demiguise: HTA encryption tool for RedTeams
Demiguise – HTA encryption tool
What does it do?
The aim of this project is to generate .html files that contain an encrypted HTA file. The idea is that when your target visits the page, the key is fetched and the HTA is decrypted dynamically within the browser and pushed directly to the user. This is an evasion technique to around round content / file-type inspection implemented by some security-appliances. This tool is not designed to create awesome HTA content. There are many other tools/techniques that can help you with that. What it might help you with is getting your HTA into an environment in the first place, and (if you use environmental keying) to avoid it being sandboxed.
How does it do it?
This is achieved by encrypting the HTA file using RC4, and then using navigator.msSaveBlob
to “save” the file at runtime – rather than fetching the HTA directly from the server. Meaning that at no point is there any HTTP request/response that contains your HTA file in a plain-text form – the proxy will simply see a text/html
file containing your encrypted blob. In the latest version of Edge, this will result in the user being prompted to “run” the HTA.
Although not the primary aim of this tool, there are a couple of payload-options for the underlying HTA. Each option uses different techniques as previously documented by Matt Nelson, Matthew Demaske, Ryan Hanson and Etienne Stalmans. The benefit of using these techniques is that your code does not execute as a child of mshta.exe
. As mentioned previously, the content of the HTA is not the primary aim of this tool. I’d encourage you to modify the HTA template to contain your own custom code 🙂
How do I run it?
git clone https://github.com/nccgroup/demiguise.git
Run the demiguise.py
file, giving it your encryption-key, payload-type, output file-name and command that you want the HTA run.
Example: python demiguise.py -k hello -c "notepad.exe" -p Outlook.Application -o test.hta
Environmental Keying
In order to evade sandboxes, you shouldn’t embed your key directly in the HTA. Instead, you should get this dynamically from the environment the target is based in. An example of this may be to use the client’s external IP address as a key. The benefit of this is that if the code is run in a 3rd-party sandbox, the HTA will not decrypt. In fact, the file-name will not even decrypt, meaning that nobody will know what your payload is/does 🙂
Some examples of environmental keying are given in examples/externalip.js and examples/virginkey.js.
Bonus
Since the tool outputs an HTML file containing JavaScript, you can simply take this JS and host it wherever you like. This means that if your client’s website is vulnerable to Reflected-XSS, you can use this to serve your HTA file from their (highly trusted) domain.
Also, Outlook doesn’t block .html attachments by default, and neither do some other applications – use your imagination! 🙂
Detection
Currently, it is not detected on VT:
Defense
Although obfuscation techniques may be hard to the signature, one way to defend against HTA attacks is to prevent the HTA itself from being able to run in the first place. This can be achieved either through the use of Software Restriction Policy (SRP), Device Guard (on Windows 10 and Server 2016) or by changing the default file-handler associated with .hta files.
Please note that these changes may potentially affect the running of software that relies on HTA execution. Therefore it is recommended that a fix is fully tested in your own environment.
Using SRP:
Changing the default file-handler:
ftype htafile=%SystemRoot%\system32\NOTEPAD.EXE %1
Changing it back (x64):
Released as open source by NCC Group Plc – http://www.nccgroup.trust/
Developed by Richard Warren, richard [dot] warren [at] nccgroup [dot] trust
http://www.github.com/nccgroup/demiguise
Copyright (C) 2017 Richard Warren
Source: https://github.com/nccgroup/