Overview
overview
5Static
static
41試務公...�.docx
windows7-x64
41試務公...�.docx
windows10-2004-x64
11試務公...��.pdf
windows7-x64
11試務公...��.pdf
windows10-2004-x64
11試務公...dt.odt
windows7-x64
41試務公...dt.odt
windows10-2004-x64
12簡章/11...�.docx
windows7-x64
42簡章/11...�.docx
windows10-2004-x64
12簡章/111簡章.pdf
windows7-x64
12簡章/111簡章.pdf
windows10-2004-x64
12簡章/11...dt.odt
windows7-x64
42簡章/11...dt.odt
windows10-2004-x64
13簡章附...�.docx
windows7-x64
43簡章附...�.docx
windows10-2004-x64
13簡章附...��.pdf
windows7-x64
13簡章附...��.pdf
windows10-2004-x64
13簡章附...dt.odt
windows7-x64
43簡章附...dt.odt
windows10-2004-x64
13簡章附...�.docx
windows7-x64
43簡章附...�.docx
windows10-2004-x64
13簡章附...��.pdf
windows7-x64
13簡章附...��.pdf
windows10-2004-x64
13簡章附...dt.odt
windows7-x64
43簡章附...dt.odt
windows10-2004-x64
13簡章附...�.docx
windows7-x64
43簡章附...�.docx
windows10-2004-x64
13簡章附...��.pdf
windows7-x64
13簡章附...��.pdf
windows10-2004-x64
13簡章附...dt.odt
windows7-x64
43簡章附...dt.odt
windows10-2004-x64
53簡章附...�.docx
windows7-x64
43簡章附...�.docx
windows10-2004-x64
1Analysis
-
max time kernel
159s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2022 16:05
Behavioral task
behavioral1
Sample
1試務公告/111試務公告.docx
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1試務公告/111試務公告.docx
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
1試務公告/111試務公告.pdf
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
1試務公告/111試務公告.pdf
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
1試務公告/111試務公告odt.odt
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
1試務公告/111試務公告odt.odt
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
2簡章/111簡章.docx
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
2簡章/111簡章.docx
Resource
win10v2004-20220901-en
Behavioral task
behavioral9
Sample
2簡章/111簡章.pdf
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
2簡章/111簡章.pdf
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
2簡章/111簡章odt.odt
Resource
win7-20220901-en
Behavioral task
behavioral12
Sample
2簡章/111簡章odt.odt
Resource
win10v2004-20220901-en
Behavioral task
behavioral13
Sample
3簡章附表/1准考證.docx
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
3簡章附表/1准考證.docx
Resource
win10v2004-20220901-en
Behavioral task
behavioral15
Sample
3簡章附表/1准考證.pdf
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
3簡章附表/1准考證.pdf
Resource
win10v2004-20220901-en
Behavioral task
behavioral17
Sample
3簡章附表/1准考證odt.odt
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
3簡章附表/1准考證odt.odt
Resource
win10v2004-20220901-en
Behavioral task
behavioral19
Sample
3簡章附表/2報名表-A4正表.docx
Resource
win7-20220901-en
Behavioral task
behavioral20
Sample
3簡章附表/2報名表-A4正表.docx
Resource
win10v2004-20220901-en
Behavioral task
behavioral21
Sample
3簡章附表/2報名表-A4正表.pdf
Resource
win7-20220901-en
Behavioral task
behavioral22
Sample
3簡章附表/2報名表-A4正表.pdf
Resource
win10v2004-20220901-en
Behavioral task
behavioral23
Sample
3簡章附表/2報名表-A4正表odt.odt
Resource
win7-20220812-en
Behavioral task
behavioral24
Sample
3簡章附表/2報名表-A4正表odt.odt
Resource
win10v2004-20220901-en
Behavioral task
behavioral25
Sample
3簡章附表/3報名表-A4副表.docx
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
3簡章附表/3報名表-A4副表.docx
Resource
win10v2004-20220901-en
Behavioral task
behavioral27
Sample
3簡章附表/3報名表-A4副表.pdf
Resource
win7-20220812-en
Behavioral task
behavioral28
Sample
3簡章附表/3報名表-A4副表.pdf
Resource
win10v2004-20220901-en
Behavioral task
behavioral29
Sample
3簡章附表/3報名表-A4副表odt.odt
Resource
win7-20220812-en
Behavioral task
behavioral30
Sample
3簡章附表/3報名表-A4副表odt.odt
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
3簡章附表/4專用信封-專用信封封面-橫式.docx
Resource
win7-20220812-en
Behavioral task
behavioral32
Sample
3簡章附表/4專用信封-專用信封封面-橫式.docx
Resource
win10v2004-20220812-en
General
-
Target
3簡章附表/3報名表-A4副表odt.odt
-
Size
11KB
-
MD5
af89ac1ceead7bcb3280c6756aa2a355
-
SHA1
96860a23e824b5d6d464ddf55cec7f2fd58b83cd
-
SHA256
d5348c598bac6e52985d2e85f6fc67f5517aad20349ec3dea2b0e7fa14ecff81
-
SHA512
c10811122892f799399ec278ee1a30f5e2aeada5176482146ae5d8c45727f33d71ea3037ff3c79e87393d00143798495b64f08fe12bad8c3a183a8c055f44ab5
-
SSDEEP
192:XzAWUSGARnqn/dZU5ALU/RRXW38TRbM24Ycpkzvn7pJLW3Yuj+inUCXdAGUEtdWN:rByl0KviuRtpQ7pJLW3Yuj+iU0d5ZG08
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{E115D946-1D22-4F05-80D2-573D6D4019E4}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{0D57AC03-6703-43A2-BCE3-CA477481ABC4}.catalogItem svchost.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEsvchost.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
Processes:
WINWORD.EXEsvchost.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4064 WINWORD.EXE 4064 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
WINWORD.EXEpid process 4064 WINWORD.EXE 4064 WINWORD.EXE 4064 WINWORD.EXE 4064 WINWORD.EXE 4064 WINWORD.EXE 4064 WINWORD.EXE 4064 WINWORD.EXE 4064 WINWORD.EXE 4064 WINWORD.EXE 4064 WINWORD.EXE 4064 WINWORD.EXE 4064 WINWORD.EXE 4064 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\3簡章附表\3報名表-A4副表odt.odt"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4064-132-0x00007FFD4B270000-0x00007FFD4B280000-memory.dmpFilesize
64KB
-
memory/4064-133-0x00007FFD4B270000-0x00007FFD4B280000-memory.dmpFilesize
64KB
-
memory/4064-134-0x00007FFD4B270000-0x00007FFD4B280000-memory.dmpFilesize
64KB
-
memory/4064-135-0x00007FFD4B270000-0x00007FFD4B280000-memory.dmpFilesize
64KB
-
memory/4064-136-0x00007FFD4B270000-0x00007FFD4B280000-memory.dmpFilesize
64KB
-
memory/4064-137-0x00007FFD49000000-0x00007FFD49010000-memory.dmpFilesize
64KB
-
memory/4064-138-0x00007FFD49000000-0x00007FFD49010000-memory.dmpFilesize
64KB
-
memory/4064-140-0x00007FFD4B270000-0x00007FFD4B280000-memory.dmpFilesize
64KB
-
memory/4064-141-0x00007FFD4B270000-0x00007FFD4B280000-memory.dmpFilesize
64KB
-
memory/4064-142-0x00007FFD4B270000-0x00007FFD4B280000-memory.dmpFilesize
64KB
-
memory/4064-143-0x00007FFD4B270000-0x00007FFD4B280000-memory.dmpFilesize
64KB