Overview
overview
5Static
static
3wudi0323-0...in.dll
windows7-x64
1wudi0323-0...in.dll
windows10-2004-x64
1wudi0323-0...in.exe
windows7-x64
5wudi0323-0...in.exe
windows10-2004-x64
5wudi0323-0...in.sys
windows7-x64
1wudi0323-0...in.sys
windows10-2004-x64
1wudi0323-0...rv.exe
windows7-x64
1wudi0323-0...rv.exe
windows10-2004-x64
1wudi0323-0...��.url
windows7-x64
1wudi0323-0...��.url
windows10-2004-x64
1wudi0323-0...��.doc
windows7-x64
4wudi0323-0...��.doc
windows10-2004-x64
1Analysis
-
max time kernel
161s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 07:47
Static task
static1
Behavioral task
behavioral1
Sample
wudi0323-090/AYEngin.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
wudi0323-090/AYEngin.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
wudi0323-090/AYEngin.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
wudi0323-090/AYEngin.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
wudi0323-090/AYEngin.sys
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
wudi0323-090/AYEngin.sys
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
wudi0323-090/InstDrv.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
wudi0323-090/InstDrv.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
wudi0323-090/西西软件.url
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
wudi0323-090/西西软件.url
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
wudi0323-090/驱动加载使用说明.doc
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
wudi0323-090/驱动加载使用说明.doc
Resource
win10v2004-20231215-en
General
-
Target
wudi0323-090/驱动加载使用说明.doc
-
Size
148KB
-
MD5
3a61e3f85df44c08a8e7d029643526c5
-
SHA1
3f6b6d0210713ec5d2065f35cc0ce3b828bb9e92
-
SHA256
f5ac49d42ae753e0db2444e5e7ec733c2eb5cbaf5d215f013188ba6892d4b50a
-
SHA512
08eef07551be099cf5aca76a17d28e9ed2cd2c6df7b8bb60087aec3caf32d69bf2555723e6d743d972e8fd73e12545f387a4d3c0230a18a525c370010c99c449
-
SSDEEP
3072:VsGVsbwOZMAIIFViKcmqaqwoNNM1ymxkXn1sJX6fK/O/:CGqbwOVFVfcFzwoNvOkXn1s0
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3568 WINWORD.EXE 3568 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 3568 WINWORD.EXE 3568 WINWORD.EXE 3568 WINWORD.EXE 3568 WINWORD.EXE 3568 WINWORD.EXE 3568 WINWORD.EXE 3568 WINWORD.EXE 3568 WINWORD.EXE 3568 WINWORD.EXE 3568 WINWORD.EXE 3568 WINWORD.EXE 3568 WINWORD.EXE 3568 WINWORD.EXE 3568 WINWORD.EXE 3568 WINWORD.EXE 3568 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\wudi0323-090\驱动加载使用说明.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3568