Threat Advisory

Microsoft's MSHTA Legacy Utility Abused by Malware

Threat: Malware
Targeted Region: Global
Targeted Sector: Technology & IT
Criticality: High
[subscribe_to_unlock_form]

EXECUTIVE SUMMARY

Attackers continue to exploit Microsoft's MSHTA legacy utility, a tool available by default on Windows systems that can execute VBScript and JavaScript from local or remote files. This utility, considered a Living-off-the-Land binary (LOLBIN), remains widely abused despite its legacy status. Threat actors use it to push a range of malware, from commodity password stealers to advanced threats, often relying on social engineering tactics such as fake software downloads and ClickFix-style lures. The ultimate goal of these attacks is data theft, with attackers seeking to steal sensitive information like credentials, browser-stored data, and cryptocurrency-related data.[/subscribe_to_unlock_form]

EXECUTIVE SUMMARY

Attackers continue to exploit Microsoft's MSHTA legacy utility, a tool available by default on Windows systems that can execute VBScript and JavaScript from local or remote files. This utility, considered a Living-off-the-Land binary (LOLBIN), remains widely abused despite its legacy status. Threat actors use it to push a range of malware, from commodity password stealers to advanced threats, often relying on social engineering tactics such as fake software downloads and ClickFix-style lures. The ultimate goal of these attacks is data theft, with attackers seeking to steal sensitive information like credentials, browser-stored data, and cryptocurrency-related data.[emaillocker id="1283"]

The malware infects systems through various delivery vectors, including phishing emails, fake software installers, and social media posts. Once inside, the malware uses MSHTA to execute remote script content, often in the form of HTA files. These files can embed JavaScript and VBScript code, allowing script execution in the context of a trusted, signed process. The attacker maintains control by using MSHTA to retrieve and execute remote payloads, making it difficult for defenders to distinguish between benign and malicious activity.

This threat is significant for organisations, as it can quickly lead to account theft, financial fraud, data loss, or broader infection of the affected system. The use of MSHTA as a lightweight execution mechanism makes it well-suited for retrieving obfuscated HTA content, launching in-memory scripts, and handing off execution to PowerShell, WScript, or a final malware payload. Effective defense requires both user awareness and layered technical controls, including patching, monitoring, backups, and endpoint protection. Organisations should ensure that trusted, preinstalled Windows binaries like MSHTA are restricted or blocked in environments where they are no longer required for legitimate workflows.

THREAT PROFILE:

Tactic Technique ID Technique Sub-technique
Initial Access T1566.002 Phishing Spearphishing Link
Execution T1059.001 Command and Scripting Interpreter PowerShell
Execution T1059.007 Command and Scripting Interpreter JavaScript
Execution T1059.005 Command and Scripting Interpreter Visual Basic
Defense Evasion T1027.009 Obfuscated Files or Information Embedded Payloads
Defense Evasion T1218.007 System Binary Proxy Execution Msiexec
Credential Access T1555.003 Credentials from Password Stores Credentials from Web Browsers
Command and Control T1105 Ingress Tool Transfer
Command and Control T1071.001 Application Layer Protocol Web Protocols

REFERENCES:

The reports contain further technical details:
https://www.bitdefender.com/en-us/blog/labs/microsofts-mshta-legacy-malware-windows
https://cybersecuritynews.com/hackers-abuse-mshta-legacy-windows-tool/

[/emaillocker]
crossmenu