The below paper documents the process of creating a multi-stage IPS/AV transparent malicious document for purposes of Red Teaming / Penetration-Testing assignments.
The resulted document will be:
- using OLE event autorun method
- removing it's pretext shapes
- Obtaining commands to be executed from document's Author property and passing them to
StdInof Powershell.exe process - Leveraging
certutiltechnique to receive Base64 encoded malicious HTA document - Having Base64 encoded Powershell command in that Author property