyncRAT, a publicly available remote access trojan, grants attackers full remote control, including keystroke logging and command execution.

It also possesses loader capabilities for further malware deployment, increasing the risk of multi-stage intrusions or ransomware attacks.

Defenders are urged to monitor for exploitation of legacy Office vulnerabilities, anomalous process creation involving scripting engines (HTA, VBS, PowerShell), unauthorized downloads from suspicious domains, and the spawning of MSBuild.exe outside typical development workflows.

Indicators of Compromise (IOC)

TypeValue
Trojanized Prnport.vbs (SHA256)1105ae14ccb41fedcf556e4c575e34e505e9a571f2021ba89a75fbe5fa12e3c0
AsyncRAT Delivery URLhxxps[://]watchonlinehotvideos[.]site/001[.]txt
AsyncRAT (Reversed & Base64) (SHA256)1B566924D6A602DCAC610B3BC1B40BCC1164EE10EF2E0DB6BB1D7162C4FBF9BA
AsyncRAT Binary (SHA256)448ae5b8890c17a2efe49856531efd62796db52d2ff0ecbb4678334aea2bf776
AsyncRAT C2 Address148[.]113[.]214[.]176
Injector Delivery URLhxxps[://]1019[.]filemail[.]com/api/file/get?filekey=ZrKTNo-_DMWgm0oonSr97JAkdrUqbICVeG2LmuclzuON2ZavKqsQg0NqChSLT4A&pk_vid=342803d1cc4e3b801741606974b78eb1
Injector (Namespace/File Name)Microsoft.Win32.TaskScheduler
Injector Hidden in Image (SHA256)0FF5DD1787ACC886A586282858112C6F73B48C31093080D2D8A6E66F018CE8C7
Injector Binary (SHA256)8CC93827CA7652AFC8E08B9266F6567D06B932AF26B601EB7FDE10F5E5A6CB30
Injected Process PathC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here