Skip to content
Detecteam
  • CompanyExpand
    • Founders Story
    • The Team
  • ProductExpand
    • About Us
  • SolutionsExpand
    • Use Cases
  • ResourcesExpand
    • Detecteam Blogs
    • Contact Us
Twitter Linkedin
Detecteam
Blog · Scenario

HTML Smuggling

Avatar photoByDetecteam 2023-12-142023-12-14

TLP

TLP CLEAR

Author

David Deflache, Sebastien Tricaud

Summary

In early November 2022, a targeted intrusion began via email, delivering an HTML file utilizing HTML smuggling. Previously relying on Excel macros, the threat actor adapted to Microsoft’s macro control updates. Upon opening the HTML, a disguised Adobe page prompted a ZIP download with a password-protected ISO harboring the malware. The LNK file, posing as a document, triggered rundll32 and a malicious DLL execution. IcedID connected to its command server, maintaining persistence through scheduled tasks. Subsequent phases involved Cobalt Strike, lateral movement, Active Directory reconnaissance, and SessionGopher tool usage. The orchestrated attack culminated in deploying Nokoyawa ransomware, achieving a Time to Ransomware (TTR) of just over 12 hours

TIMELINE

DATA

We are providing data for attacks weekly hoping to contribute raising awareness to threats from their data.

windows_sysmon.xmlDownload

CATEGORY

ransomware

references

  • https://thedfirreport.com/2023/08/28/html-smuggling-leads-to-domain-wide-ransomware/

TAGS

Post Tags: #T1003.001 - LSASS Memory#T1016 - System Network Configuration Discovery#T1018 - Remote System Discovery#T1021.001 - Remote Desktop Protocol#T1021.002 - SMB/Windows Admin Shares#T1027.006 - HTML Smuggling#T1036.005 - Masquerading: Match Legitimate Name or Location#T1047 - Windows Management Instrumentation#T1053.005 - Scheduled Task/Job: Scheduled Task#T1055 - Process Injection#T1059.001 - Command and Scripting Interpreter: PowerShell#T1059.003 - Windows Command Shell#T1069.001 - Local Groups#T1069.002 - Domain Groups#T1071.001 - Application Layer Protocol: Web Protocols#T1078 - Valid Accounts#T1082 - System Information Discovery#T1087.001 - Local Account#T1087.002 - Domain Account#T1135 - Network Share Discovery#T1204.002 - User Execution: Malicious File#T1218.011 - System Binary Proxy Execution: Rundll32#T1482 - Domain Trust Discovery#T1486 - Data Encrypted for Impact#T1518.001 - Security Software Discovery#T1552.001 - Credentials In Files#T1552.002 - Credentials in Registry#T1560 - Archive Collected Data#T1566.001 - Phishing: Spearphishing Attachment#T1570 - Lateral Tool Transfer#T1614.001 - System Language Discovery
Avatar photo
Detecteam
X

Detecteam is transforming cybersecurity detection from static rule-writing to autonomous, continuous validation. Our REFLEX platform automates the detection lifecycle—building, testing, validating and deploying detections in minutes, not months. We help enterprises maximize ROI on existing tools, close high-risk detection gaps faster, and scale security outcomes without scaling headcount. This is the future of detection-as-code, and we’re leading it.

CONTACT US

Detecteam Inc.
300 Lenora Street PMB 659
Seattle, WA 98121 USA
+1 (650) 542-0831
sales@detecteam.com

  • Privacy Policy

SOCIAL MEDIA

Twitter Linkedin
OUR NEWSLETTER

Check your inbox or spam to confirm your subscription.

© 2025 Detecteam Inc. All Rights Reserved.

  • Company
    • Founders Story
    • The Team
  • Product
    • About Us
  • Solutions
    • Use Cases
  • Resources
    • Detecteam Blogs
    • Contact Us
Search