Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12-04-2024 04:03
Static task
static1
Behavioral task
behavioral1
Sample
北京邮电大学-硕士研究生-个人简历-高级软件开发工程师.docx.lnk
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
附件/docx/AppVIsvSubsystems64.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
附件/docx/AppVLP.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
附件/关于区块链法院建设性方案提要-相关系统统筹性建设开发.doc
Resource
win10v2004-20240226-en
General
-
Target
附件/关于区块链法院建设性方案提要-相关系统统筹性建设开发.doc
-
Size
16KB
-
MD5
120153d48589e7fdab7a0df7858518d3
-
SHA1
c013a0140efa513a9aed3f2ac4abb8e04c5b3381
-
SHA256
f2d9e72a63f7513afc2dd77e38f50bfaadb7842fb019432cb23adf881edab99c
-
SHA512
c88a1ec3bc53f0230b277e6ca84ae2296f318ba858f7ec03dd417e988bf6cae0f2bd3cf35afa4c19de719af35999f99b8e57b4b210a8c8a3e58b2b466c3d60dd
-
SSDEEP
192:NbAXGHxaem/hqgyZcw7MOglV1jo4DAmD:akxa05oDVN1DjD
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 2976 WINWORD.EXE 2976 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 61 IoCs
Processes:
taskmgr.exepid process 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskmgr.exepid process 2880 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
taskmgr.exedescription pid process Token: SeDebugPrivilege 2880 taskmgr.exe Token: SeSystemProfilePrivilege 2880 taskmgr.exe Token: SeCreateGlobalPrivilege 2880 taskmgr.exe -
Suspicious use of FindShellTrayWindow 55 IoCs
Processes:
taskmgr.exepid process 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe -
Suspicious use of SendNotifyMessage 54 IoCs
Processes:
taskmgr.exepid process 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe 2880 taskmgr.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
Processes:
WINWORD.EXEpid process 2976 WINWORD.EXE 2976 WINWORD.EXE 2976 WINWORD.EXE 2976 WINWORD.EXE 2976 WINWORD.EXE 2976 WINWORD.EXE 2976 WINWORD.EXE 2976 WINWORD.EXE 2976 WINWORD.EXE 2976 WINWORD.EXE 2976 WINWORD.EXE 2976 WINWORD.EXE 2976 WINWORD.EXE 2976 WINWORD.EXE 2976 WINWORD.EXE 2976 WINWORD.EXE 2976 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\附件\关于区块链法院建设性方案提要-相关系统统筹性建设开发.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2880-44-0x000001F49A810000-0x000001F49A811000-memory.dmpFilesize
4KB
-
memory/2880-55-0x000001F49A810000-0x000001F49A811000-memory.dmpFilesize
4KB
-
memory/2880-56-0x000001F49A810000-0x000001F49A811000-memory.dmpFilesize
4KB
-
memory/2880-54-0x000001F49A810000-0x000001F49A811000-memory.dmpFilesize
4KB
-
memory/2880-53-0x000001F49A810000-0x000001F49A811000-memory.dmpFilesize
4KB
-
memory/2880-52-0x000001F49A810000-0x000001F49A811000-memory.dmpFilesize
4KB
-
memory/2880-51-0x000001F49A810000-0x000001F49A811000-memory.dmpFilesize
4KB
-
memory/2880-50-0x000001F49A810000-0x000001F49A811000-memory.dmpFilesize
4KB
-
memory/2880-46-0x000001F49A810000-0x000001F49A811000-memory.dmpFilesize
4KB
-
memory/2880-45-0x000001F49A810000-0x000001F49A811000-memory.dmpFilesize
4KB
-
memory/2976-10-0x00007FFDC20F0000-0x00007FFDC22E5000-memory.dmpFilesize
2.0MB
-
memory/2976-39-0x00007FFDC20F0000-0x00007FFDC22E5000-memory.dmpFilesize
2.0MB
-
memory/2976-12-0x00007FFD80060000-0x00007FFD80070000-memory.dmpFilesize
64KB
-
memory/2976-13-0x00007FFDC20F0000-0x00007FFDC22E5000-memory.dmpFilesize
2.0MB
-
memory/2976-14-0x00007FFDC20F0000-0x00007FFDC22E5000-memory.dmpFilesize
2.0MB
-
memory/2976-16-0x00007FFD80060000-0x00007FFD80070000-memory.dmpFilesize
64KB
-
memory/2976-17-0x00007FFDC20F0000-0x00007FFDC22E5000-memory.dmpFilesize
2.0MB
-
memory/2976-15-0x00007FFDC20F0000-0x00007FFDC22E5000-memory.dmpFilesize
2.0MB
-
memory/2976-18-0x00007FFDC20F0000-0x00007FFDC22E5000-memory.dmpFilesize
2.0MB
-
memory/2976-19-0x00007FFDC20F0000-0x00007FFDC22E5000-memory.dmpFilesize
2.0MB
-
memory/2976-20-0x00007FFDC20F0000-0x00007FFDC22E5000-memory.dmpFilesize
2.0MB
-
memory/2976-21-0x00007FFDC20F0000-0x00007FFDC22E5000-memory.dmpFilesize
2.0MB
-
memory/2976-24-0x00007FFDC20F0000-0x00007FFDC22E5000-memory.dmpFilesize
2.0MB
-
memory/2976-37-0x00007FFDC20F0000-0x00007FFDC22E5000-memory.dmpFilesize
2.0MB
-
memory/2976-38-0x00007FFDC20F0000-0x00007FFDC22E5000-memory.dmpFilesize
2.0MB
-
memory/2976-11-0x00007FFDC20F0000-0x00007FFDC22E5000-memory.dmpFilesize
2.0MB
-
memory/2976-2-0x00007FFDC20F0000-0x00007FFDC22E5000-memory.dmpFilesize
2.0MB
-
memory/2976-9-0x00007FFDC20F0000-0x00007FFDC22E5000-memory.dmpFilesize
2.0MB
-
memory/2976-0-0x00007FFD82170000-0x00007FFD82180000-memory.dmpFilesize
64KB
-
memory/2976-1-0x00007FFD82170000-0x00007FFD82180000-memory.dmpFilesize
64KB
-
memory/2976-7-0x00007FFDC20F0000-0x00007FFDC22E5000-memory.dmpFilesize
2.0MB
-
memory/2976-8-0x00007FFD82170000-0x00007FFD82180000-memory.dmpFilesize
64KB
-
memory/2976-6-0x00007FFD82170000-0x00007FFD82180000-memory.dmpFilesize
64KB
-
memory/2976-5-0x00007FFDC20F0000-0x00007FFDC22E5000-memory.dmpFilesize
2.0MB
-
memory/2976-3-0x00007FFDC20F0000-0x00007FFDC22E5000-memory.dmpFilesize
2.0MB
-
memory/2976-4-0x00007FFD82170000-0x00007FFD82180000-memory.dmpFilesize
64KB
-
memory/2976-71-0x00007FFD82170000-0x00007FFD82180000-memory.dmpFilesize
64KB
-
memory/2976-72-0x00007FFD82170000-0x00007FFD82180000-memory.dmpFilesize
64KB
-
memory/2976-73-0x00007FFD82170000-0x00007FFD82180000-memory.dmpFilesize
64KB
-
memory/2976-74-0x00007FFD82170000-0x00007FFD82180000-memory.dmpFilesize
64KB
-
memory/2976-76-0x00007FFDC20F0000-0x00007FFDC22E5000-memory.dmpFilesize
2.0MB
-
memory/2976-75-0x00007FFDC20F0000-0x00007FFDC22E5000-memory.dmpFilesize
2.0MB