MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 330f1da454bce0a5b16245971a404c629ebe272524dc01ce46605556cd15191b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



BazaLoader


Vendor detections: 9


Maldoc score: 7


Intelligence 9 IOCs YARA 3 File information Comments

SHA256 hash: 330f1da454bce0a5b16245971a404c629ebe272524dc01ce46605556cd15191b
SHA3-384 hash: 8c551d123cb1d47820caefb6d7ee7fe22ac998fa96c3239445b5908138a68c1c876b8c2339c6d2a3ac35aec98efba174
SHA1 hash: 137b8545b213800a6f77707164b802919783ff55
MD5 hash: 1be8b302f6b5feee7016ff145ee4e29a
humanhash: cola-lake-beryllium-zulu
File name:ordain 09.21.doc
Download: download sample
Signature BazaLoader
File size:71'168 bytes
First seen:2021-09-13 15:58:29 UTC
Last seen:2021-09-13 22:05:46 UTC
File type:Word file doc
MIME type:application/msword
ssdeep 768:aNDXtNN5Q0AdaS/lAVQirXvxiuW0utxYZAVlTvo+1o9KWBRPt10V6:a1Qtdt2Vi9xxKAVK+a9HBX10V6
TLSH T1F0636C02B265CD22F9698A365DE7C3993B3A7E814F15CB033158BB1D7D721B48E17A23
Reporter AndreGironda
Tags:BazaLoader doc


Avatar
AndreGironda
MITRE T1566.001
Date: Mon, 13 Sep 2021 14:00-14:30 +0000
Received: from [69.12.121.22]
From: linda.jahnke@jcltca.com
Subject: <thread hijacking>
Message-ID: <996cc9d5ee9511a8092c4f13ee6c807c@127.0.0.1>
X-Mailer: sSMTP
References: <1439496770.763390.1618275620533@mail.yahoo.com>
In-Reply-To: <1439496770.763390.1618275620533@mail.yahoo.com>
Attachment Name: request.zip
Attachment SHA256: f692de5772c7123c84cbcf3cbd8177e321b2e6252b25491f91126c432bc6bb87

Hello ,

The important information for you. See the attachment to the email.

Password - ghjuik44

Office OLE Information


This malware samples appears to be an Office document. The following table provides more information about this document using oletools and oledump.

OLE id
Maldoc score: 7
Application name is Microsoft Office Word
Office document is in OLE format
Office document contains VBA Macros
OLE dump

MalwareBazaar was able to identify 16 sections in this file using oledump:

Section IDSection sizeSection name
1114 bytesCompObj
24096 bytesDocumentSummaryInformation
34096 bytesSummaryInformation
47398 bytes1Table
527981 bytesData
6404 bytesMacros/PROJECT
762 bytesMacros/PROJECTwm
81349 bytesMacros/VBA/ThisDocument
92930 bytesMacros/VBA/_VBA_PROJECT
101825 bytesMacros/VBA/__SRP_0
11182 bytesMacros/VBA/__SRP_1
12532 bytesMacros/VBA/__SRP_2
13156 bytesMacros/VBA/__SRP_3
14715 bytesMacros/VBA/dir
151653 bytesMacros/VBA/pwCurr
1611310 bytesWordDocument
OLE vba

MalwareBazaar was able to extract and deobfuscate VBA script(s) the following information from OLE objects embedded in this file using olevba:

TypeKeywordDescription
AutoExecdocument_openRuns when the Word or Publisher document is opened
SuspiciousOpenMay open a file
SuspiciousOutputMay write to a file (if combined with Open)
SuspiciousexecMay run an executable file or a system

Intelligence


File Origin
# of uploads :
3
# of downloads :
154
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
ordain 09.21.doc
Verdict:
Malicious activity
Analysis date:
2021-09-13 15:09:07 UTC
Tags:
macros macros-on-open generated-doc

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
File type:
application/msword
Has a screenshot:
False
Contains macros:
True
Result
Verdict:
Malicious
File Type:
Legacy Word File with Macro
Document image
Document image
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
macros macros-on-open mshta regsvr32
Result
Verdict:
MALICIOUS
Details
Suspicious XMP Identifier
This file contains an image with an Adobe XMP GUID that InQuest tracks as suspicious.
Macro with Startup Hook
Detected macro logic that will automatically execute on document open. Most malware contains some execution hook.
Document With Few Pages
Document contains between one and three pages of content. Most malicious documents are sparse in page count.
Macro with File System Write
Detected macro logic that can write data to the file system.
Macro Execution Coercion
Detected a document that appears to social engineer the user into activating embedded logic.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
expl.evad
Score:
84 / 100
Signature
Document contains an embedded VBA macro which may execute processes
Document exploit detected (process start blacklist hit)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Sigma detected: MSHTA Spawning Windows Shell
Sigma detected: Register DLL with spoofed extension
Sigma detected: Regsvr32 Anomaly
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 482396 Sample: ordain 09.21.doc Startdate: 13/09/2021 Architecture: WINDOWS Score: 84 20 Multi AV Scanner detection for submitted file 2->20 22 Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros) 2->22 24 Sigma detected: Register DLL with spoofed extension 2->24 26 5 other signatures 2->26 7 explorer.exe 3 2->7         started        9 WINWORD.EXE 41 44 2->9         started        process3 process4 11 mshta.exe 21 7->11         started        14 explorer.exe 9->14         started        dnsIp5 18 marksvelvetg.com 194.62.42.204, 49739, 80 ZEISS-ASRU Russian Federation 11->18 16 regsvr32.exe 11->16         started        process6
Threat name:
Document-Excel.Trojan.Valyria
Status:
Malicious
First seen:
2021-09-13 15:59:11 UTC
AV detection:
23 of 45 (51.11%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
macro xlm
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Office loads VBA resources, possible macro or embedded object present
Program crash
Drops file in Windows directory
Process spawned unexpected child process
Suspicious use of NtCreateProcessExOtherParentProcess
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:INDICATOR_DOC_PhishingPatterns
Author:ditekSHen
Description:Detects OLE, RTF, PDF and OOXML (decompressed) documents with common phishing strings
Rule name:SUSP_EnableContent_String_Gen
Author:Florian Roth
Description:Detects suspicious string that asks to enable active content in Office Doc
Reference:Internal Research
Rule name:SUSP_EnableContent_String_Gen_RID322C
Author:Florian Roth
Description:Detects suspicious string that asks to enable active content in Office Doc
Reference:Internal Research

File information


The table below shows additional information about this malware sample such as delivery method and external references.

f692de5772c7123c84cbcf3cbd8177e321b2e6252b25491f91126c432bc6bb87

BazaLoader

Word file doc 330f1da454bce0a5b16245971a404c629ebe272524dc01ce46605556cd15191b

(this sample)

  
Dropped by
SHA256 f692de5772c7123c84cbcf3cbd8177e321b2e6252b25491f91126c432bc6bb87
  
Delivery method
Distributed via e-mail attachment

Comments