Overview
overview
10Static
static
100014c57bfd...3b.exe
windows10-1703-x64
100014c57bfd...3b.exe
windows10-2004-x64
10660e3fcc23...81.exe
windows10-1703-x64
7660e3fcc23...81.exe
windows10-2004-x64
79dc5600bed...30.exe
windows10-1703-x64
109dc5600bed...30.exe
windows10-2004-x64
10Acwpn.exe
windows10-1703-x64
10Acwpn.exe
windows10-2004-x64
7DHL SHIPPI...DF.exe
windows10-1703-x64
10DHL SHIPPI...DF.exe
windows10-2004-x64
10Halkbank_E...f..exe
windows10-1703-x64
10Halkbank_E...f..exe
windows10-2004-x64
10INVOICEXAN...LS.rtf
windows10-1703-x64
1INVOICEXAN...LS.rtf
windows10-2004-x64
1Maersk Shi...cs.exe
windows10-1703-x64
10Maersk Shi...cs.exe
windows10-2004-x64
10ORDER INQU...01.exe
windows10-1703-x64
10ORDER INQU...01.exe
windows10-2004-x64
10PO-8372929.xls
windows10-1703-x64
1PO-8372929.xls
windows10-2004-x64
1QUOTATION 1.rtf
windows10-1703-x64
1QUOTATION 1.rtf
windows10-2004-x64
1Quotation.rtf
windows10-1703-x64
1Quotation.rtf
windows10-2004-x64
1e1cf593726...1b.exe
windows10-1703-x64
10e1cf593726...1b.exe
windows10-2004-x64
10macintosh.xlsx
windows10-1703-x64
1macintosh.xlsx
windows10-2004-x64
1Resubmissions
01-02-2023 17:02
230201-vj6p3aah39 1001-02-2023 17:00
230201-vjf5eacg4s 1001-02-2023 16:57
230201-vgbrxacg2y 10Analysis
-
max time kernel
365s -
max time network
438s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
01-02-2023 17:02
Behavioral task
behavioral1
Sample
0014c57bfd62d2929bbad91d67b77c3b.exe
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
0014c57bfd62d2929bbad91d67b77c3b.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
660e3fcc23c3a833e6e8af22b13ebd81.exe
Resource
win10-20220901-en
Behavioral task
behavioral4
Sample
660e3fcc23c3a833e6e8af22b13ebd81.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
9dc5600bedda76a29aa0e33da951fc30.exe
Resource
win10-20220812-en
Behavioral task
behavioral6
Sample
9dc5600bedda76a29aa0e33da951fc30.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
Acwpn.exe
Resource
win10-20220812-en
Behavioral task
behavioral8
Sample
Acwpn.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
DHL SHIPPING DOC PDF.exe
Resource
win10-20220812-en
Behavioral task
behavioral10
Sample
DHL SHIPPING DOC PDF.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
Halkbank_Ekstre_20230129_075423_612150o.pdf..exe
Resource
win10-20220901-en
Behavioral task
behavioral12
Sample
Halkbank_Ekstre_20230129_075423_612150o.pdf..exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral13
Sample
INVOICEXANDXBANKXDETAILS.rtf
Resource
win10-20220812-en
Behavioral task
behavioral14
Sample
INVOICEXANDXBANKXDETAILS.rtf
Resource
win10v2004-20221111-en
Behavioral task
behavioral15
Sample
Maersk Shipping Docs.exe
Resource
win10-20220812-en
Behavioral task
behavioral16
Sample
Maersk Shipping Docs.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
ORDER INQUIRY 20230201.exe
Resource
win10-20220812-en
Behavioral task
behavioral18
Sample
ORDER INQUIRY 20230201.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral19
Sample
PO-8372929.xls
Resource
win10-20220812-en
Behavioral task
behavioral20
Sample
PO-8372929.xls
Resource
win10v2004-20220901-en
Behavioral task
behavioral21
Sample
QUOTATION 1.rtf
Resource
win10-20220812-en
Behavioral task
behavioral22
Sample
QUOTATION 1.rtf
Resource
win10v2004-20221111-en
Behavioral task
behavioral23
Sample
Quotation.rtf
Resource
win10-20220812-en
Behavioral task
behavioral24
Sample
Quotation.rtf
Resource
win10v2004-20221111-en
Behavioral task
behavioral25
Sample
e1cf59372694c7d46d84d0139b40d41b.exe
Resource
win10-20220812-en
Behavioral task
behavioral26
Sample
e1cf59372694c7d46d84d0139b40d41b.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral27
Sample
macintosh.xlsx
Resource
win10-20220901-en
Behavioral task
behavioral28
Sample
macintosh.xlsx
Resource
win10v2004-20221111-en
General
-
Target
INVOICEXANDXBANKXDETAILS.rtf
-
Size
8KB
-
MD5
a8caccc115c0ee90a947c31c8e3a452a
-
SHA1
42324c751619e2217c9879cb6bc312061d56639b
-
SHA256
6f0318fc63a3a123bc36c8c9765852b56ab83083a2f0c1338d8d3493e7273802
-
SHA512
b72a0e6edac3cd46353555234b56daeb44058a05aadfb37e6473f8ed8f7913d36c4f85009ffc693b34f4a4beb7bf944ce9008c2ed396a2caf0a8bc10cca5cf96
-
SSDEEP
192:3MHQcSUhRFs+McjIitJd07ab02yvQsqTLjFrJcLurIw6ZOzU:cHFthP7McjZ9oazJTLjFNcutaOzU
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2676 WINWORD.EXE 2676 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2676 WINWORD.EXE 2676 WINWORD.EXE 2676 WINWORD.EXE 2676 WINWORD.EXE 2676 WINWORD.EXE 2676 WINWORD.EXE 2676 WINWORD.EXE 2676 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\INVOICEXANDXBANKXDETAILS.rtf" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2676