Sunday, April 13, 2025
HomeComputer SecurityHackers Launching Malware via Weaponized Excel File to Gain the Remote Access...

Hackers Launching Malware via Weaponized Excel File to Gain the Remote Access to the Target Computers

Published on

SIEM as a Service

Follow Us on Google News

Cyber criminals launching a new malware campaign that make use of
legitimate script engine AutoHotkey with a malicious script to evade detection and also gain the remote access to the targeted system.

AutoHotkey is an open source Microsoft Windows tool that allows you to create macros, scripts, and automate frequently performed tasks on your computer. 

Attackers distributing this malicious campaign via weaponized Excel File via email with attached Excel file that posed as a legitimate file with the
filename “Military Financing.xlsm.”

- Advertisement - Google News

In order to fully open the attached file, users need to enable the Micro that helps AutoHotkey loading the malicious script file to avoid detection.

Infection Process to Gain Remote Access via TeamViewer

Attached excel file in the email is titled “Foreign Military Financing (FMF),” named after a program of the U.S. Defense Security Cooperation Agency.

Attackers fooled users to enable the content by claiming that the document contains a confidential information.

Once the Victims open the malicious excel documents by enables macro from the email attachment, it drops the AutoHotkey that loads the malicious script file.

Later its connect to its Command and control server to download and execute additional script files.

According to Trend Micro, Depending on the script files, the AutoHotkey application can assign a hotkey or execute any process written in the script file. In this case, the script file AutoHotkeyU32.ahk does not assign a hotkey but it does execute the following commands:

  • Create a link file in the startup folder for AutoHotkeyU32.exe, allowing the attack to persist even after a system restart.
  • Connect to the C&C server every 10 seconds to download, save, and execute script files containing the commands.
  • Send the volume serial number of the C drive, which allows the attacker to identify the victim.

A final script will download and execute the TeamViewer to gain remote control over the system.

Further research uncovered other dropped files involved in this attack. These files allow the attackers to get the computer name and take screen captures. Trend Micro said.

Indicators of Compromise (IoCs)

SHA-256
EFE51C2453821310C7A34DCA3054021D0F6D453B7133C381D75E3140901EFD12
43FBDA74A65668333727C6512562DB4F9E712CF1D5AD9DCA8F06AE51BB937BA2
ACB3181D0408C908B2A434FC004BF24FB766D4CF68BF2978BC5653022F9F20BE
BE6C6B0942AD441953B0ED0C4327B9DED8A94E836EACA070ACA3988BADB31858
F64792324839F660B9BDFDA95501A568C076641CF08CE63C1DDBE29B45623AC0
C&C
185[.]70[.]186[.]145


You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Emotet Malware Mass Attack Drops Nozelesn Ransomware on Enterprise Endpoint Systems Via Word Documents

Hackers Launching Weaponized Word Document to Push Emotet & Qakbot Malware

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...