Overview
overview
8Static
static
8QQ邮箱�...PI.dll
windows7-x64
1QQ邮箱�...PI.dll
windows10-2004-x64
1QQ邮箱�...��.doc
windows7-x64
4QQ邮箱�...��.doc
windows10-2004-x64
1QQ邮箱�...er.dll
windows7-x64
1QQ邮箱�...er.dll
windows10-2004-x64
1QQ邮箱�...te.exe
windows7-x64
1QQ邮箱�...te.exe
windows10-2004-x64
1QQ邮箱�...��.url
windows7-x64
1QQ邮箱�...��.url
windows10-2004-x64
1QQ邮箱�...��.url
windows7-x64
1QQ邮箱�...��.url
windows10-2004-x64
1QQ邮箱�...��.doc
windows7-x64
4QQ邮箱�...��.doc
windows10-2004-x64
1QQ邮箱�...��.exe
windows7-x64
8QQ邮箱�...��.exe
windows10-2004-x64
8Analysis
-
max time kernel
101s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 09:59
Behavioral task
behavioral1
Sample
QQ邮箱群发王1.0/ESPI.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
QQ邮箱群发王1.0/ESPI.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
QQ邮箱群发王1.0/QQ邮箱群发器 说明.doc
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
QQ邮箱群发王1.0/QQ邮箱群发器 说明.doc
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
QQ邮箱群发王1.0/UUWiseHelper.dll
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
QQ邮箱群发王1.0/UUWiseHelper.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
QQ邮箱群发王1.0/update.exe
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
QQ邮箱群发王1.0/update.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
QQ邮箱群发王1.0/华彩联盟论坛.url
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
QQ邮箱群发王1.0/华彩联盟论坛.url
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
QQ邮箱群发王1.0/华彩软件站-使用必读.url
Resource
win7-20220901-en
Behavioral task
behavioral12
Sample
QQ邮箱群发王1.0/华彩软件站-使用必读.url
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
QQ邮箱群发王1.0/用户必看.doc
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
QQ邮箱群发王1.0/用户必看.doc
Resource
win10v2004-20220901-en
Behavioral task
behavioral15
Sample
QQ邮箱群发王1.0/破障QQ邮箱营销王免费版.exe
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
QQ邮箱群发王1.0/破障QQ邮箱营销王免费版.exe
Resource
win10v2004-20220812-en
General
-
Target
QQ邮箱群发王1.0/QQ邮箱群发器 说明.doc
-
Size
699KB
-
MD5
2176270020fe6666505c93684eafd30a
-
SHA1
3665db496067762458453487d6953a95df9b8cbd
-
SHA256
5d973b4d54cd779d5b5371d68de358964a358f90df0fbe7952859b50afe79e4d
-
SHA512
87fb0a950a2e19f90cbbac315864cb8f738a300a156af128fa2b64b21e60880a8d83c99388886f104fbb427496ed437050d82c4baaebc5477da5e0a2011d88d9
-
SSDEEP
12288:XXDzRaRC2NX69QcD/fk9OzRpxDisMuD3hlZn7x0QuqR:XzQCqoQ41Pn3hjVQ
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4884 WINWORD.EXE 4884 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
WINWORD.EXEpid process 4884 WINWORD.EXE 4884 WINWORD.EXE 4884 WINWORD.EXE 4884 WINWORD.EXE 4884 WINWORD.EXE 4884 WINWORD.EXE 4884 WINWORD.EXE 4884 WINWORD.EXE 4884 WINWORD.EXE 4884 WINWORD.EXE 4884 WINWORD.EXE 4884 WINWORD.EXE 4884 WINWORD.EXE 4884 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\QQ邮箱群发王1.0\QQ邮箱群发器 说明.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4884