Phishing emails abuse Windows search protocol to push malicious scripts

Abusing Windows Search

The recent attacks described in the Trustwave report start with a malicious email carrying an HTML attachment disguised as an invoice document placed within a small ZIP archive. The ZIP helps evade security/AV scanners that may not parse archives for malicious content.

Email attachment
Source: Trustwave

The HTML file uses the tag to cause the browser to automatically open a malicious URL when the HTML document is opened.

HTML file content
Source: Trustwave

If the meta refresh fails due to browser settings blocking redirects or other reasons, an anchor tag provides a clickable link to the malicious URL, acting as a fallback mechanism. This, however, requires user action.

The search prompt and the “failsafe” link
Source: Trustwave

In this case, the URL is for the Windows Search protocol to perform a search on a remote host using the following parameters:

  • Query: Searches for items labeled “INVOICE.”
  • Crumb: Specifies the search scope, pointing to a malicious server via Cloudflare.
  • Displayname: Renames the search display to “Downloads” to mimic a legitimate interface.
  • Location: Uses Cloudflare’s tunneling service to mask the server, making it look legitimate by presenting remote resources as local files.

Next, the search retrieves the list of files from the remote server, displaying a single shortcut (LNK) file named as an invoice. If the victim clicks on the file, a batch script (BAT) hosted on the same server is triggered.

Search result
Source: Trustwave

Trustwave couldn’t establish what the BAT does, as the server was down at the time of their analysis, but the potential for risky operations is high.
To defend against this threat, Trustwave recommends deleting registry entries associated with the search-ms/search URI protocol by executing the following commands:

reg delete HKEYCLASSESROOTsearch /f
reg delete HKEYCLASSESROOTsearch-ms /f

However, this should be done carefully, as it would also prevent legitimate applications and integrated Windows features that rely on this protocol, from working as intended.

Winsage
Phishing emails abuse Windows search protocol to push malicious scripts