Using RTF Files as a Delivery Vector for Malware

  • 9 December 2015
  • 1 reply
  • 158 views

Userlevel 7
Badge +54
December 9, 2015 By Sean Wilson
 
During malware analysis we often see attackers using features in creative ways to deliver and obfuscate malware. We’ve recently seen an increase with samples leveraging RTF temp files as a delivery method to encapsulate and drop malware.
The attack uses the following process to drop and execute the payload on a system.
 
                              http://phishme.com/wp-content/uploads/Figure-119.png
 Figure 1 – Malware Delivery
 
  1. The User opens the Office document and enables macros.
  2. The macro saves the active document as an RTF file.
  3. The macro silently opens the RTF document.
  4. On Open the RTF document drops the embedded object to Temp.
  5. The macro executes the dropped file.
 
Full Article

1 reply

Userlevel 7
These attackers must stay up all night to devise this plan of attack.

Reply