MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 23b1742fd1b7609da250fa845edc4583c3445c6f38d19d7c87cf729f56f33470. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 6


Intelligence 6 IOCs YARA 2 File information Comments

SHA256 hash: 23b1742fd1b7609da250fa845edc4583c3445c6f38d19d7c87cf729f56f33470
SHA3-384 hash: acb60938016eb2934258d3adca6ca9834ecce71da2801576b9ecb8ac9f0d81f278b7e2e456f5e99d2935c9007489a645
SHA1 hash: a9dd788016e7d9acbe94d81f2d67d08661f91ce8
MD5 hash: 4384c120462d059e7c184a98f771836a
humanhash: gee-six-romeo-fillet
File name:ROLP0967_1113398095.doc
Download: download sample
Signature TrickBot
File size:389'294 bytes
First seen:2020-08-14 07:01:31 UTC
Last seen:Never
File type:Word file doc
MIME type:application/vnd.openxmlformats-officedocument.wordprocessingml.document
ssdeep 6144:afmiTtzVxuWiyKMUsTn8XBlKqqUY1BaE8D7h6JDAm30QWIOtfXuu4MCUlmoykTH4:afmYtz7uW7VgmUYSDevEbIOE7gFywyqc
TLSH CC84234FE84068E3F89F467DC7345415FB2CEAC6813BB6D735D550EAA2A2486DE2B00D
Reporter abuse_ch
Tags:doc ono62 TrickBot


Avatar
abuse_ch
Malspam distributing TrickBot:

HELO: smtp.mycom.world
Sending IP: 52.88.112.238
From: Adrien Voss <spedizioni@veloce.vip>
Reply-To: Adrien Voss <spedizioni@veloce.vip>
Subject: Overdue invoice reminder
Attachment: ROLP0967_1113398095.doc

TrickBot payload URL:
http://anikastyle.com/ram2base.php

Intelligence


File Origin
# of uploads :
1
# of downloads :
253
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Creating a file
Creating a process with a hidden window
Delayed writing of the file
Running batch commands
Using the Windows Management Instrumentation requests
Searching for the window
Launching a process
DNS request
Sending an HTTP GET request
Creating a file in the %temp% directory
Deleting a recently created file
Possible injection to a system process
Launching a tool to kill processes
Unauthorized injection to a system process
Launching a process by exploiting the app vulnerability
Creating a process from a recently created file
Result
Threat name:
Unknown
Detection:
malicious
Classification:
expl.evad
Score:
80 / 100
Signature
Document contains an embedded macro with GUI obfuscation
Document contains an embedded VBA macro which may execute processes
Document contains an embedded VBA macro with suspicious strings
Document exploit detected (creates forbidden files)
Document exploit detected (process start blacklist hit)
Machine Learning detection for sample
Microsoft Office drops suspicious files
PowerShell case anomaly found
Wscript starts Powershell (via cmd or directly)
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 266884 Sample: ROLP0967_1113398095.doc Startdate: 15/08/2020 Architecture: WINDOWS Score: 80 42 Document contains an embedded macro with GUI obfuscation 2->42 44 Machine Learning detection for sample 2->44 46 Document contains an embedded VBA macro with suspicious strings 2->46 48 2 other signatures 2->48 8 explorer.exe 5 2->8         started        10 WINWORD.EXE 223 68 2->10         started        process3 file4 14 wscript.exe 3 8->14         started        32 C:\ProgramData\Portes.vbs, Non-ISO 10->32 dropped 34 C:\ProgramData\Kerpok.vbs, ASCII 10->34 dropped 54 Document exploit detected (creates forbidden files) 10->54 56 Document exploit detected (process start blacklist hit) 10->56 58 Microsoft Office drops suspicious files 10->58 18 explorer.exe 10->18         started        signatures5 process6 file7 36 C:behaviorgraphame_Lodsbehaviorgraphroters.cmd, ISO-8859 14->36 dropped 60 Wscript starts Powershell (via cmd or directly) 14->60 20 cmd.exe 1 14->20         started        signatures8 process9 signatures10 50 Wscript starts Powershell (via cmd or directly) 20->50 52 PowerShell case anomaly found 20->52 23 powershell.exe 14 20 20->23         started        26 taskkill.exe 1 20->26         started        28 conhost.exe 20->28         started        30 timeout.exe 1 20->30         started        process11 dnsIp12 38 anikastyle.com 119.18.54.23, 49733, 49734, 80 PUBLIC-DOMAIN-REGISTRYUS India 23->38 40 www.anikastyle.com 23->40
Threat name:
Document-Office.Trojan.Powload
Status:
Malicious
First seen:
2020-08-14 05:37:00 UTC
AV detection:
17 of 28 (60.71%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
dave
Behaviour
Delays execution with timeout.exe
Kills process with taskkill
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Checks processor information in registry
Delays execution with timeout.exe
Enumerates system info in registry
Kills process with taskkill
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Office loads VBA resources, possible macro or embedded object present
Drops file in System32 directory
Looks up external IP address via web service
Blacklisted process makes network request
Dave packer
Executes dropped EXE
Blacklisted process makes network request
Dave packer
Executes dropped EXE
Process spawned unexpected child process
Process spawned unexpected child process
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:ach_Quakbot_doc_20200812_2
Author:abuse.ch
Description:Detects Quakbot DOC
Rule name:SharedStrings
Author:Katie Kleemola
Description:Internal names found in LURK0/CCTV0 samples

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

TrickBot

Word file doc 23b1742fd1b7609da250fa845edc4583c3445c6f38d19d7c87cf729f56f33470

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments