Overview
overview
10Static
static
7GongShaFuZ...ll.dll
windows7-x64
1GongShaFuZ...ll.dll
windows10-2004-x64
1GongShaFuZ...LE.dll
windows7-x64
1GongShaFuZ...LE.dll
windows10-2004-x64
3GongShaFuZ...SG.dll
windows7-x64
1GongShaFuZ...SG.dll
windows10-2004-x64
3GongShaFuZ...AD.dll
windows7-x64
1GongShaFuZ...AD.dll
windows10-2004-x64
1GongShaFuZ...LL.dll
windows7-x64
1GongShaFuZ...LL.dll
windows10-2004-x64
1GongShaFuZ...OU.dll
windows7-x64
7GongShaFuZ...OU.dll
windows10-2004-x64
7GongShaFuZ...ER.dll
windows7-x64
1GongShaFuZ...ER.dll
windows10-2004-x64
1GongShaFuZ...ON.dll
windows7-x64
1GongShaFuZ...ON.dll
windows10-2004-x64
1GongShaFuZ...OW.dll
windows7-x64
1GongShaFuZ...OW.dll
windows10-2004-x64
3GongShaFuZ...ll.dll
windows7-x64
10GongShaFuZ...ll.dll
windows10-2004-x64
10GongShaFuZ...dm.dll
windows7-x64
10GongShaFuZ...dm.dll
windows10-2004-x64
10GongShaFuZ...lp.doc
windows7-x64
4GongShaFuZ...lp.doc
windows10-2004-x64
1GongShaFuZ....3.exe
windows7-x64
1GongShaFuZ....3.exe
windows10-2004-x64
1GongShaFuZ...er.exe
windows7-x64
1GongShaFuZ...er.exe
windows10-2004-x64
3GongShaFuZ...��.url
windows7-x64
1GongShaFuZ...��.url
windows10-2004-x64
1Analysis
-
max time kernel
151s -
max time network
228s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 09:55
Behavioral task
behavioral1
Sample
GongShaFuZhu13/【x1】攻沙辅助/cfgdll.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
GongShaFuZhu13/【x1】攻沙辅助/cfgdll.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
GongShaFuZhu13/【x1】攻沙辅助/plugin/FILE.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
GongShaFuZhu13/【x1】攻沙辅助/plugin/FILE.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
GongShaFuZhu13/【x1】攻沙辅助/plugin/MSG.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
GongShaFuZhu13/【x1】攻沙辅助/plugin/MSG.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
GongShaFuZhu13/【x1】攻沙辅助/plugin/READ.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
GongShaFuZhu13/【x1】攻沙辅助/plugin/READ.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
GongShaFuZhu13/【x1】攻沙辅助/plugin/REGDLL.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
GongShaFuZhu13/【x1】攻沙辅助/plugin/REGDLL.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
GongShaFuZhu13/【x1】攻沙辅助/plugin/REMOTEANSWER_JDYOU.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
GongShaFuZhu13/【x1】攻沙辅助/plugin/REMOTEANSWER_JDYOU.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
GongShaFuZhu13/【x1】攻沙辅助/plugin/SGUOBROWSER.dll
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
GongShaFuZhu13/【x1】攻沙辅助/plugin/SGUOBROWSER.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
GongShaFuZhu13/【x1】攻沙辅助/plugin/WEBOPERATION.dll
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
GongShaFuZhu13/【x1】攻沙辅助/plugin/WEBOPERATION.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
GongShaFuZhu13/【x1】攻沙辅助/plugin/WINDOW.dll
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
GongShaFuZhu13/【x1】攻沙辅助/plugin/WINDOW.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
GongShaFuZhu13/【x1】攻沙辅助/xgs/RegDll.dll
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
GongShaFuZhu13/【x1】攻沙辅助/xgs/RegDll.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral21
Sample
GongShaFuZhu13/【x1】攻沙辅助/xgs/dm.dll
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
GongShaFuZhu13/【x1】攻沙辅助/xgs/dm.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
GongShaFuZhu13/【x1】攻沙辅助/xgs/help.doc
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
GongShaFuZhu13/【x1】攻沙辅助/xgs/help.doc
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
GongShaFuZhu13/【x1】攻沙辅助/攻沙辅助v1.3.exe
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
GongShaFuZhu13/【x1】攻沙辅助/攻沙辅助v1.3.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
GongShaFuZhu13/【x1】攻沙辅助/辅助浏览器-Browser.exe
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
GongShaFuZhu13/【x1】攻沙辅助/辅助浏览器-Browser.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
GongShaFuZhu13/游迅网.url
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
GongShaFuZhu13/游迅网.url
Resource
win10v2004-20231215-en
General
-
Target
GongShaFuZhu13/【x1】攻沙辅助/xgs/help.doc
-
Size
31KB
-
MD5
470b257f2ce348e6dbf6efac504f6167
-
SHA1
7eb1d611bef0744a04ae7e6723003e9a584d08bf
-
SHA256
d0a325e5f120dd6a733bc043dd3fae2c0c7e5844f1b335d3081e8d1c5d032eee
-
SHA512
78cf130d0f6769025dd3264d2b31c944564417af37c783cd682485e7a3e057c8b5a57f04d8072d0c6121edf41609267a3ae8f7acccef1ee362ec9c961945b80b
-
SSDEEP
192:J1N77BcWyZQANt9Uo6Squ2xVagUky4j0k/8sad/u:HN7VcWvAb9Uo63Wgny4j0k/8
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 5000 WINWORD.EXE 5000 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 5000 WINWORD.EXE 5000 WINWORD.EXE 5000 WINWORD.EXE 5000 WINWORD.EXE 5000 WINWORD.EXE 5000 WINWORD.EXE 5000 WINWORD.EXE 5000 WINWORD.EXE 5000 WINWORD.EXE 5000 WINWORD.EXE 5000 WINWORD.EXE 5000 WINWORD.EXE 5000 WINWORD.EXE 5000 WINWORD.EXE 5000 WINWORD.EXE 5000 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\GongShaFuZhu13\【x1】攻沙辅助\xgs\help.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:5000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84