Overview
overview
8Static
static
8QQ邮箱�...PI.dll
windows7-x64
1QQ邮箱�...PI.dll
windows10-2004-x64
1QQ邮箱�...��.doc
windows7-x64
4QQ邮箱�...��.doc
windows10-2004-x64
1QQ邮箱�...er.dll
windows7-x64
1QQ邮箱�...er.dll
windows10-2004-x64
1QQ邮箱�...te.exe
windows7-x64
1QQ邮箱�...te.exe
windows10-2004-x64
1QQ邮箱�...��.url
windows7-x64
1QQ邮箱�...��.url
windows10-2004-x64
1QQ邮箱�...��.url
windows7-x64
1QQ邮箱�...��.url
windows10-2004-x64
1QQ邮箱�...��.doc
windows7-x64
4QQ邮箱�...��.doc
windows10-2004-x64
1QQ邮箱�...��.exe
windows7-x64
8QQ邮箱�...��.exe
windows10-2004-x64
8Analysis
-
max time kernel
101s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 09:59
Behavioral task
behavioral1
Sample
QQ邮箱群发王1.0/ESPI.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
QQ邮箱群发王1.0/ESPI.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
QQ邮箱群发王1.0/QQ邮箱群发器 说明.doc
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
QQ邮箱群发王1.0/QQ邮箱群发器 说明.doc
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
QQ邮箱群发王1.0/UUWiseHelper.dll
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
QQ邮箱群发王1.0/UUWiseHelper.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
QQ邮箱群发王1.0/update.exe
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
QQ邮箱群发王1.0/update.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
QQ邮箱群发王1.0/华彩联盟论坛.url
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
QQ邮箱群发王1.0/华彩联盟论坛.url
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
QQ邮箱群发王1.0/华彩软件站-使用必读.url
Resource
win7-20220901-en
Behavioral task
behavioral12
Sample
QQ邮箱群发王1.0/华彩软件站-使用必读.url
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
QQ邮箱群发王1.0/用户必看.doc
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
QQ邮箱群发王1.0/用户必看.doc
Resource
win10v2004-20220901-en
Behavioral task
behavioral15
Sample
QQ邮箱群发王1.0/破障QQ邮箱营销王免费版.exe
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
QQ邮箱群发王1.0/破障QQ邮箱营销王免费版.exe
Resource
win10v2004-20220812-en
General
-
Target
QQ邮箱群发王1.0/用户必看.doc
-
Size
28KB
-
MD5
daab88be3ff0b23a15033fa8d2b4502a
-
SHA1
49ba9aaaa7bb1d89417d4f8aa78412a0680de981
-
SHA256
5406547f60942f1caaafdc532b04154211bea22b1be6aa4a7af52d9503a7ed73
-
SHA512
62572f5d841dfe29bc07f73620c0d9eabe66c8f83ef2299df3993ed912e7e69a3ab7295565bee566974fbbe3bc307c219c1c95293abb9733bf11549192870d61
-
SSDEEP
96:zia1MauDzdaDjdZCo2WoEi4iaOJv/KmteL3a2PeyBe66qutKCIwRrCxJSAx2/Fdg:+qUzdmZC1fEmnlYraPIr
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 5016 WINWORD.EXE 5016 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
WINWORD.EXEpid process 5016 WINWORD.EXE 5016 WINWORD.EXE 5016 WINWORD.EXE 5016 WINWORD.EXE 5016 WINWORD.EXE 5016 WINWORD.EXE 5016 WINWORD.EXE 5016 WINWORD.EXE 5016 WINWORD.EXE 5016 WINWORD.EXE 5016 WINWORD.EXE 5016 WINWORD.EXE 5016 WINWORD.EXE 5016 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\QQ邮箱群发王1.0\用户必看.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:5016