Step 2 : Once executed, the PPSX file will call a pre-programmed XML file in which to download the logo.doc file from the remote address and run it through the PowerPoint Show feature.
Step 3 : The logo file.doc will exploit the CVE-2017-0199 vulnerability, load and execute RATMAN.exe on the target system.
Step 4 : RATMAN.exe is a trojan version of Remcos Remote Control tool, when installed, will allow an attacker to control the infected computer from a remote C&C server.
Remcos is a legitimate tool but hackers create trojans
Remcos is a legally customizable remote access tool and allows users to control their system from anywhere in the world with certain capabilities, such as loading, executing command lines, recording table activity keys, screen and record webcam images as well as microphones.
Because the vulnerability used to get Rich Text File (RTF) is poisoned, most detection methods CVE-2017-0199 focus on RTF. Using the new PPSX file also allows an attacker to bypass the virus detection tool.
The easiest way to prevent you from this type of attack is to download a Microsoft patch that was released in April at this address.https://portal.msrc.microsoft.com/en-US/eula