The below paper documents the process of creating a multi-stage IPS/AV transparent malicious document for purposes of Red Teaming / Penetration-Testing assignments.
The resulted document will be:
- using OLE event autorun method
- removing it's pretext shapes
- Obtaining commands to be executed from document's Author property and passing them to
StdIn
of Powershell.exe process - Leveraging
certutil
technique to receive Base64 encoded malicious HTA document - Having Base64 encoded Powershell command in that Author property