File type: Office Open XML Document
VT Score: 45/62
While I was going through Any.run report tracker, I came across this word document, I downloaded it for analysis.
I used OLETools to analyse the document macros.
Olevba.py -a <file name>
- Auto execute on opening document.
- May write a file to the system.
- Base64 obfuscated strings.
I deobfuscated the file using olevba.py
Olevba.py --deobf <file name>
Indicator of Compromise:
- PFSDNKDF.exe executable file name.
Above code shows the PE file PFSDNKDF.exe will be dropped at location C:\1\Whole\
Next I started debugging macro in VBA development tool. VBA development tool can be opened by pressing Alt + F11 keys that will bring it up.
I can see the variable hextostr has stored a hex code that will be converted into PE file.
Then it creates a process and execute PFSDNKDF.exe file.
After that it closes the document or will prompt to save the changes if any changes has done to document.
File Name: psisdecd.dll
File Type: Win32 EXE
Signature: Microsoft Visual C++ 8
VT score: 56/72
IcedID is a banking Trojan type malware that allows attackers to utilize it to steal banking credentials of the victims. IcedID aka BokBot mainly targets businesses and steals payment information, it also acts as a loader and can deliver other viruses or download additional modules.
Using wireshak, I have seen this executable created network connection to below IPs and DNS resolved to:
- Word document drops executable PFSDNKDF.exe on opening document.
- The dropped file is IceID trojan.
Download sample: Any.Run
Read more about IcedID
One thought on “Word Macro Drops IcedID Trojan – Malware Analysis”
[…] Article Link: https://malwr-analysis.com/2020/07/12/word-macro-drops-icedid-trojan-malware-analysis/ […]