General

  • Target

    Payment.docx.doc

  • Size

    10KB

  • Sample

    230216-nkzvkshc84

  • MD5

    8d85d75b8789542275b8c85e25e04a32

  • SHA1

    f41f9fa9dc5cc1dbea292c1df3e8d782e4e794a6

  • SHA256

    a99b1a18139506f5cf6a7dcaa6715090381720ace26899d4b664ec00ea95cac2

  • SHA512

    0de62e75ed1154bd556a245b0bd84817da5d9cde2c63683fd3d09ff80748c56b3565a8c6d0825ef1b76204f9ba9191a57aea37fcb69381351112bf66de17c6d5

  • SSDEEP

    192:ScIMmtP5hG/b7XN+eOb3O+5+5F7Jar/YEChI32x:SPXRE7XtOj7wtar/YECOy

Score
10/10

Malware Config

Extracted

Rule
Microsoft Office WebSettings Relationship
C2

http:/QQQQWWWWQWWWWQWWQWQWQWQQWQWQQWQWQWQWQWQWQWQQQQQQQQOQQQQQOOOOOOOOQOQQQQOQOQOQOQOQOQQWWWWQWQWQWQWQWQWQWQWQQWQ@3118348624/OO.DOC

Targets

    • Target

      Payment.docx.doc

    • Size

      10KB

    • MD5

      8d85d75b8789542275b8c85e25e04a32

    • SHA1

      f41f9fa9dc5cc1dbea292c1df3e8d782e4e794a6

    • SHA256

      a99b1a18139506f5cf6a7dcaa6715090381720ace26899d4b664ec00ea95cac2

    • SHA512

      0de62e75ed1154bd556a245b0bd84817da5d9cde2c63683fd3d09ff80748c56b3565a8c6d0825ef1b76204f9ba9191a57aea37fcb69381351112bf66de17c6d5

    • SSDEEP

      192:ScIMmtP5hG/b7XN+eOb3O+5+5F7Jar/YEChI32x:SPXRE7XtOj7wtar/YECOy

    Score
    8/10
    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Abuses OpenXML format to download file from external location

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Exploitation for Client Execution

1
T1203

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks