General

  • Target

    PO 1000402812.docx.doc

  • Size

    10KB

  • Sample

    230120-mpymmsfe3z

  • MD5

    3c38c3b169bedb037cee953bf1cb5337

  • SHA1

    28b9865f270988d11715e5bc7198ec5d56836da4

  • SHA256

    0014a45ae52c94430c3e11044f1ea495c7b490600a3d014d365c2d55dc2b79dd

  • SHA512

    67f5d3c6bbf677269b2fa8dddac54eefcfc4636fac58950a9f0a3f45fbf79e31117426ce433c77cafafcdc3a2d41d53bbd0d5ba318c4c01f9b8f744e62632072

  • SSDEEP

    192:ScIMmtP8ar5G/bfIdTO7V5namWBX8ex6y39EvR:SPXt4ATO7V5nosMyp

Malware Config

Extracted

Rule
Microsoft Office WebSettings Relationship
C2

http://00000100000000000400000000000001000000000000@3221452405/_--00_o0-0oo0-o0-o______---0-o_o0-__________o0o-__________/xgyyhjujujjdfjghjfdggsahfhfghf.doc

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.clipjoint.co.nz
  • Port:
    587
  • Username:
    clipjoint@clipjoint.co.nz
  • Password:
    melandloz64

Targets

    • Target

      PO 1000402812.docx.doc

    • Size

      10KB

    • MD5

      3c38c3b169bedb037cee953bf1cb5337

    • SHA1

      28b9865f270988d11715e5bc7198ec5d56836da4

    • SHA256

      0014a45ae52c94430c3e11044f1ea495c7b490600a3d014d365c2d55dc2b79dd

    • SHA512

      67f5d3c6bbf677269b2fa8dddac54eefcfc4636fac58950a9f0a3f45fbf79e31117426ce433c77cafafcdc3a2d41d53bbd0d5ba318c4c01f9b8f744e62632072

    • SSDEEP

      192:ScIMmtP8ar5G/bfIdTO7V5namWBX8ex6y39EvR:SPXt4ATO7V5nosMyp

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Abuses OpenXML format to download file from external location

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Exploitation for Client Execution

1
T1203

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks