Attachment: Archive containing HTML file with file scheme link

Attached archive contains an HTLM file with a file:// link, likely pointing to an SMB server. This technique can be used to steal NTLM hashes of users who open the HTML file. Known technique of TA577.

Sublime rule (View on GitHub)

 1name: "Attachment: Archive containing HTML file with file scheme link"
 2description: "Attached archive contains an HTLM file with a file:// link, likely pointing to an SMB server. This technique can be used to steal NTLM hashes of users who open the HTML file. Known technique of TA577."
 3references:
 4  - "https://www.bleepingcomputer.com/news/security/hackers-steal-windows-ntlm-authentication-hashes-in-phishing-attacks/"
 5type: "rule"
 6severity: "high"
 7source: |
 8  type.inbound
 9  and any(attachments,
10          .file_extension in $file_extensions_common_archives
11          and any(file.explode(.),
12                  (
13                    .file_extension in~ ("html", "htm", "shtml", "dhtml")
14                    or .flavors.mime == "text/html"
15                    or any(.flavors.yara, . == "html_file")
16                  )
17                  and any(.scan.url.urls, .scheme == "file")
18          )
19  )
20  and (
21    not profile.by_sender().solicited
22    or (
23      profile.by_sender().any_messages_malicious_or_spam
24      and not profile.by_sender().any_false_positives
25    )
26  )  
27
28attack_types:
29  - "Credential Phishing"
30tactics_and_techniques:
31  - "Evasion"
32  - "Exploit"
33  - "HTML smuggling"
34  - "Social engineering"
35detection_methods:
36  - "Archive analysis"
37  - "File analysis"
38  - "HTML analysis"
39id: "edf6d0d9-7d8e-5787-8467-7ca8b61a1b4c"
to-top