Stages and opens a macro-enabled Word document. The macro loads Operator network config facts from a previously staged file, then executes mshta.exe to run a malicious HTA file hosted on Operator. The HTA then downloads and executes a seconardy Pneuma agent.
View Command
To view this TTPs command, you must be logged in with a professional or enterprise license.