General
-
Target
SUBM70N.docx.doc
-
Size
10KB
-
Sample
221123-ktv17sda3y
-
MD5
3ceee6358bc4c0a06359a579704476dd
-
SHA1
da9abf03b94f81b936415673cc708ee39b6c5f88
-
SHA256
59a7e2d1b792debf604a45fdfe24715d855473075ede2c3a417c8f4e7fb0249f
-
SHA512
6b4b1744e63f1b4848a7be36c7cc9ef12f40a34c1909dac13dfcc230a9b8001e69657c8d6662565e17f54604e8c46f4641b5f1ff37089b3702d15f89f41093b4
-
SSDEEP
192:ScIMmtPqCJuEG/bBLgO35Xhz2ru5JhBH3QBV:SPXyJTJgOJEaJrQ/
Static task
static1
Behavioral task
behavioral1
Sample
SUBM70N.docx
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SUBM70N.docx
Resource
win10v2004-20220812-en
Malware Config
Extracted
http://000!0000020000322000000010023000004000050000230000000@911154186/000000_0000000_000000_000000_0000000_000000_0000/0000_000000_00000.doc
Targets
-
-
Target
SUBM70N.docx.doc
-
Size
10KB
-
MD5
3ceee6358bc4c0a06359a579704476dd
-
SHA1
da9abf03b94f81b936415673cc708ee39b6c5f88
-
SHA256
59a7e2d1b792debf604a45fdfe24715d855473075ede2c3a417c8f4e7fb0249f
-
SHA512
6b4b1744e63f1b4848a7be36c7cc9ef12f40a34c1909dac13dfcc230a9b8001e69657c8d6662565e17f54604e8c46f4641b5f1ff37089b3702d15f89f41093b4
-
SSDEEP
192:ScIMmtPqCJuEG/bBLgO35Xhz2ru5JhBH3QBV:SPXyJTJgOJEaJrQ/
Score8/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Abuses OpenXML format to download file from external location
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-