Overview
overview
10Static
static
3Libs/Extreme.Net.dll
windows7-x64
1Libs/Extreme.Net.dll
windows10-2004-x64
1Libs/Injecting.dll
windows7-x64
1Libs/Injecting.dll
windows10-2004-x64
1Libs/libEGL.dll
windows7-x64
1Libs/libEGL.dll
windows10-2004-x64
3Libs/libgc...-1.dll
windows7-x64
3Libs/libgc...-1.dll
windows10-2004-x64
3concrt140.dll
windows7-x64
3concrt140.dll
windows10-2004-x64
3cpfe.dll
windows7-x64
3cpfe.dll
windows10-2004-x64
3kopje.rtf
windows7-x64
1kopje.rtf
windows10-2004-x64
1lnstall.exe
windows7-x64
5lnstall.exe
windows10-2004-x64
10msvcp140.dll
windows7-x64
3msvcp140.dll
windows10-2004-x64
3vcruntime140.dll
windows7-x64
3vcruntime140.dll
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14-01-2024 01:15
Static task
static1
Behavioral task
behavioral1
Sample
Libs/Extreme.Net.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Libs/Extreme.Net.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Libs/Injecting.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Libs/Injecting.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Libs/libEGL.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Libs/libEGL.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
Libs/libgcc_s_dw2-1.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
Libs/libgcc_s_dw2-1.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
concrt140.dll
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
concrt140.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
cpfe.dll
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
cpfe.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
kopje.rtf
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
kopje.rtf
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
lnstall.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
lnstall.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
msvcp140.dll
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
msvcp140.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
vcruntime140.dll
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
vcruntime140.dll
Resource
win10v2004-20231215-en
General
-
Target
kopje.rtf
-
Size
1.8MB
-
MD5
e5b1517921a1c423589c034caf44de00
-
SHA1
c8492bdd9a71a6bcf51179bfdcddcfa4ffb4388c
-
SHA256
d40bff228e6e7e91ec7fb7a35a390bff736758ea89260d6c55bc0aca204effc5
-
SHA512
3538938e77cb834b945f787f0880dfc771552bdd45296862cfaa2f2f673fd12779a2a1357327321f80e5786adea3dd63c619f89aa79b6c98433d3efad14b9c29
-
SSDEEP
49152:ObpiQjMczQhnGLnc2fgqSZWIig/+spaBw:O9AThnM1fgVZWIFpaBw
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4368 WINWORD.EXE 4368 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 4368 WINWORD.EXE 4368 WINWORD.EXE 4368 WINWORD.EXE 4368 WINWORD.EXE 4368 WINWORD.EXE 4368 WINWORD.EXE 4368 WINWORD.EXE 4368 WINWORD.EXE 4368 WINWORD.EXE 4368 WINWORD.EXE 4368 WINWORD.EXE 4368 WINWORD.EXE 4368 WINWORD.EXE 4368 WINWORD.EXE 4368 WINWORD.EXE 4368 WINWORD.EXE 4368 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\kopje.rtf" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4368