General

  • Target

    SUBM70N.docx

  • Size

    10KB

  • Sample

    221123-kwyj4shf97

  • MD5

    3ceee6358bc4c0a06359a579704476dd

  • SHA1

    da9abf03b94f81b936415673cc708ee39b6c5f88

  • SHA256

    59a7e2d1b792debf604a45fdfe24715d855473075ede2c3a417c8f4e7fb0249f

  • SHA512

    6b4b1744e63f1b4848a7be36c7cc9ef12f40a34c1909dac13dfcc230a9b8001e69657c8d6662565e17f54604e8c46f4641b5f1ff37089b3702d15f89f41093b4

  • SSDEEP

    192:ScIMmtPqCJuEG/bBLgO35Xhz2ru5JhBH3QBV:SPXyJTJgOJEaJrQ/

Score
10/10

Malware Config

Extracted

Rule
Microsoft Office WebSettings Relationship
C2

http://000!0000020000322000000010023000004000050000230000000@911154186/000000_0000000_000000_000000_0000000_000000_0000/0000_000000_00000.doc

Targets

    • Target

      SUBM70N.docx

    • Size

      10KB

    • MD5

      3ceee6358bc4c0a06359a579704476dd

    • SHA1

      da9abf03b94f81b936415673cc708ee39b6c5f88

    • SHA256

      59a7e2d1b792debf604a45fdfe24715d855473075ede2c3a417c8f4e7fb0249f

    • SHA512

      6b4b1744e63f1b4848a7be36c7cc9ef12f40a34c1909dac13dfcc230a9b8001e69657c8d6662565e17f54604e8c46f4641b5f1ff37089b3702d15f89f41093b4

    • SSDEEP

      192:ScIMmtPqCJuEG/bBLgO35Xhz2ru5JhBH3QBV:SPXyJTJgOJEaJrQ/

    Score
    8/10
    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Abuses OpenXML format to download file from external location

    • Loads dropped DLL

    • Uses the VBS compiler for execution

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Exploitation for Client Execution

1
T1203

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Remote System Discovery

1
T1018

Tasks