MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fc9dd8a525e209d698272c1758b17ba02787d090052396d5871eea5aa7b03a9a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Threat unknown


Vendor detections: 7


Maldoc score: 15


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: fc9dd8a525e209d698272c1758b17ba02787d090052396d5871eea5aa7b03a9a
SHA3-384 hash: ba21ccb1b4c5377aca3da7df4d2b0f48def922e3ccef28e60f213be0c739d30013c7ef835b9ecdde7acfb74fd2183fb6
SHA1 hash: 43ee592e9fe8a3594a42c1ebe069cada796110a9
MD5 hash: ecd3ed9e8c95ad682030ee0e84cfa096
humanhash: alpha-queen-maryland-north
File name:fc9dd8a525e209d698272c1758b17ba02787d090052396d5871eea5aa7b03a9a.bin
Download: download sample
File size:502'784 bytes
First seen:2021-06-24 22:54:00 UTC
Last seen:Never
File type:Word file docx
MIME type:application/msword
ssdeep 6144:nQXxH8osEiDJTmDlhpdtpLpNj+fHufMakSYAQP9cOb:QXxR2Cfbj+fOUakdAQP9
TLSH 9BB4A513BAD71F03E8675B719AB453A04F26ADAFDF33B28728813E6B1DF52601942711
Reporter Arkbird_SOLG
Tags:docx maldoc

Office OLE Information


This malware samples appears to be an Office document. The following table provides more information about this document using oletools and oledump.

OLE id
Maldoc score: 15
Application name is Microsoft Office Word
Office document is in OLE format
Office document contains VBA Macros
OLE dump

MalwareBazaar was able to identify 17 sections in this file using oledump:

Section IDSection sizeSection name
1117 bytesCompObj
24096 bytesDocumentSummaryInformation
34096 bytesSummaryInformation
447311 bytes1Table
5145731 bytesData
6361 bytesMacros/PROJECT
741 bytesMacros/PROJECTwm
89486 bytesMacros/VBA/ThisDocument
93130 bytesMacros/VBA/_VBA_PROJECT
102650 bytesMacros/VBA/__SRP_0
11174 bytesMacros/VBA/__SRP_1
12286 bytesMacros/VBA/__SRP_2
131968 bytesMacros/VBA/__SRP_3
14514 bytesMacros/VBA/dir
15270 bytesMsoDataStore/WSAFWSSLSQ==/Item
16341 bytesMsoDataStore/WSAFWSSLSQ==/Properties
17272073 bytesWordDocument
OLE vba

MalwareBazaar was able to extract and deobfuscate VBA script(s) the following information from OLE objects embedded in this file using olevba:

TypeKeywordDescription
AutoExecDocument_CloseRuns when the Word document is closed
AutoExecDocument_NewRuns when a new Word document is created
AutoExecDocument_OpenRuns when the Word or Publisher document is opened
IOCb.exeExecutable file name
SuspiciousShellMay run an executable file or a system command
SuspiciousXorMay attempt to obfuscate specific strings (use option --deobf to deobfuscate)
SuspiciousVBProjectMay attempt to modify the VBA code (self- modification)
SuspiciousVBComponentsMay attempt to modify the VBA code (self- modification)
SuspiciouscodemoduleMay attempt to modify the VBA code (self- modification)
SuspiciousAddFromStringMay attempt to modify the VBA code (self- modification)

Intelligence


File Origin
# of uploads :
1
# of downloads :
276
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
fc9dd8a525e209d698272c1758b17ba02787d090052396d5871eea5aa7b03a9a.bin
Verdict:
Suspicious activity
Analysis date:
2021-06-24 22:54:57 UTC
Tags:
macros macros-on-open macros-on-close

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Legit
File type:
application/vnd.openxmlformats-officedocument.wordprocessingml.document
Has a screenshot:
False
Contains macros:
True
Result
Verdict:
Malicious
File Type:
Legacy Word File with Macro
Document image
Document image
Result
Verdict:
MALICIOUS
Details
Macro with Startup Hook
Detected macro logic that will automatically execute on document open. Most malware contains some execution hook.
Macro Contains Suspicious String
Detected a macro with a suspicious string. Suspicious strings include privileged function calls, obfuscations, odd registry keys, etc...
Result
Threat name:
Unknown
Detection:
malicious
Classification:
n/a
Score:
52 / 100
Signature
Machine Learning detection for sample
Multi AV Scanner detection for submitted file
Behaviour
Behavior Graph:
Threat name:
Document-Word.Virus.Marker
Status:
Malicious
First seen:
2021-03-02 13:09:29 UTC
AV detection:
32 of 47 (68.09%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
macro macro_on_action
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Suspicious behavior: AddClipboardFormatListener
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Office loads VBA resources, possible macro or embedded object present
Drops file in Windows directory
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments