Last Updated: 2022-09-10 17:42:59 UTC
by Guy Bruneau (Version: 1)
Got this word document this week that was quarantined as phishing by Defender (223341099.docx) with the Subject: Urgent Payment Issue. Using Didier malware analysis tools, I ran through the following checks to see what could be embedded in it that is likely suspicious. I first checked the file using oledump.py to see if there were any OLE files in this document.
Next step was to check what is inside this OPC file using zipdump.py.
There is one jpeg file in there and the remainder are all XML all dated September 1, 2022. Since everything appear to be a word/document.xml, lets look for URL that might be hidden in this word document by digging inside with zipdump.py using the following options described by Didier here:
One interesting URL has been located in the document. The option re-earch searches inside the text with -e which extracted the string. My last step is to dump content of item #4 to see all the other URLs including the one previous identified: