General
-
Target
PO 1000402812.docx.doc
-
Size
10KB
-
Sample
230120-mpymmsfe3z
-
MD5
3c38c3b169bedb037cee953bf1cb5337
-
SHA1
28b9865f270988d11715e5bc7198ec5d56836da4
-
SHA256
0014a45ae52c94430c3e11044f1ea495c7b490600a3d014d365c2d55dc2b79dd
-
SHA512
67f5d3c6bbf677269b2fa8dddac54eefcfc4636fac58950a9f0a3f45fbf79e31117426ce433c77cafafcdc3a2d41d53bbd0d5ba318c4c01f9b8f744e62632072
-
SSDEEP
192:ScIMmtP8ar5G/bfIdTO7V5namWBX8ex6y39EvR:SPXt4ATO7V5nosMyp
Static task
static1
Behavioral task
behavioral1
Sample
PO 1000402812.docx
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
PO 1000402812.docx
Resource
win10v2004-20220812-en
Malware Config
Extracted
http://00000100000000000400000000000001000000000000@3221452405/_--00_o0-0oo0-o0-o______---0-o_o0-__________o0o-__________/xgyyhjujujjdfjghjfdggsahfhfghf.doc
Extracted
Protocol: smtp- Host:
mail.clipjoint.co.nz - Port:
587 - Username:
clipjoint@clipjoint.co.nz - Password:
melandloz64
Targets
-
-
Target
PO 1000402812.docx.doc
-
Size
10KB
-
MD5
3c38c3b169bedb037cee953bf1cb5337
-
SHA1
28b9865f270988d11715e5bc7198ec5d56836da4
-
SHA256
0014a45ae52c94430c3e11044f1ea495c7b490600a3d014d365c2d55dc2b79dd
-
SHA512
67f5d3c6bbf677269b2fa8dddac54eefcfc4636fac58950a9f0a3f45fbf79e31117426ce433c77cafafcdc3a2d41d53bbd0d5ba318c4c01f9b8f744e62632072
-
SSDEEP
192:ScIMmtP8ar5G/bfIdTO7V5namWBX8ex6y39EvR:SPXt4ATO7V5nosMyp
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Abuses OpenXML format to download file from external location
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-