MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 ecd84fa8d836d5057149b2b3a048d75004ca1a1377fcf2f5e67374af3a1161a0. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



IcedID


Vendor detections: 11


Maldoc score: 7


Intelligence 11 IOCs YARA File information Comments 1

SHA256 hash: ecd84fa8d836d5057149b2b3a048d75004ca1a1377fcf2f5e67374af3a1161a0
SHA3-384 hash: 606a26837c052d18f9734d7ab8a3b8c924559895f9b0799623296cd04d0c9ccb7656b7b471230eff1b9cc9590703bf9b
SHA1 hash: 745cdbc4a826c5960eef3f4a9aa307ff94e4b7fb
MD5 hash: 7044bd240219ec2f83b01c532e2ce5ba
humanhash: victor-green-football-one
File name:enjoin,12.27.2021.doc
Download: download sample
Signature IcedID
File size:79'360 bytes
First seen:2021-12-31 11:08:54 UTC
Last seen:Never
File type:Word file doc
MIME type:application/msword
ssdeep 768:P/MMM1tMFur3Be1l3Jeq1awypEuqjuy+uqezc1GFZIdJ6jtQlQNBOTHxPIz/tZj8:Zja8IdPhW/jTEQMiebld4Kkd6t
TLSH T19C7329B57193DD9EF4800D385E46E290EAB83C654D05D8C376F37B0E98B12B499ABE13
Reporter @pr0xylife
Tags:doc IcedID

Office OLE Information


This malware samples appears to be an Office document. The following table provides more information about this document using oletools and oledump.

OLE id
Maldoc score: 7
OLE dump
Sections: 16

The following OLE sections have been found using oledump:

Section IDSection sizeSection name
1114 bytesCompObj
24096 bytesDocumentSummaryInformation
34096 bytesSummaryInformation
47224 bytes1Table
526648 bytesData
6398 bytesMacros/PROJECT
756 bytesMacros/PROJECTwm
82420 bytesMacros/VBA/ThisDocument
92896 bytesMacros/VBA/_VBA_PROJECT
101708 bytesMacros/VBA/__SRP_0
11241 bytesMacros/VBA/__SRP_1
12983 bytesMacros/VBA/__SRP_2
13364 bytesMacros/VBA/__SRP_3
14553 bytesMacros/VBA/dir
151103 bytesMacros/VBA/main
1619522 bytesWordDocument
OLE vba
TypeKeywordDescription
AutoExecDocument_OpenRuns when the Word or Publisher document is opened
SuspiciousCreateObjectMay create an OLE object
SuspiciousexecMay run an executable file or a system
SuspiciousBase64 StringsBase64-encoded strings were detected, may be used to obfuscate strings (option --decode to see all)

Intelligence


File Origin
# of uploads :
1
# of downloads :
469
Origin country :
GB GB
Mail intelligence
No data
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
enjoin,12.27.2021.doc
Verdict:
Malicious activity
Analysis date:
2021-12-31 11:12:39 UTC
Tags:
macros macros-on-open generated-doc

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
File type:
application/msword
Has a screenshot:
False
Contains macros:
False
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
DNS request
Sending a custom TCP request
Creating a window
–°reating synchronization primitives
Creating a file
Searching for synchronization primitives
Launching a process by exploiting the app vulnerability
Result
Verdict:
Malicious
File Type:
Legacy Word File with Macro
Alert level:
85%
Document image
Document image
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
80%
Tags:
macros macros-on-open
Result
Verdict:
MALICIOUS
Details
Macro with Startup Hook
Detected macro logic that will automatically execute on document open. Most malware contains some execution hook.
Document With Few Pages
Document contains between one and three pages of content. Most malicious documents are sparse in page count.
Result
Threat name:
Unknown
Detection:
malicious
Classification:
expl.evad
Score:
96 / 100
Signature
Document contains an embedded VBA macro which may execute processes
Document exploit detected (process start blacklist hit)
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Sigma detected: MSHTA Spawning Windows Shell
Sigma detected: Office product drops script at suspicious location
Sigma detected: Register DLL with spoofed extension
Sigma detected: Regsvr32 Anomaly
Sigma detected: Regsvr32 Command Line Without DLL
Sigma detected: Suspicious MSHTA Process Patterns
Sigma detected: Suspicious Regsvr32 Execution With Image Extension
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 546767 Sample: enjoin,12.27.2021.doc Startdate: 31/12/2021 Architecture: WINDOWS Score: 96 25 Multi AV Scanner detection for submitted file 2->25 27 Sigma detected: Office product drops script at suspicious location 2->27 29 Sigma detected: Register DLL with spoofed extension 2->29 31 8 other signatures 2->31 7 WINWORD.EXE 36 38 2->7         started        10 explorer.exe 3 2->10         started        process3 file4 19 C:\Users\user\AppData\...\i7Gigabyte.hta.LNK, MS 7->19 dropped 21 C:\Users\user\...\enjoin,12.27.2021.doc.LNK, MS 7->21 dropped 12 explorer.exe 1 7->12         started        14 mshta.exe 21 10->14         started        process5 dnsIp6 23 patelboostg.com 45.67.229.54, 49742, 80 ALEXHOSTMD Moldova Republic of 14->23 17 regsvr32.exe 14->17         started        process7
Threat name:
Document-Excel.Trojan.Valyria
Status:
Malicious
First seen:
2021-12-31 11:09:10 UTC
File Type:
Document
Extracted files:
23
AV detection:
19 of 43 (44.19%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:icedid campaign:2507181075 banker macro macro_on_action suricata trojan
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Office loads VBA resources, possible macro or embedded object present
Enumerates physical storage devices
Program crash
Drops file in Windows directory
Loads dropped DLL
Blocklisted process makes network request
Downloads MZ/PE file
IcedID, BokBot
Process spawned unexpected child process
Suspicious use of NtCreateProcessExOtherParentProcess
suricata: ET MALWARE Win32/IcedID Request Cookie
Malware Config
C2 Extraction:
vopnoz.com

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments



Avatar
proxylife commented on 2021-12-31 11:16:55 UTC

"C:\Windows\System32\regsvr32.exe" c:\users\public\gigabyteI7.jpg