
If this final step has failed and you're still encountering the error, you're only remaining option is to do a clean installation of Windows 10. The second stage is downloaded from hXXps://jazy.Windows 10: C:\MSOCache\All Users\-C\ Windows Vista: C:\Program Files (x86)\Common Files\microsoft shared\OFFICE12\Office Setup Controller\Office.en-us\ Windows XP: C:\Program Files\Microsoft Office\OFFICE11\1033\ In the malicious directory, we find now the name of the original file. chm file into a folder: C:\Users\xavier\Desktop> hh.exe -decompile malicious NF-e_DANFE41160909448706kPEvjg.chm It is easy to understand what is happening but is there a way to better analyze the content of the compiled HTML help file? hh.exe has a flag ‘-decompile’ which, as the name says, decompile the. A command line prompt is launched with a Powershell script: When the file is opened, the default tool, hh.exe, is used and displays a blank page. It can store a number of HTML files in a compressed, binary format and is popular because its compatibility with any web browser (some compiled HTML files can only be opened by a CHM editor/viewer).

The file reached my spam trap and was delivered in a ZIP archive: NF_e_DANFE41160909448706.zip (SHA256: f66964e733651d78593d593e2bd83913b6499fa80532abce64e07a91293eb12d). Compiled HTML Files are a popular format for storing software documentation and help documents. By external resources, I mean here malicious scripts or executables. It can be viewed in a Web browser in programs as an online help solution or by Windows via a specific tool: hh.exe.Īs most Microsoft file formats, it may also link to external resources that can be launched from the HTML file. chm file is a compiled HTML help file that may include text, images, and hyperlinks. Like fashion is in a state of perpetual renewal, some files are regularly coming back on the malware scene.

That’s why attackers are constantly looking for new ways to infect computers and use more exotic file formats. More a file format is used in a malware infection chain, more files of this type will be flagged as suspicious, analyzed or blocked by security controls.
