MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fd3af0e7890546cc6e6ee828df5a31a4c88c587f968b0298a672b703bf71b7e4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TrickBot


Vendor detections: 7


Maldoc score: 14


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: fd3af0e7890546cc6e6ee828df5a31a4c88c587f968b0298a672b703bf71b7e4
SHA3-384 hash: 75abd9d51c8bb3b633fa03677c127be6d61829d9bff72a3cf62703a422897d2b3fa37cef1d9432b9ca904177cabad5d9
SHA1 hash: b1674649dee5ebb75f8e6c4cd8e165714ea4d444
MD5 hash: 6c27902679913bb13e0732735ea73ddb
humanhash: summer-spaghetti-two-yellow
File name:reorder_6041.doc
Download: download sample
Signature TrickBot
File size:156'160 bytes
First seen:2021-04-07 14:21:58 UTC
Last seen:2021-04-07 14:57:44 UTC
File type:Word file doc
MIME type:application/msword
ssdeep 3072:sBFS6igp+dDroFMky3zbcNXg+UiGMr0KKq+:sBY6igpCiUzbctGVMoKKq
TLSH AFE3AD03B688DF22E12952FA0E87CEF8365A7F459E01C2A731983B5F7E745600986B5C
Reporter abuse_ch
Tags:doc Rackspace rob45 TrickBot


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: smtp120.ord1d.emailsrvr.com
Sending IP: 184.106.54.120
From: Jackie Wilson <davem@silverbulletinc.com>
Reply-To: Jackie Wilson <wiljack@icloud.com>
Subject: Updated Proof 596236974257 attached!
Attachment: reorder_6041.doc

Office OLE Information


This malware samples appears to be an Office document. The following table provides more information about this document using oletools and oledump.

OLE id
Maldoc score: 14
Application name is Microsoft Office Word
Office document is in OLE format
Office document contains VBA Macros
OLE dump

MalwareBazaar was able to identify 18 sections in this file using oledump:

Section IDSection sizeSection name
1114 bytesCompObj
24096 bytesDocumentSummaryInformation
34096 bytesSummaryInformation
48737 bytes1Table
585841 bytesData
697 bytesMacros/Animated/CompObj
7374 bytesMacros/Animated/VBFrame
8727 bytesMacros/Animated/f
96652 bytesMacros/Animated/o
10533 bytesMacros/PROJECT
11294 bytesMacros/PROJECTlk
1295 bytesMacros/PROJECTwm
134355 bytesMacros/VBA/Animated
141060 bytesMacros/VBA/ThisDocument
158800 bytesMacros/VBA/_VBA_PROJECT
164651 bytesMacros/VBA/autoopen
171706 bytesMacros/VBA/dir
1815412 bytesWordDocument
OLE vba

MalwareBazaar was able to extract and deobfuscate VBA script(s) the following information from OLE objects embedded in this file using olevba:

TypeKeywordDescription
AutoExecautoopenRuns when the Word document is opened
AutoExecUserForm_ResizeRuns when the file is opened and ActiveX objects trigger events
IOCe.dllExecutable file name
SuspiciousOpenMay open a file
SuspiciousOutputMay write to a file (if combined with Open)
SuspiciousLibMay run code from a DLL
SuspiciousChrWMay attempt to obfuscate specific strings (use option --deobf to deobfuscate)
SuspiciousHex StringsHex-encoded strings were detected, may be used to obfuscate strings (option --decode to see all)
SuspiciousBase64 StringsBase64-encoded strings were detected, may be used to obfuscate strings (option --decode to see all)

Intelligence


File Origin
# of uploads :
2
# of downloads :
1'145
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
reorder_6041.doc
Verdict:
No threats detected
Analysis date:
2021-04-07 15:55:09 UTC
Tags:
macros macros-on-open generated-doc

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Legit
File type:
application/msword
Has a screenshot:
False
Contains macros:
True
Result
Verdict:
Clean
Maliciousness:

Behaviour
Creating a window
Creating a file
Delayed writing of the file
Result
Verdict:
Malicious
File Type:
Legacy Word File with Macro
Payload URLs
URL
File name
Project.autoopen.Main
1Table
Document image
Document image
Result
Verdict:
MALICIOUS
Details
Suspicious Document Variables
Detected a macro that references a suspicious number of tersely named variables.
Document With Few Pages
Document contains between one and three pages of content. Most malicious documents are sparse in page count.
Macro with File System Write
Detected macro logic that can write data to the file system.
Macro Execution Coercion
Detected a document that appears to social engineer the user into activating embedded logic.
Macro Contains Suspicious String
Detected a macro with a suspicious string. Suspicious strings include privileged function calls, obfuscations, odd registry keys, etc...
Result
Threat name:
Unknown
Detection:
malicious
Classification:
expl.troj.evad
Score:
84 / 100
Signature
Document contains an embedded VBA macro which may execute processes
Document contains an embedded VBA macro with suspicious strings
Document exploit detected (creates forbidden files)
Document exploit detected (process start blacklist hit)
Machine Learning detection for sample
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Suspicious powershell command line found
Tries to download and execute files (via powershell)
Uses ping.exe to check the status of other devices and networks
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 383332 Sample: reorder_6041.doc Startdate: 07/04/2021 Architecture: WINDOWS Score: 84 43 Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros) 2->43 45 Machine Learning detection for sample 2->45 47 Document contains an embedded VBA macro with suspicious strings 2->47 49 2 other signatures 2->49 7 WINWORD.EXE 257 51 2->7         started        process3 signatures4 51 Document exploit detected (creates forbidden files) 7->51 10 cmd.exe 2 7->10         started        13 cmd.exe 2 7->13         started        process5 dnsIp6 53 Suspicious powershell command line found 10->53 55 Tries to download and execute files (via powershell) 10->55 57 Uses ping.exe to check the status of other devices and networks 10->57 16 PING.EXE 1 10->16         started        19 PING.EXE 1 10->19         started        21 powershell.exe 18 10->21         started        29 2 other processes 10->29 41 192.168.2.1 unknown unknown 13->41 23 powershell.exe 15 21 13->23         started        25 PING.EXE 1 13->25         started        27 PING.EXE 1 13->27         started        31 2 other processes 13->31 signatures7 process8 dnsIp9 33 34.194.41.48 AMAZON-AESUS United States 16->33 35 masharie.online 54.36.160.185, 49755, 80 OVHFR France 23->35 37 hinative.com 52.72.110.150 AMAZON-AESUS United States 25->37 39 3.211.253.137 AMAZON-AESUS United States 27->39
Threat name:
Script-Macro.Trojan.Wacatac
Status:
Malicious
First seen:
2021-04-07 14:22:05 UTC
AV detection:
7 of 47 (14.89%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
macro
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies registry class
Runs ping.exe
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Office loads VBA resources, possible macro or embedded object present
Program crash
Drops file in Windows directory
Blocklisted process makes network request
Process spawned unexpected child process
Malware Config
Dropper Extraction:
http://masharie.online/images/point.php
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

TrickBot

Word file doc fd3af0e7890546cc6e6ee828df5a31a4c88c587f968b0298a672b703bf71b7e4

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments