MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d747ef417490620d91d0f64262469fb8996cce9e0031fcc319fc4a0a39962dce. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 9


Maldoc score: 31


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: d747ef417490620d91d0f64262469fb8996cce9e0031fcc319fc4a0a39962dce
SHA3-384 hash: 26adf1d314afd0408423940385892d3ab1997cc6d2d71588da2c3b678b4402ed81ec64df2101bd9e91e80d9592e4ae43
SHA1 hash: 72e62af22be5369a84eee71f21c65fb5b670b39b
MD5 hash: 42cc3283b70db3120b8cd82cb2eb2a27
humanhash: quebec-winner-papa-utah
File name:d747ef417490620d91d0f64262469fb8996cce9e0031fcc319fc4a0a39962dce.doc
Download: download sample
File size:60'928 bytes
First seen:2021-11-15 23:17:31 UTC
Last seen:Never
File type:Word file doc
MIME type:application/msword
ssdeep 768:g5K+XHajz5Dfxz9930jmoiAhNLEAqCGhH68:EK+XHI9Df3VDobBLCha8
TLSH T141539401B785EA27E0684A341CEBC2EE7734FC4AAE91C7173284771FBC752A45E16B85
Reporter Arkbird_SOLG
Tags:APT37 doc maldoc

Office OLE Information


This malware samples appears to be an Office document. The following table provides more information about this document using oletools and oledump.

OLE id
Maldoc score: 31
OLE dump

MalwareBazaar was able to identify 17 sections in this file using oledump:

Section IDSection sizeSection name
1110 bytesCompObj
24096 bytesDocumentSummaryInformation
34096 bytesSummaryInformation
48625 bytes1Table
54096 bytesData
6373 bytesMacros/PROJECT
741 bytesMacros/PROJECTwm
813464 bytesMacros/VBA/ThisDocument
94094 bytesMacros/VBA/_VBA_PROJECT
102821 bytesMacros/VBA/__SRP_0
11859 bytesMacros/VBA/__SRP_1
121458 bytesMacros/VBA/__SRP_2
131002 bytesMacros/VBA/__SRP_3
14523 bytesMacros/VBA/dir
15216 bytesMsoDataStore/PDZ5E4NTDXO==/Item
16341 bytesMsoDataStore/PDZ5E4NTDXO==/Properties
178250 bytesWordDocument
OLE vba

MalwareBazaar was able to extract and deobfuscate VBA script(s) the following information from OLE objects embedded in this file using olevba:

TypeKeywordDescription
AutoExecDocument_OpenRuns when the Word or Publisher document is opened
IOCkernel32.dllExecutable file name
IOCrokrat.exeExecutable file name
SuspiciousEnvironMay read system environment variables
SuspiciousOpenMay open a file
SuspiciousWriteMay write to a file (if combined with Open)
Suspiciousadodb.streamMay create a text file
SuspiciousSaveToFileMay create a text file
SuspiciousshellMay run an executable file or a system command
SuspiciousWScript.shellMay run an executable file or a system command
SuspiciousSW_HideMay hide the application
SuspiciousCreateObjectMay create an OLE object
SuspiciousLibMay run code from a DLL
SuspiciousVirtualAllocExMay inject code into another process
SuspiciousRtlMoveMemoryMay inject code into another process
SuspiciousWriteProcessMemoryMay inject code into another process
SuspiciousMSXML2.serverXMLHTTPMay download files from the Internet
SuspiciousAccessVBOMMay attempt to disable VBA macro security and Protected View

Intelligence


File Origin
# of uploads :
1
# of downloads :
187
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
d747ef417490620d91d0f64262469fb8996cce9e0031fcc319fc4a0a39962dce.doc
Verdict:
No threats detected
Analysis date:
2021-11-15 23:09:49 UTC
Tags:
macros macros-on-open

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
File type:
application/msword
Has a screenshot:
False
Contains macros:
True
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
DNS request
Sending a UDP request
Creating a file in the %temp% directory
Creating a process with a hidden window
Creating a file
Connection attempt
Sending an HTTP GET request
Sending a custom TCP request
Running batch commands
Deleting a recently created file
Connection attempt by exploiting the app vulnerability
Sending a custom TCP request by exploiting the app vulnerability
Creating a process from a recently created file
Result
Verdict:
Malicious
File Type:
Legacy Word File with Macro
Payload URLs
URL
File name
https://bit.ly/3jLzRoh
ThisDocument
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive greyware macros macros-on-open packed
Result
Verdict:
MALICIOUS
Details
Macro with Startup Hook
Detected macro logic that will automatically execute on document open. Most malware contains some execution hook.
Document With Few Pages
Document contains between one and three pages of content. Most malicious documents are sparse in page count.
Macro with File System Write
Detected macro logic that can write data to the file system.
Macro Contains Suspicious String
Detected a macro with a suspicious string. Suspicious strings include privileged function calls, obfuscations, odd registry keys, etc...
Suspicious URL
Macro contails a suspicious URL to a Tor .onion services, URL shortening services, or file upload provider.
Macro with DLL Reference
Detected macro logic that will load additional functionality from Dynamically Linked Libraries (DLLs). While not explicitly malicious, this is a common tactic for accessing APIs that are not otherwised exposed via Visual Basic for Applications (VBA).
Document With Minimal Content
Document contains less than 1 kilobyte of semantic information.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
expl
Score:
100 / 100
Signature
Document contains an embedded VBA macro which may execute processes
Document contains an embedded VBA macro with suspicious strings
Document contains an embedded VBA with functions possibly related to ADO stream file operations
Document contains an embedded VBA with functions possibly related to HTTP operations
Document contains an embedded VBA with functions possibly related to WSH operations (process, registry, environment, or keystrokes)
Document exploit detected (creates forbidden files)
Document exploit detected (drops PE files)
Document exploit detected (process start blacklist hit)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Office process drops PE file
Sigma detected: MS Office Product Spawning Exe in User Dir
Behaviour
Behavior Graph:
Threat name:
Script-Macro.Trojan.Amphitryon
Status:
Malicious
First seen:
2021-11-15 23:18:08 UTC
AV detection:
14 of 27 (51.85%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
macro macro_on_action pyinstaller
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Script User-Agent
Suspicious behavior: AddClipboardFormatListener
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Office loads VBA resources, possible macro or embedded object present
Detects Pyinstaller
Legitimate hosting services abused for malware hosting/C2
Loads dropped DLL
Downloads MZ/PE file
Executes dropped EXE
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments