Attackers exploit MSC files by crafting malicious files that, when opened, trigger a vulnerability in the Microsoft Management Console (MMC) libraries, leading to arbitrary code execution. This technique, dubbed GrimResource, leverages a cross-site scripting (XSS) flaw in the apds.dll library to execute arbitrary JavaScript code within the context of MMC. By combining this with the DotNetToJScript technique, attackers can bypass security measures and gain code execution, potentially leading to unauthorized access or system takeover.
GrimResource is a novel attack technique discovered by Elastic Security Labs that leverages specially crafted management saved console (MSC) files to gain full code execution using Microsoft Management Console (MMC) and evade security defenses4. It exploits a cross-site scripting (XSS) flaw present in the apds.dll library to execute arbitrary JavaScript code in the context of MMC, bypassing ActiveX warnings. This technique can be combined with DotNetToJScript to gain arbitrary code execution, leading to potential system takeover and unauthorized access.