Recent cybersecurity analyses have revealed a sophisticated attack method being leveraged by threat actors, specifically utilizing specially engineered Microsoft Management Console (MMC) saved console (MSC) files. This technique allows malicious entities to execute arbitrary code, thereby circumventing existing security measures. The discovery was detailed by Elastic Security Labs, which has coined the term GrimResource for this emerging threat vector.

The technique exploits a vulnerability within one of the libraries used by MMC, enabling attackers to import malicious console files that can trigger the execution of harmful code. Elastic Security Labs highlighted the first identified artifact, sccm-updater.msc, which surfaced on VirusTotal on June 6, 2024. This malicious file demonstrates how the technique can facilitate the delivery of malware simply through the act of opening a console file.

According to statements released, when users import a maliciously crafted MSC file, a vulnerability emerges, allowing the execution of adversarial code that can lead to unauthorized access and control over victim systems. Attackers can further enhance their methods by combining GrimResource with tools such as DotNetToJScript, which can escalate privileges and facilitate system compromise.

This increasingly sophisticated use of uncommon file types marks a notable shift in strategies employed by cybercriminals, particularly in response to tightened security controls by Microsoft. In recent years, Microsoft has enacted significant limitations, such as disabling macros in Office documents by default for files sourced from the internet. Adversaries are now seeking out alternative file types, including MSC files, as new pathways for malware distribution.

Notably, previous instances have shown similar tactics by groups such as the Kimsuky hacking collective, which recently utilized a malicious MSC file to execute malware. The ongoing evolution of these attack methods underscores the persistent vulnerabilities that exist within widely used software components, such as MMC.

The GrimResource approach hinges on a cross-site scripting (XSS) vulnerability in the apds.dll library, which permits the execution of arbitrary JavaScript code under the context of the MMC environment. This XSS vulnerability was initially reported back in late 2018 but remains unaddressed, illustrating a significant gap in security oversight that attackers have now capitalized upon. By manipulating the StringTable section of an MSC file to reference the vulnerable APDS resource, attackers can trigger unintended behaviors in the system.

Security experts emphasize that this method not only bypasses ActiveX security notifications but, when combined with DotNetToJScript, can lead to substantial breaches. Evidence of this is demonstrated by the deployment of a .NET loader component labeled PASTALOADER, which can prepare the ground for Cobalt Strike, a recognized tool for post-exploitation activities.

In light of these developments, Microsoft has acknowledged the risks associated with MSC files, categorizing them as “potentially dangerous.” The company confirmed that Microsoft Defender includes measures to flag these threats. Moreover, their Smart App Control feature is designed to block malicious internet-sourced files. Users are strongly urged to exercise caution, refraining from downloading or opening files from unfamiliar sources.

As the threat landscape continues to evolve, organizations should maintain vigilance and adapt to these emerging techniques. With the potential application of various tactics outlined in the MITRE ATT&CK framework, including initial access, privilege escalation, and execution, business leaders must prioritize robust cybersecurity practices to defend against such sophisticated threats.

Did you find this article insightful? Follow us on Twitter and LinkedIn for more exclusive content.