MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3f3db971f1d2721ac273e60fb9b0e172bb635f8f5e7889eaf9fc59d61edd5ddc. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Maldoc score: 26


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 3f3db971f1d2721ac273e60fb9b0e172bb635f8f5e7889eaf9fc59d61edd5ddc
SHA3-384 hash: 586417ed5741f7b1081de00ef761c0d8aa4894422b0f46a0e722de8b79f4c494b15e300465ae4571dd695c60639b20c6
SHA1 hash: cedbff948ac1744587f33d18415f018172f984c4
MD5 hash: baadccb9fec9f54c22eba25a15d0b484
humanhash: maine-seven-fourteen-six
File name:#TransparentTribe #DropperScript.bin
Download: download sample
File size:2'639'872 bytes
First seen:2021-09-08 12:08:48 UTC
Last seen:Never
File type:Excel file xlsx
MIME type:application/vnd.ms-excel
ssdeep 24576:ccTaNK89+w2av+5RbC5uN0aqIL14yJf0lst9q2YYrcTo3InzidTZR05hlF0tdM+M:ul2PPqePiKuTo4nGdTLI/xMSRO
TLSH T1F6C5AE978AA60F8DF8070DB2797B67D8004F2E46405AE7AB670EF63B40778EDE065D14
Reporter KodaES
Tags:DropperScript TransparentTribe xlsx


Avatar
KodaES
https://www.virustotal.com/gui/file/3f3db971f1d2721ac273e60fb9b0e172bb635f8f5e7889eaf9fc59d61edd5ddc/detection
https://app.any.run/tasks/41c64dde-acfb-423a-8036-fa2c57e0943e#


https://twitter.com/Timele9527/status/1435495701329317895?s=20

Office OLE Information


This malware samples appears to be an Office document. The following table provides more information about this document using oletools and oledump.

OLE id
Maldoc score: 26
Application name is Microsoft Excel
Office document is in OLE format
Office document contains VBA Macros
OLE dump

MalwareBazaar was able to identify 20 sections in this file using oledump:

Section IDSection sizeSection name
1107 bytesCompObj
2224 bytesDocumentSummaryInformation
3200 bytesSummaryInformation
4671748 bytesWorkbook
5648 bytes_VBA_PROJECT_CUR/PROJECT
6143 bytes_VBA_PROJECT_CUR/PROJECTwm
7977 bytes_VBA_PROJECT_CUR/VBA/Sheet1
81400 bytes_VBA_PROJECT_CUR/VBA/ThisWorkbook
94820 bytes_VBA_PROJECT_CUR/VBA/_VBA_PROJECT
101775 bytes_VBA_PROJECT_CUR/VBA/__SRP_0
11195 bytes_VBA_PROJECT_CUR/VBA/__SRP_1
12214 bytes_VBA_PROJECT_CUR/VBA/__SRP_2
13638 bytes_VBA_PROJECT_CUR/VBA/__SRP_3
14889 bytes_VBA_PROJECT_CUR/VBA/dir
1537580 bytes_VBA_PROJECT_CUR/VBA/xxx01xxxmx01
161515 bytes_VBA_PROJECT_CUR/VBA/xxx01xxxwxx01
1797 bytes_VBA_PROJECT_CUR/xxx01xxxwxx01/CompObj
18292 bytes_VBA_PROJECT_CUR/xxx01xxxwxx01/VBFrame
19147 bytes_VBA_PROJECT_CUR/xxx01xxxwxx01/f
201888284 bytes_VBA_PROJECT_CUR/xxx01xxxwxx01/o
OLE vba

MalwareBazaar was able to extract and deobfuscate VBA script(s) the following information from OLE objects embedded in this file using olevba:

TypeKeywordDescription
AutoExecWorkbook_OpenRuns when the Excel Workbook is opened
AutoExectwotxt_ChangeRuns when the file is opened and ActiveX objects trigger events
SuspiciousEnvironMay read system environment variables
SuspiciousOpenMay open a file
SuspiciousWriteMay write to a file (if combined with Open)
SuspiciousCreateTextFileMay create a text file
SuspiciousADODB.StreamMay create a text file
SuspiciousSaveToFileMay create a text file
SuspiciousRunMay run an executable file or a system command
SuspiciousCreateObjectMay create an OLE object
SuspiciousChrMay attempt to obfuscate specific strings (use option --deobf to deobfuscate)
SuspiciousXorMay attempt to obfuscate specific strings (use option --deobf to deobfuscate)
SuspiciousHex StringsHex-encoded strings were detected, may be used to obfuscate strings (option --decode to see all)
SuspiciousBase64 StringsBase64-encoded strings were detected, may be used to obfuscate strings (option --decode to see all)

Intelligence


File Origin
# of uploads :
1
# of downloads :
129
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
Dropper.Script.doc
Verdict:
Malicious activity
Analysis date:
2021-09-08 11:53:17 UTC
Tags:
macros macros-on-open

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Legit
File type:
application/vnd.openxmlformats-officedocument.spreadsheetml.sheet
Has a screenshot:
False
Contains macros:
True
Result
Verdict:
Clean
Maliciousness:

Behaviour
Sending a custom TCP request
Creating a window
Creating a file in the %AppData% directory
Delayed writing of the file
Sending a UDP request
Result
Verdict:
Malicious
File Type:
Legacy Excel File with Macro
Result
Verdict:
MALICIOUS
Details
Macro with Startup Hook
Detected macro logic that will automatically execute on document open. Most malware contains some execution hook.
Macro with File System Write
Detected macro logic that can write data to the file system.
Document With Minimal Content
Document contains less than 1 kilobyte of semantic information.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
expl.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Contains functionality to detect sleep reduction / modifications
Creates multiple autostart registry keys
Document contains an embedded VBA macro which may execute processes
Document contains an embedded VBA macro with suspicious strings
Document contains an embedded VBA with functions possibly related to ADO stream file operations
Document contains an embedded VBA with many string operations indicating source code obfuscation
Document exploit detected (process start blacklist hit)
Drops PE files with benign system names
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: MS Office Product Spawning Exe in User Dir
Sigma detected: System File Execution Location Anomaly
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 479797 Sample: #TransparentTribe #DropperS... Startdate: 08/09/2021 Architecture: WINDOWS Score: 100 25 145.14.145.55, 49224, 80 AWEXUS Netherlands 2->25 27 www.google.com.pk 2->27 29 2 other IPs or domains 2->29 51 Antivirus / Scanner detection for submitted sample 2->51 53 Multi AV Scanner detection for submitted file 2->53 55 Sigma detected: MS Office Product Spawning Exe in User Dir 2->55 57 7 other signatures 2->57 8 EXCEL.EXE 141 13 2->8         started        10 csrss.exe 12 2->10         started        13 csrss.exe 9 2->13         started        signatures3 process4 dnsIp5 15 msword.exe 10 8->15         started        37 www.google.com.pk 10->37 39 us-east-1.route-1.000webhost.awex.io 10->39 41 fiberxwashin.000webhostapp.com 10->41 43 www.google.com.pk 13->43 45 us-east-1.route-1.000webhost.awex.io 13->45 47 fiberxwashin.000webhostapp.com 13->47 process6 file7 23 C:\Users\user\AppData\Roaming\...\csrss.exe, PE32 15->23 dropped 49 Drops PE files with benign system names 15->49 19 csrss.exe 2 10 15->19         started        signatures8 process9 dnsIp10 31 www.google.com.pk 142.250.102.94, 49168, 49169, 49170 GOOGLEUS United States 19->31 33 145.14.144.117, 49172, 49173, 49179 AWEXUS Netherlands 19->33 35 7 other IPs or domains 19->35 59 Antivirus detection for dropped file 19->59 61 Multi AV Scanner detection for dropped file 19->61 63 Creates multiple autostart registry keys 19->63 65 Contains functionality to detect sleep reduction / modifications 19->65 signatures11
Threat name:
Script-Macro.Trojan.Sadoca
Status:
Malicious
First seen:
2021-07-04 15:56:25 UTC
AV detection:
12 of 46 (26.09%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
discovery persistence
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Office loads VBA resources, possible macro or embedded object present
Enumerates physical storage devices
Adds Run key to start application
Checks installed software on the system
Loads dropped DLL
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments