Abuse of Custom Actions in Windows Installer MSI to Run Malicious JavaScript, VBScript

Discussion in 'other security issues & news' started by guest, Apr 23, 2019.

  1. guest

    guest Guest

    Analysis: Abuse of Custom Actions in Windows Installer MSI to Run Malicious JavaScript, VBScript, and PowerShell Scripts
    April 23, 2019
    https://blog.trendmicro.com/trendla...s-javascript-vbscript-and-powershell-scripts/
     
  2. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Notable in this attack was that the script code was executed w/o use of wscript.exe:
    Also, the extremely low initial detection rate by AVs. One sample I checked on VT was only detected by three AVs; Eset and Kaspersky being two of them.

    The use of legit AV installer components is also a first I believe. So, LOL abuse is not just limited to Windows .exe's.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.