{"id":89265,"date":"2019-04-10T08:00:58","date_gmt":"2019-04-10T15:00:58","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=89265"},"modified":"2025-06-30T06:06:24","modified_gmt":"2025-06-30T13:06:24","slug":"analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/10\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/","title":{"rendered":"Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">In early March, we discovered a cyberattack that used an exploit for CVE-2018-20250, an old WinRAR vulnerability disclosed just several weeks prior, and targeted organizations in the satellite and communications industry. A complex attack chain incorporating multiple code execution techniques attempted to run a fileless PowerShell backdoor that could allow an adversary to take full control of compromised machines.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The WinRAR vulnerability was discovered by Check Point researchers, who demonstrated in a February 20 <a href=\"https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar\/\">blog post<\/a> that a specially crafted ACE file (a type of compressed file) could allow remote code execution. Attackers quickly took advantage of the vulnerability in attacks, including a targeted attack that 360 Total Security researchers <a href=\"https:\/\/ti.360.net\/blog\/articles\/upgrades-in-winrar-exploit-with-social-engineering-and-encryption\/\">discovered<\/a> just two days after disclosure. The exploit has since been observed in multiple malware attacks.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The use of ACE files is not uncommon in malware campaigns. A combination of machine learning, advanced heuristics, behavior-based detections, and detonation enables <a href=\"https:\/\/docs.microsoft.com\/en-us\/office365\/securitycompliance\/office-365-atp\">Office 365 Advanced Threat Protection<\/a> (ATP) to regularly detect and block a variety of threats that are packed in ACE files, including common malware like Fareit, Agent Tesla, NanoCore, LokiBot and some ransomware families.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The same capabilities in Office 365 ATP detected malicious ACE files carrying the CVE-2018-20250 exploit. We spotted one of these ACE files in the sophisticated targeted attack that we describe in this blog and that stood out because of unusual, interesting techniques. Notably, the attack used techniques that are similar to campaigns carried out by the activity group known as <a href=\"https:\/\/attack.mitre.org\/groups\/G0069\/\">MuddyWater<\/a>, as observed by other security vendors like <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/campaign-possibly-connected-muddywater-surfaces-middle-east-central-asia\/\">Trend Micro<\/a>.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1428\" height=\"843\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2019\/04\/fig1-cve-2018-20250-attack-chain.png\" alt=\"Attack chain diagram\" class=\"wp-image-89266\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig1-cve-2018-20250-attack-chain.png 1428w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig1-cve-2018-20250-attack-chain-300x177.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig1-cve-2018-20250-attack-chain-768x453.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig1-cve-2018-20250-attack-chain-1024x605.png 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig1-cve-2018-20250-attack-chain-440x260.png 440w\" sizes=\"auto, (max-width: 1428px) 100vw, 1428px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center wp-block-paragraph\"><em>Figure 1. Attack chain that delivered the CVE-2018-20250 exploit<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"attack-chain-overview\">Attack chain overview<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">A spear-phishing email purporting to be from the Ministry of Foreign Affairs (MFA) of the Islamic Republic of Afghanistan was sent to very specific targets and asked for \u201cresources, telecommunication services and satellite maps\u201d. The email came with a Word document attachment.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"970\" height=\"636\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2019\/04\/fig2-cve-2018-20250-email.png\" alt=\"Spear phishing email.\" class=\"wp-image-89267\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig2-cve-2018-20250-email.png 970w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig2-cve-2018-20250-email-300x197.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig2-cve-2018-20250-email-768x504.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig2-cve-2018-20250-email-200x130.png 200w\" sizes=\"auto, (max-width: 970px) 100vw, 970px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center wp-block-paragraph\"><em>Figure 2. Spear phishing email containing lure Word Document<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">When opened, the document asks the recipient to download another document from a now-inactive OneDrive link. While the URL was down during our analysis, we still reported the case to the OneDrive team.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The use of a document with just a link\u2014no malicious macro or embedded object\u2014was likely meant to evade conventional email security protection. This didn\u2019t work against Office 365 ATP, which has the capability to scan emails and Office documents for URLs and analyze links for malicious behavior.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"729\" height=\"944\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2019\/04\/fig3-cve-2018-20250-original-document.png\" alt=\"Word document lure containing OneDrive link.\" class=\"wp-image-89268\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig3-cve-2018-20250-original-document.png 729w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig3-cve-2018-20250-original-document-232x300.png 232w\" sizes=\"auto, (max-width: 729px) 100vw, 729px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center wp-block-paragraph\"><em>Figure 3. Word document lure containing OneDrive link<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Clicking the link downloads an archive file containing a second Word document, which has malicious macro. Microsoft Word opens the document with security warning. Enabling the macro starts a series of malicious actions that leads to the download of the malware payload.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"729\" height=\"944\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2019\/04\/fig4-cve-2018-2025-Document-With-Malicious-Macro.png\" alt=\"Screenshot of document with malicious macro.\" class=\"wp-image-89269\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig4-cve-2018-2025-Document-With-Malicious-Macro.png 729w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig4-cve-2018-2025-Document-With-Malicious-Macro-232x300.png 232w\" sizes=\"auto, (max-width: 729px) 100vw, 729px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center wp-block-paragraph\"><em>Figure 4. Downloaded document with malicious macro<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Interestingly, the document has a \u201cNext Page\u201d button. Clicking that button displays a fake message signifying that a certain DLL file is missing, and that the computer needs to restart. This is a social engineering technique that ensures the computer is restarted, which is needed for the payload to run. (More on this later.)<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"569\" height=\"737\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2019\/04\/fig5-cve-2018-20250-Document-With-Malicious-Macro-with-Dialog-Box.png\" alt=\"Fake message instructing user to restart the computer.\" class=\"wp-image-89271\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig5-cve-2018-20250-Document-With-Malicious-Macro-with-Dialog-Box.png 569w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig5-cve-2018-20250-Document-With-Malicious-Macro-with-Dialog-Box-232x300.png 232w\" sizes=\"auto, (max-width: 569px) 100vw, 569px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center wp-block-paragraph\"><em>Figure 5. Fake message instructing user to restart the computer<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Meanwhile, with the macro enabled, the malicious code performs the following in the background:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Extract and decode a data blob from TextBox form and drop it as <em>C:\\Windows\\Temp\\id.png<\/em><\/li>\n\n\n\n<li class=\"wp-block-list-item\">Create a malicious Visual Basic Script (VBScript) and drop it as <em>C:\\Windows\\Temp\\temp.vbs<\/em><\/li>\n\n\n\n<li class=\"wp-block-list-item\">Add persistence by creating a COM object and adding autorun registry key to launch the created shell object<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Launch <em>temp.vbs<\/em>, which is a wrapper for the malicious PowerShell command that decodes the <em>id.png<\/em> file, which results in the second-stage PowerShell script that is highly obfuscated and contains multi-layered encryption (this PowerShell script is similar to a script that has been used in past MuddyWater campaigns)<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">The second-stage PowerShell script collects system information, generates unique computer ID, and sends these to remote location. It acts as a backdoor and can accept commands, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Download arbitrary file<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Run command using <em>cmd.exe<\/em><\/li>\n\n\n\n<li class=\"wp-block-list-item\">Decode a base64-encoded command and run it using PowerShell<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">The PowerShell script\u2019s ability to accept commands and download programs provided a way for a remote attacker to deliver the malicious ACE file containing CVE-2018-20250 exploit. When triggered, the exploit then drops the payload <em>dropbox.exe<\/em>.<br>The next sections discuss in detail the key components of this attack chain.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"malicious-macro\">Malicious macro<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The highly obfuscated malicious macro code used in this attack has a unique way of running malicious code by chaining several programs. It first extracts an encoded data taken from <em>UserForm.TextBox<\/em>, before decoding and saving it as <em>C:\\Windows\\Temp\\id.png<\/em>. This file contains an encoded PowerShell command that is executed later by the first-stage PowerShell script.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1159\" height=\"764\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2019\/04\/fig6-obfuscated-macro-code.png\" alt=\"Obfuscated macro code.\" class=\"wp-image-89272\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig6-obfuscated-macro-code.png 1159w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig6-obfuscated-macro-code-300x198.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig6-obfuscated-macro-code-768x506.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig6-obfuscated-macro-code-1024x675.png 1024w\" sizes=\"auto, (max-width: 1159px) 100vw, 1159px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center wp-block-paragraph\"><em>Figure 6. Obfuscated macro code<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The malicious macro code then creates an <em>Excel.Application<\/em> object to write the VBScript code.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1184\" height=\"449\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2019\/04\/fig7.vbscript-created-by-macro.png\" alt=\"VBScript code created by the malicious macro.\" class=\"wp-image-89273\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig7.vbscript-created-by-macro.png 1184w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig7.vbscript-created-by-macro-300x114.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig7.vbscript-created-by-macro-768x291.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig7.vbscript-created-by-macro-1024x388.png 1024w\" sizes=\"auto, (max-width: 1184px) 100vw, 1184px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center wp-block-paragraph\"><em>Figure 7. VBScript code created by the malicious macro<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">It then runs <em>wscript.exe<\/em> to launch the PowerShell script at runtime. The PowerShell script itself does not touch the disc, making it a <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/09\/27\/out-of-sight-but-not-invisible-defeating-fileless-malware-with-behavior-monitoring-amsi-and-next-gen-av\/\">fileless<\/a> component of the attack chain. <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2017\/12\/04\/windows-defender-atp-machine-learning-and-amsi-unearthing-script-based-attacks-that-live-off-the-land\/\">Living-off-the-land<\/a>, the technique of using resources that are already available on the system (e.g., <em>wscript.exe<\/em>) to run malicious code directly in memory, is another way that this attack tries to evade detection.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"powershell\">PowerShell<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The first-stage PowerShell script contains multiple layers of obfuscation. When run, it decodes the file <em>id.png<\/em> to produce another PowerShell script that\u2019s responsible for the rest of the actions.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1429\" height=\"127\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2019\/04\/fig8-obfuscated-first-stage-PowerShell-code.jpg\" alt=\"Obfuscated first-stage PowerShell code.\" class=\"wp-image-89274\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig8-obfuscated-first-stage-PowerShell-code.jpg 1429w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig8-obfuscated-first-stage-PowerShell-code-300x27.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig8-obfuscated-first-stage-PowerShell-code-768x68.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig8-obfuscated-first-stage-PowerShell-code-1024x91.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig8-obfuscated-first-stage-PowerShell-code-1420x127.jpg 1420w\" sizes=\"auto, (max-width: 1429px) 100vw, 1429px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center wp-block-paragraph\"><em>Figure 8. Obfuscated first-stage PowerShell code<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1224\" height=\"715\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2019\/04\/fig9-de-obfuscated-first-scate-PowerShell-script.png\" alt=\"De-obfuscated first-stage PowerShell script.\" class=\"wp-image-89275\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig9-de-obfuscated-first-scate-PowerShell-script.png 1224w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig9-de-obfuscated-first-scate-PowerShell-script-300x175.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig9-de-obfuscated-first-scate-PowerShell-script-768x449.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig9-de-obfuscated-first-scate-PowerShell-script-1024x598.png 1024w\" sizes=\"auto, (max-width: 1224px) 100vw, 1224px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center wp-block-paragraph\"><em>Figure 9. De-obfuscated first-stage PowerShell script<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The decrypted PowerShell script is also highly obfuscated. Fully de-obfuscating the malicious script requires over 40 layers of script blocks.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The second-stage PowerShell script collects system information, such as operating system, OS architecture, username, domain name, disk information, enabled-only IP addresses, and gateway IP address. It computes the MD5 hash of collected system information. The computed hash is used as the BotID (some researchers also refer to this as SYSID).<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">It then concatenates the hash and system information in a string that looks like the following:<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><em>&lt;BotID&gt;**&lt;OS&gt;|Disk information**&lt;IP Address List&gt;**&lt;OS Architecture&gt;**&lt;Hostname&gt;**&lt;Domain&gt;**&lt;Username&gt;**&lt;Gateway IP&gt;<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">For example:<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><em>6e6bdbd3d8b102305f016b06e995a384**Microsoft Windows 10 Enterprise|C:\\WINDOWS|\\Device\\Harddisk0\\Partition3**192[.]168[.]61[.]1-192[.]168[.]32[.]1-157[.]59[.]24[.]113**64-bit**&lt;Hostname&gt;**&lt;Domain&gt;**&lt;Username&gt;**131[.]107[.]160[.]113<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">It then encodes each character of the collected system information in decimal value by applying simple custom algorithm with hardcoded key (public key): 959,713. The result is formatted as XML-like data:<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><em>{&#8220;data&#8221;:&#8221;665 545 145 145 222 545 222 145 73 367 665 438 438 438 598 616 145 518 616 566 438 [REDACTED] 616 73 145 145 665 518 365 438 316 665 513 513 432 261 181 344}<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">It sends the encoded data to a hardcoded remote command-and-control (C&amp;C), likely to check and register the infected computer: hxxp:\/\/162[.]223<span style=\"display: inline !important; float: none; background-color: #ffffff; color: #333333; cursor: text; font-family: Georgia,'Times New Roman','Bitstream Charter',Times,serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\">[.]<\/span>89<span style=\"display: inline !important; float: none; background-color: #ffffff; color: #333333; cursor: text; font-family: Georgia,'Times New Roman','Bitstream Charter',Times,serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\">[.]<\/span>53\/oa\/.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">It continuously waits until the remote attacker sends back \u201cdone\u201d. Then, it sends an HTTP request to the same C&amp;C address passing the BotID, likely to wait for command: hxxp:\/\/162<span style=\"display: inline !important; float: none; background-color: #ffffff; color: #333333; cursor: text; font-family: Georgia,'Times New Roman','Bitstream Charter',Times,serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\">[.]<\/span>223<span style=\"display: inline !important; float: none; background-color: #ffffff; color: #333333; cursor: text; font-family: Georgia,'Times New Roman','Bitstream Charter',Times,serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\">[.]<\/span>89<span style=\"display: inline !important; float: none; background-color: #ffffff; color: #333333; cursor: text; font-family: Georgia,'Times New Roman','Bitstream Charter',Times,serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\">[.]<\/span>53\/oc\/api\/?t=&lt;BOTID&gt;.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">It can accept command to download and execute command and sends back the output, encoded in Base64 format, to the remote C2 server using HTTP POST: hxxp:\/\/162<span style=\"display: inline !important; float: none; background-color: #ffffff; color: #333333; cursor: text; font-family: Georgia,'Times New Roman','Bitstream Charter',Times,serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\">[.]<\/span>223<span style=\"display: inline !important; float: none; background-color: #ffffff; color: #333333; cursor: text; font-family: Georgia,'Times New Roman','Bitstream Charter',Times,serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\">[.]<\/span>89<span style=\"display: inline !important; float: none; background-color: #ffffff; color: #333333; cursor: text; font-family: Georgia,'Times New Roman','Bitstream Charter',Times,serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px;\">[.]<\/span>53\/or\/?t=&lt;BOTID&gt;.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"cve-2018-20250-exploit\">CVE-2018-20250 exploit<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">In their <a href=\"https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar\/\">analysis<\/a> of the CVE-2018-20250 vulnerability, Check Point researchers found that when parsing ACE files, WinRAR used an old DLL named unacev2.dll that was vulnerable to directory traversal.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Malicious ACE files that carry the CVE-2018-20250 exploit can be spotted through:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Directory traversal string \u2013 The validation from <em>Unacev2.dll<\/em> for the destination path when extracting ACE is not enough. If attacker can craft relative path that can bypass the checks in place, it may lead to extraction of the embedded payload to the specified location.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Drop zone \u2013 In-the-wild samples commonly use the Startup folder, but it\u2019s also possible to drop the file to known or pre-determined SMB shared folders.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Payload \u2013 The malicious payload, as in this attack, is commonly an .exe file, but in-the-wild samples and other ACE files that we\u2019ve seen use other malicious scripts like VBScript executable.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1147\" height=\"1268\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2019\/04\/fig10-ACE-file-with-CVE-2018-20250-exploit.jpg\" alt=\"ACE file with CVE-2018-20250 exploit.\" class=\"wp-image-89276\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig10-ACE-file-with-CVE-2018-20250-exploit.jpg 1147w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig10-ACE-file-with-CVE-2018-20250-exploit-271x300.jpg 271w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig10-ACE-file-with-CVE-2018-20250-exploit-768x849.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig10-ACE-file-with-CVE-2018-20250-exploit-926x1024.jpg 926w\" sizes=\"auto, (max-width: 1147px) 100vw, 1147px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center wp-block-paragraph\"><em>Figure 10. ACE file with CVE-2018-20250 exploit<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The ACE file contains three JPEG files that may look related to the email and Word document lures. When the user attempts to extract any of them, the exploit triggers and drops the payload, <em>dropbox.exe<\/em>, to the Startup folder.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1119\" height=\"713\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2019\/04\/fig11-contents-of-the-malicious-ACE-file.jpg\" alt=\"Contents of the malicious ACE file.\" class=\"wp-image-89277\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig11-contents-of-the-malicious-ACE-file.jpg 1119w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig11-contents-of-the-malicious-ACE-file-300x191.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig11-contents-of-the-malicious-ACE-file-768x489.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig11-contents-of-the-malicious-ACE-file-1024x652.jpg 1024w\" sizes=\"auto, (max-width: 1119px) 100vw, 1119px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center wp-block-paragraph\"><em>Figure 11. Contents of the malicious ACE file<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Going back to the fake error message about a missing DLL and asking the user to restart the computer: The CVE-2018-20250 vulnerability only allows file write to specified folder but has no capability to run the file immediately. Since the payload was dropped in the Startup folder, it is launched when the computer restarts.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The payload <em>dropbox.exe<\/em> performs the same actions as the malicious macro component, which helps ensure that the PowerShell backdoor is running. The PowerShell backdoor could allow a remote attacker to take full control of the compromised machine and make it a launchpad for more malicious actions. Exposing and stopping the attacks at the early stages is critical in preventing additional, typically more damaging impact of undetected malware implants.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"stopping-attacks-at-the-entry-point-with-office-365-atp\">Stopping attacks at the entry point with Office 365 ATP<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The targeted attack we discussed in this blog and other attacks that use the CVE-2018-20250 exploit show how quickly attackers can take advantage of known vulnerabilities. Attackers are always in search of new vectors to reach more victims. In this attack, they also used some sophisticated code injection techniques. Protections against cyberattacks should be advanced, real-time, and comprehensive.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The URL detonation capabilities in <a href=\"https:\/\/docs.microsoft.com\/en-us\/office365\/securitycompliance\/office-365-atp\">Office 365 ATP<\/a> was instrumental in detecting and blocking the malicious behaviors across the multiple stages of this sophisticated attack, protecting customers from potentially damaging outcomes. URL detonation, coupled with heuristics, behavior-based detections, and machine learning, allow Office 365 ATP to protect customers not only from targeted attacks, but also well-crafted spear phishing attacks\u2014in real time.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"unified-protection-across-multiple-attack-vectors-with-microsoft-threat-protection\">Unified protection across multiple attack vectors with Microsoft Threat Protection<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">These advanced defenses from Office 365 ATP are shared with other services in <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/the-evolution-of-microsoft-threat-protection\/\">Microsoft Threat Protection<\/a>, which provides seamless, integrated, and comprehensive protection against multiple attack vectors. Through signal-sharing, Microsoft threat Protection orchestrates threat remediation.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">For endpoints that are not protected by Office 365 ATP, <a href=\"https:\/\/www.microsoft.com\/en-us\/windowsforbusiness\/windows-atp?ocid=cx-blog-mmpc\">Microsoft Defender ATP<\/a> detects the attacker techniques used in this targeted attack. Microsoft Defender ATP is a unified endpoint protection platform for attack surface reduction, next generation protection, endpoint detection &amp; response (EDR), auto investigation &amp; remediation, as well as recently announced <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/02\/28\/announcing-microsoft-threat-experts\/\">managed threat hunting<\/a> and <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Windows-Defender-ATP\/Introducing-a-risk-based-approach-to-threat-and-vulnerability\/ba-p\/377845\">threat &amp; vulnerability management<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft Defender ATP uses machine learning, behavior monitoring, and heuristics to detect sophisticated threats. Its <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Windows-Defender-ATP\/MITRE-evaluation-highlights-industry-leading-EDR-capabilities-in\/ba-p\/369831?_lrsc=43e3d75c-e0f9-442c-b084-0fa99ad29fde\">industry-leading optics<\/a>, integration with Office 365 ATP and other Microsoft Threat Protection services, and use of <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/09\/12\/office-vba-amsi-parting-the-veil-on-malicious-macros\/\">AMSI<\/a> give it unique capabilities to detect attacker techniques, including the exploit, obfuscation, detection evasion, and fileless techniques observed in this attack.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The attacks that immediately exploited the WinRAR vulnerability demonstrate the importance of threat &amp; vulnerability management in reducing organizational risk. Even if your organization was not affected by this attack against specific organizations in the satellite and communications industry, there are other malware campaigns that used the exploits.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft Defender ATP\u2019s <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Windows-Defender-ATP\/Introducing-a-risk-based-approach-to-threat-and-vulnerability\/ba-p\/377845\">threat &amp; vulnerability management<\/a> capability uses a risk-based approach to the discovery, prioritization, and remediation of endpoint vulnerabilities. As a component of a unified endpoint protection platform, threat &amp; hunting vulnerability management in Microsoft Defender ATP provides these unique benefits:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Real-time correlation of EDR insights with info on endpoint vulnerabilities<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Invaluable endpoint vulnerability context for incident investigations<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Built-in remediation processes through Microsoft Intune and Microsoft System Center Configuration Manager<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"3072\" height=\"1200\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2019\/04\/fig12-threat-and-vulnerability-management.png\" alt=\"Threat and Vulnerability Management\" class=\"wp-image-89278\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig12-threat-and-vulnerability-management.png 3072w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig12-threat-and-vulnerability-management-300x117.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig12-threat-and-vulnerability-management-768x300.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/fig12-threat-and-vulnerability-management-1024x400.png 1024w\" sizes=\"auto, (max-width: 3072px) 100vw, 3072px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center wp-block-paragraph\"><em>Figure 12. Sample Threat &amp; Vulnerability Management dashboard showing WinRAR vulnerabilities on managed endpoints<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The complex attack chain that incorporated sophisticated techniques observed in this targeted attack highlights the benefits of a comprehensive protection enriched by telemetry collected across the entire attack chain. Microsoft Threat Protection <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/the-evolution-of-microsoft-threat-protection\/\">continues to evolve<\/a> to provide integrated threat protection solution for the modern workplace.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><em>Rex Plantado<\/em><\/strong><br><em>Office 365 ATP Research Team<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"indicators-of-compromise\">Indicators of compromise<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Files (SHA-256):<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">68133eb271d442216e66a8267728ab38bf143627aa5026a4a6d07bb616b3d9fd (Original email attachment) &#8211; detected as Trojan:O97M\/Maudon.A<\/li>\n\n\n\n<li class=\"wp-block-list-item\">ef3617a68208f047ccae2d169b8208aa87df9a4b8959e529577fe11c2e0d08c3 (Document hosted in OneDrive link) &#8211; detected as Trojan:O97M\/Maudon.A<\/li>\n\n\n\n<li class=\"wp-block-list-item\">4cb0b2d9a4275d7e7f532f52c1b6ba2bd228a7b50735b0a644d2ecae96263352 (ACE file with CVE-2018-20250 exploit) &#8211; detected as Exploit:Win32\/CVE-2018-20250<\/li>\n\n\n\n<li class=\"wp-block-list-item\">6f78748f5b2902c05e88c1d2e45de8e7c635512a5f25d25217766554534277fe (dropbox.exe (Win64 Payload)) &#8211; detected as Trojan:Win32\/Maudon.A<\/li>\n\n\n\n<li class=\"wp-block-list-item\">c0c22e689e1e9fa11cbf8718405b20ce57c1d7c85d8e6e45c617e2b095b01b15 (Encoded id.png) &#8211; detected as Trojan:PowerShell\/Maudon.A<\/li>\n\n\n\n<li class=\"wp-block-list-item\">0089736ee162095ac2e4e66de6468dbb7824fe73996bbea48a3bb85f7fdd53e4 (temp.vbs) &#8211; detected as ThreatRelated<\/li>\n\n\n\n<li class=\"wp-block-list-item\">1c25286b8dea0ebe4e8fca0181c474ff47cf822330ef3613a7d599c12b37ff5f (PowerShell script decrypted from id.png) &#8211; detected as Trojan:PowerShell\/Maudon.A<\/li>\n\n\n\n<li class=\"wp-block-list-item\">144b3aa998cf9f30d6698bebe68a1248ca36dc5be534b1dedee471ada7302971 (Decrypted PowerShell) &#8211; detected as Trojan:PowerShell\/Maudon.A<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">URLs:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">hxxps:\/\/1drv[.]ms\/u\/s!AgvJCoYH9skpgUNf3Y3bfhSyFQao<\/li>\n\n\n\n<li class=\"wp-block-list-item\">hxxp:\/\/162[.]223[.]89[.]53\/oa\/<\/li>\n\n\n\n<li class=\"wp-block-list-item\">hxxp:\/\/162[.]223[.]89[.]53\/oc\/api\/?t=&lt;BOTID><\/li>\n\n\n\n<li class=\"wp-block-list-item\">hxxp:\/\/162[.]223[.]89[.]53\/or\/?t=&lt;BOTID><\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">&nbsp;<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"talk-to-us\">Talk to us<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Follow us on Twitter <strong><a href=\"https:\/\/twitter.com\/MsftSecIntel\" target=\"_blank\" rel=\"noopener noreferrer\">@MsftSecIntel<\/a><\/strong>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A complex attack chain incorporating the CVE-2018-20250 exploit and multiple code execution techniques attempted to run a fileless PowerShell backdoor that could allow an adversary to take full control of compromised machines.<\/p>\n","protected":false},"author":68,"featured_media":89280,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[],"footnotes":""},"post_tag":[3921],"threat-intelligence":[3739],"content-type":[3663],"job-role":[],"product":[3690,3694,3695],"topic":[3687],"coauthors":[3380],"class_list":["post-89265","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-living-off-the-land","threat-intelligence-vulnerabilities-and-exploits","content-type-research","product-microsoft-defender","product-microsoft-defender-for-endpoint","product-microsoft-defender-for-office-365","topic-threat-intelligence","review-flag-1694638272-264","review-flag-1694638265-576","review-flag-1694638265-310","review-flag-1-1694638265-354","review-flag-2-1694638266-864","review-flag-3-1694638266-241","review-flag-4-1694638266-512","review-flag-5-1694638266-171","review-flag-6-1694638266-691","review-flag-7-1694638266-851","review-flag-8-1694638266-352","review-flag-9-1694638266-118","review-flag-alway-1694638263-571","review-flag-machi-1694638272-641","review-flag-new-1694638263-340"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability | Microsoft Security Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/10\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"A complex attack chain incorporating the CVE-2018-20250 exploit and multiple code execution techniques attempted to run a fileless PowerShell backdoor that could allow an adversary to take full control of compromised machines.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/10\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-10T15:00:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-30T13:06:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/cve-2018-20250-attack-chain-social.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Microsoft Threat Intelligence\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/cve-2018-20250-attack-chain-social.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft Threat Intelligence\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/10\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/10\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/microsoft-security-threat-intelligence\/\",\"@type\":\"Person\",\"@name\":\"Microsoft Threat Intelligence\"}],\"headline\":\"Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability\",\"datePublished\":\"2019-04-10T15:00:58+00:00\",\"dateModified\":\"2025-06-30T13:06:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/10\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/\"},\"wordCount\":2243,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/10\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/CVE-2018-20250-blog.jpg\",\"keywords\":[\"Living off the land\"],\"articleSection\":[\"Cybersecurity\",\"Endpoint security\",\"Microsoft security intelligence\",\"Office 365 Security\",\"Security Intelligence\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/10\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/10\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/\",\"name\":\"Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/10\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/10\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/CVE-2018-20250-blog.jpg\",\"datePublished\":\"2019-04-10T15:00:58+00:00\",\"dateModified\":\"2025-06-30T13:06:24+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/10\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/10\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/10\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/CVE-2018-20250-blog.jpg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/CVE-2018-20250-blog.jpg\",\"width\":440,\"height\":268,\"caption\":\"A group of tech workers checking out some suspicious code.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/10\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/060b835777058efc81d6828a64820f98\",\"name\":\"Microsoft Security Threat Intelligence - Editor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/52c6f8d687a54d49c87e04326b24f4ed410c7a6535e21df3cca90d21039c9089?s=96&d=microsoft&r=g52243f56b7f8688616d4ca12dc0148e2\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/52c6f8d687a54d49c87e04326b24f4ed410c7a6535e21df3cca90d21039c9089?s=96&d=microsoft&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/52c6f8d687a54d49c87e04326b24f4ed410c7a6535e21df3cca90d21039c9089?s=96&d=microsoft&r=g\",\"caption\":\"Microsoft Security Threat Intelligence - Editor\"},\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/eravena\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability | Microsoft Security Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/10\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability | Microsoft Security Blog","og_description":"A complex attack chain incorporating the CVE-2018-20250 exploit and multiple code execution techniques attempted to run a fileless PowerShell backdoor that could allow an adversary to take full control of compromised machines.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/10\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/","og_site_name":"Microsoft Security Blog","article_published_time":"2019-04-10T15:00:58+00:00","article_modified_time":"2025-06-30T13:06:24+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/cve-2018-20250-attack-chain-social.png","type":"image\/png"}],"author":"Microsoft Threat Intelligence","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/cve-2018-20250-attack-chain-social.png","twitter_misc":{"Written by":"Microsoft Threat Intelligence","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/10\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/10\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/microsoft-security-threat-intelligence\/","@type":"Person","@name":"Microsoft Threat Intelligence"}],"headline":"Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability","datePublished":"2019-04-10T15:00:58+00:00","dateModified":"2025-06-30T13:06:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/10\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/"},"wordCount":2243,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/10\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/CVE-2018-20250-blog.jpg","keywords":["Living off the land"],"articleSection":["Cybersecurity","Endpoint security","Microsoft security intelligence","Office 365 Security","Security Intelligence"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/10\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/10\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/","name":"Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/10\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/10\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/CVE-2018-20250-blog.jpg","datePublished":"2019-04-10T15:00:58+00:00","dateModified":"2025-06-30T13:06:24+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/10\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/10\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/10\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/CVE-2018-20250-blog.jpg","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2019\/04\/CVE-2018-20250-blog.jpg","width":440,"height":268,"caption":"A group of tech workers checking out some suspicious code."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/04\/10\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/060b835777058efc81d6828a64820f98","name":"Microsoft Security Threat Intelligence - Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/52c6f8d687a54d49c87e04326b24f4ed410c7a6535e21df3cca90d21039c9089?s=96&d=microsoft&r=g52243f56b7f8688616d4ca12dc0148e2","url":"https:\/\/secure.gravatar.com\/avatar\/52c6f8d687a54d49c87e04326b24f4ed410c7a6535e21df3cca90d21039c9089?s=96&d=microsoft&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/52c6f8d687a54d49c87e04326b24f4ed410c7a6535e21df3cca90d21039c9089?s=96&d=microsoft&r=g","caption":"Microsoft Security Threat Intelligence - Editor"},"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/eravena\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/89265","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=89265"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/89265\/revisions"}],"predecessor-version":[{"id":140850,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/89265\/revisions\/140850"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/89280"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=89265"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/post_tag?post=89265"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=89265"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=89265"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/job-role?post=89265"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/product?post=89265"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=89265"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=89265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}