MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0289ee3c551ba84d34ab1760d042ab420733d96dbfedfae9718f8eb138c3259b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 0289ee3c551ba84d34ab1760d042ab420733d96dbfedfae9718f8eb138c3259b
SHA3-384 hash: 2b43dff71a8652da6e1c9cfee2b79fd9aa6190f20ac52a07774b11fe92db65fef46c86b8ea35903d604a5be3356985b4
SHA1 hash: 53fecb422d1b1663e4a9aec9f5a3a020e818a6f9
MD5 hash: 1dadb4c3fe45566d28b7156be2e2aa6b
humanhash: west-moon-september-mars
File name:PO#00187.ppt
Download: download sample
File size:136'192 bytes
First seen:2021-02-25 14:51:34 UTC
Last seen:2021-02-25 16:47:15 UTC
File type:PowerPoint file ppt
MIME type:application/vnd.ms-powerpoint
ssdeep 1536:FslfQ+C4xIytrmsKemd8JkpuJFeOMn63nMq5Z+av1Dc3Y:FsV7rmsKemuJkpuJtE6cq5BpmY
TLSH 34D319857140D325C1640C3AACAFA6FF23397D88ECA59B1732AF77AE1D3671C6284791
Reporter cocaman
Tags:ppt


Avatar
cocaman
Malicious email (T1566.001)
From: "Sales<noreply@sakhemailmarkerting.life>" (likely spoofed)
Received: "from mail.sakhemailmarkerting.life (mail.sakhemailmarkerting.life [143.198.20.94]) "
Date: "26 Feb 2021 03:33:05 +1300"
Subject: "=?UTF-8?B?562U5aSNOlJFOiBbSVRfUHJvZm9ybWEgaW52b2ljZV0gTkVXIE9SREVS?="
Attachment: "PO#00187.ppt"

Intelligence


File Origin
# of uploads :
2
# of downloads :
211
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
PO#00187.ppt
Verdict:
No threats detected
Analysis date:
2021-02-25 14:54:07 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Result
Verdict:
Malicious
File Type:
Legacy PowerPoint File with Macro
Result
Verdict:
MALICIOUS
Details
Macro Contains Suspicious String
Detected a macro with a suspicious string. Suspicious strings include privileged function calls, obfuscations, odd registry keys, etc...
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
Connects to a URL shortener service
Creates a scheduled task launching mshta.exe (likely to bypass HIPS)
Creates an autostart registry key pointing to binary in C:\Windows
Creates autostart registry keys with suspicious values (likely registry only malware)
Creates multiple autostart registry keys
Document contains an embedded VBA with many GOTO operations indicating source code obfuscation
Document contains an embedded VBA with many randomly named variables
Document exploit detected (process start blacklist hit)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Sigma detected: Microsoft Office Product Spawning Windows Shell
Sigma detected: MSHTA Spawning Windows Shell
Sigma detected: Powershell execute code from registry
Sigma detected: Schedule script from internet via mshta
Uses ping.exe to check the status of other devices and networks
Uses schtasks.exe or at.exe to add and modify task schedules
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 358430 Sample: PO#00187.ppt Startdate: 25/02/2021 Architecture: WINDOWS Score: 100 71 www.blogger.com 2->71 73 startthepartyup.blogspot.com 2->73 75 6 other IPs or domains 2->75 105 Multi AV Scanner detection for submitted file 2->105 107 Sigma detected: Powershell execute code from registry 2->107 109 Sigma detected: Schedule script from internet via mshta 2->109 111 9 other signatures 2->111 10 cmd.exe 1 2->10         started        12 taskeng.exe 1 2->12         started        14 mshta.exe 2->14         started        16 5 other processes 2->16 signatures3 process4 process5 18 POWERPNT.EXE 10 19 10->18         started        21 mshta.exe 1 12->21         started        23 mshta.exe 14->23         started        26 powershell.exe 16->26         started        28 mshta.exe 16->28         started        30 mshta.exe 16->30         started        dnsIp6 103 Document exploit detected (process start blacklist hit) 18->103 32 mshta.exe 11 29 18->32         started        36 WINWORD.EXE 285 6 18->36         started        38 PING.EXE 18->38         started        40 mshta.exe 28 21->40         started        77 www.blogger.com 23->77 83 2 other IPs or domains 23->83 42 powershell.exe 23->42         started        85 2 other IPs or domains 26->85 79 www.blogger.com 28->79 87 2 other IPs or domains 28->87 81 www.blogger.com 30->81 89 2 other IPs or domains 30->89 signatures7 process8 dnsIp9 57 j.mp 67.199.248.16, 49165, 80 GOOGLE-PRIVATE-CLOUDUS United States 32->57 59 blogspot.l.googleusercontent.com 142.250.184.97, 443, 49166, 49174 GOOGLEUS United States 32->59 69 3 other IPs or domains 32->69 95 Creates autostart registry keys with suspicious values (likely registry only malware) 32->95 97 Creates multiple autostart registry keys 32->97 99 Creates an autostart registry key pointing to binary in C:\Windows 32->99 101 Creates a scheduled task launching mshta.exe (likely to bypass HIPS) 32->101 44 powershell.exe 12 7 32->44         started        47 cmd.exe 32->47         started        49 schtasks.exe 32->49         started        61 www.blogger.com 40->61 63 randikhanaekminar.blogspot.com 40->63 51 powershell.exe 40->51         started        65 onedrive.linkpc.net 42->65 67 ia601508.us.archive.org 42->67 signatures10 process11 dnsIp12 91 ia601508.us.archive.org 207.241.227.118, 443, 49176, 49185 INTERNET-ARCHIVEUS United States 44->91 93 onedrive.linkpc.net 192.254.74.210, 49175, 49184, 49186 BIGBRAINUS United States 44->93 53 taskkill.exe 47->53         started        55 taskkill.exe 47->55         started        process13
Threat name:
Script-Macro.Trojan.Heuristic
Status:
Malicious
First seen:
2021-02-25 14:52:07 UTC
File Type:
Binary (Archive)
Extracted files:
12
AV detection:
11 of 29 (37.93%)
Threat level:
  2/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
macro xlm
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

PowerPoint file ppt 0289ee3c551ba84d34ab1760d042ab420733d96dbfedfae9718f8eb138c3259b

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments