Analysis
-
max time kernel
104s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 13:00
Static task
static1
Behavioral task
behavioral1
Sample
淘淘淘宝论坛抢沙发软件/淘淘淘宝论坛沙发机.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
淘淘淘宝论坛抢沙发软件/淘淘淘宝论坛沙发机.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
淘淘淘宝论坛抢沙发软件/软件使用教程.doc
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
淘淘淘宝论坛抢沙发软件/软件使用教程.doc
Resource
win10v2004-20220901-en
General
-
Target
淘淘淘宝论坛抢沙发软件/软件使用教程.doc
-
Size
198KB
-
MD5
edfae8cc862c094138b003a5092cacbc
-
SHA1
3f508c0a39b87edfc037bce7bc2ad1165cbb3bfb
-
SHA256
433c07dd4bd0b9119aac4f2e325be0ecbc98d77b2d45d14ba673aa09261a92eb
-
SHA512
402599706449c42a7ae2c1f1c98fc71a783054c4cb874842a583626053de94cf1428c40d79b211858c9d7fe090368ba057da0aa66ddd93bae5b34269eca9b41f
-
SSDEEP
3072:93ckl49LJYkO0ufKW56Q2fHYnenenenenenenenenenf2q2cx+y9bmIjA/nNSjw:Zckl49LJYp1It2q4CbmR/n2kw
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2808 WINWORD.EXE 2808 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2808 WINWORD.EXE 2808 WINWORD.EXE 2808 WINWORD.EXE 2808 WINWORD.EXE 2808 WINWORD.EXE 2808 WINWORD.EXE 2808 WINWORD.EXE 2808 WINWORD.EXE 2808 WINWORD.EXE 2808 WINWORD.EXE 2808 WINWORD.EXE 2808 WINWORD.EXE 2808 WINWORD.EXE 2808 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\淘淘淘宝论坛抢沙发软件\软件使用教程.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2808