The
attack involves a phishing page to trick the victim into copying a malicious PowerShell command. Once they past it into File Explorer, Windows executes the PowerShell, making it a very subtle attack.
With the
new FileFix attack, an attacker would use social engineering to trick the user into saving an HTML page (using Ctrl+S) and renaming it to .HTA, which auto-executes embedded JScript via mshta.exe.
HTML Applications (.HTA) are considered legacy technology. This Windows file type can be used to execute HTML and scripting content using the legitimate mshta.exe in the context of the current user.
The researcher found that when HTML files are saved as "Webpage, Complete" (with MIME type text/html), they
do not receive the MoTW tag, allowing script execution without warnings for the user.
When the victim
opens the .HTA file, the embedded malicious script runs immediately without any warning.