Monday, April 28, 2025
HomeCVE/vulnerabilityBeware Of Weaponized Excel Document That Delivers Fileless Remcos RAT

Beware Of Weaponized Excel Document That Delivers Fileless Remcos RAT

Published on

SIEM as a Service

Follow Us on Google News

A recent advanced malware campaign leverages a phishing attack to deliver a seemingly benign Excel file that exploits CVE-2017-0199.

By exploiting this vulnerability in Microsoft Office, attackers are able to embed malicious code within the file using OLE objects. 

It utilizes encryption and obfuscation techniques to conceal the malicious payload. Upon opening the file, the victim’s system executes a fileless variant of the Remcos RAT, granting attackers remote access and control. 

- Advertisement - Google News

The malware campaign leverages the CVE-2017-0199 vulnerability to deliver a Remcos RAT via a phishing email containing an encrypted Excel file.

Decoding Compliance: What CISOs Need to Know – Join Free Webinar

The attack chain involves OLE object exploitation, HTA application execution, and PowerShell commands to inject the RAT into a legitimate process, which has been exploited by various malware families, including LATENTBOT, FINSPY, and WingBird/FinFisher. 

oletools confirming that the excel file is encrypted

Recent campaigns in 2024 deploying RevengeRAT, SnakeKeylogger, GuLoader, AgentTesla, and FormBook have targeted Government, Manufacturing, Technology/IT, and Banking sectors, primarily in Belgium, Japan, the United States, South Korea, Canada, Germany, and Australia.

It leverages a spearphishing attachment to entice victims into opening a deceptive Excel document, which exploits a vulnerability (CVE-2017-0199) to execute embedded OLE objects, which contain a malicious URL. 

This URL initiates a connection to a malicious server, downloading and executing a weaponized HTA file, ultimately compromising the victim’s system.

Embedded OLE object containing malicious URL

The Excel file exploits CVE-2017-0199 to deliver a malicious HTA application, which in turn executes a PowerShell script that downloads and runs a VBScript from a remote URL, which contains obfuscated data that is decoded and executed by PowerShell, initiating a chain of PowerShell processes to escalate the attack. 

While the final process downloads a JPEG file containing a base64-encoded ‘dnlib.dll’ library, which is decoded and loaded into memory for further malicious activity by leveraging various techniques to evade detection and achieve persistence in the target environment.

Downloaded JPEG file

The attack begins with PowerShell downloading a base64-encoded text file from a malicious URL and then processed by ‘dnlib.dll’ to create a .NET assembly of Remcos RAT, which is subsequently injected into the legitimate process ‘RegAsm’. 

According to Trellix, Remcos RAT then establishes persistence by injecting itself into other legitimate processes, evading traditional security defenses. 

IOC associated to Remcos RAT

Indicators of Remcos RAT presence include its keylogger file and associated IOCs, which utilize the MITRE ATT&CK techniques T1055.001, T1027, T1543.003, and T1071.001.

Attackers used a combination of advanced techniques to create a persistent threat by leveraging a vulnerability (CVE-2017-0199) in Microsoft Office to execute malicious code. 

It then downloaded additional tools like OLE objects, memory-only .NET assemblies, and scripts (.hta, vbs.txt) from compromised servers, which likely helped the attackers maintain persistence on the infected system and potentially steal data.

Simulating Cyberattack Scenarios With All-in-One Cybersecurity Platform – Watch Free Webinar

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...

Fog Ransomware Reveals Active Directory Exploitation Tools and Scripts

Cybersecurity researchers from The DFIR Report’s Threat Intel Group uncovered an open directory hosted...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

19 APT Hackers Target Asia-based Company Servers Using Exploited Vulnerabilities and Spear Phishing Email

The NSFOCUS Fuying Laboratory’s global threat hunting system identified 19 sophisticated Advanced Persistent Threat...

FBI Reports ₹1.38 Lakh Crore Loss in 2024, a 33% Surge from 2023

The FBI’s Internet Crime Complaint Center (IC3) has reported a record-breaking loss of $16.6...