Overview
overview
1Static
static
1CCTX0595/V...99.doc
windows7-x64
1CCTX0595/V...99.doc
windows10-2004-x64
1CCTX0595/V...99.com
windows7-x64
CCTX0595/V...99.com
windows10-2004-x64
CCTX0595/V...00.doc
windows7-x64
1CCTX0595/V...00.doc
windows10-2004-x64
1CCTX0595/V...AL.com
windows7-x64
CCTX0595/V...AL.com
windows10-2004-x64
CCTX0595/V...ED.com
windows7-x64
CCTX0595/V...ED.com
windows10-2004-x64
CCTX0595/V...ED.exe
windows7-x64
CCTX0595/V...ED.exe
windows10-2004-x64
CCTX0595/V.../1.exe
windows7-x64
CCTX0595/V.../1.exe
windows10-2004-x64
CCTX0595/V.../2.exe
windows7-x64
CCTX0595/V.../2.exe
windows10-2004-x64
CCTX0595/V.../A.com
windows7-x64
CCTX0595/V.../A.com
windows10-2004-x64
CCTX0595/V.../B.com
windows7-x64
CCTX0595/V.../B.com
windows10-2004-x64
CCTX0595/V...DE.vbs
windows7-x64
1CCTX0595/V...DE.vbs
windows10-2004-x64
1CCTX0595/V...DE.com
windows7-x64
CCTX0595/V...DE.com
windows10-2004-x64
CCTX0595/V.../1.exe
windows7-x64
CCTX0595/V.../1.exe
windows10-2004-x64
CCTX0595/V.../2.exe
windows7-x64
CCTX0595/V.../2.exe
windows10-2004-x64
CCTX0595/V.../A.com
windows7-x64
CCTX0595/V.../A.com
windows10-2004-x64
CCTX0595/V.../B.com
windows7-x64
CCTX0595/V.../B.com
windows10-2004-x64
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 23:36
Static task
static1
Behavioral task
behavioral1
Sample
CCTX0595/Vgupdat7/ASEX0_99/ASEX-099.doc
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
CCTX0595/Vgupdat7/ASEX0_99/ASEX-099.doc
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
CCTX0595/Vgupdat7/ASEX0_99/ASEX_099.com
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
CCTX0595/Vgupdat7/ASEX0_99/ASEX_099.com
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
CCTX0595/Vgupdat7/ASEX1_00/ASEX-100.doc
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
CCTX0595/Vgupdat7/ASEX1_00/ASEX-100.doc
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
CCTX0595/Vgupdat7/ASEX1_00/ASEXUAL.com
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
CCTX0595/Vgupdat7/ASEX1_00/ASEXUAL.com
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
CCTX0595/Vgupdat7/CODEJRNL/INFECTED.com
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
CCTX0595/Vgupdat7/CODEJRNL/INFECTED.com
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
CCTX0595/Vgupdat7/FIRECID1/INFECTED.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
CCTX0595/Vgupdat7/FIRECID1/INFECTED.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
CCTX0595/Vgupdat7/FIRECID2/1.exe
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
CCTX0595/Vgupdat7/FIRECID2/1.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
CCTX0595/Vgupdat7/FIRECID2/2.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
CCTX0595/Vgupdat7/FIRECID2/2.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
CCTX0595/Vgupdat7/FIRECID2/A.com
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
CCTX0595/Vgupdat7/FIRECID2/A.com
Resource
win10v2004-20231222-en
Behavioral task
behavioral19
Sample
CCTX0595/Vgupdat7/FIRECID2/B.com
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
CCTX0595/Vgupdat7/FIRECID2/B.com
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
CCTX0595/Vgupdat7/FIRECID2/FIRECIDE.vbs
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
CCTX0595/Vgupdat7/FIRECID2/FIRECIDE.vbs
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
CCTX0595/Vgupdat7/FIRECID2/FIRECIDE.com
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
CCTX0595/Vgupdat7/FIRECID2/FIRECIDE.com
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
CCTX0595/Vgupdat7/ICEBURN/1.exe
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
CCTX0595/Vgupdat7/ICEBURN/1.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral27
Sample
CCTX0595/Vgupdat7/ICEBURN/2.exe
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
CCTX0595/Vgupdat7/ICEBURN/2.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral29
Sample
CCTX0595/Vgupdat7/ICEBURN/A.com
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
CCTX0595/Vgupdat7/ICEBURN/A.com
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
CCTX0595/Vgupdat7/ICEBURN/B.com
Resource
win7-20231129-en
Behavioral task
behavioral32
Sample
CCTX0595/Vgupdat7/ICEBURN/B.com
Resource
win10v2004-20231215-en
General
-
Target
CCTX0595/Vgupdat7/ASEX1_00/ASEX-100.doc
-
Size
1KB
-
MD5
7df8e8297a3b9b8f893cca2d42705e08
-
SHA1
12c13a70a5ae75dd749f721b705bfcb3ac50f724
-
SHA256
e1c0dca094edee4df602f574ccc7194071ef5fb22791475430cf4b4f704bc4bf
-
SHA512
7d6584e03ec3a727f12ad38d1a1d6a1637da912112c8d65eb1797e87495646e7ad1c33dad44b309d2ac6c42d7e5720010ca27e88cbf0fa4984941a58c9415f75
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3996 WINWORD.EXE 3996 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 3996 WINWORD.EXE 3996 WINWORD.EXE 3996 WINWORD.EXE 3996 WINWORD.EXE 3996 WINWORD.EXE 3996 WINWORD.EXE 3996 WINWORD.EXE 3996 WINWORD.EXE 3996 WINWORD.EXE 3996 WINWORD.EXE 3996 WINWORD.EXE 3996 WINWORD.EXE 3996 WINWORD.EXE 3996 WINWORD.EXE 3996 WINWORD.EXE 3996 WINWORD.EXE 3996 WINWORD.EXE 3996 WINWORD.EXE 3996 WINWORD.EXE 3996 WINWORD.EXE 3996 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\CCTX0595\Vgupdat7\ASEX1_00\ASEX-100.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3996