Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 13:20
Static task
static1
Behavioral task
behavioral1
Sample
project templet test.zip
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
project templet test.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
our project templet test/our project templet test.docx
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
our project templet test/our project templet test.docx
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
our project templet test/templet.lnk
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
our project templet test/templet.lnk
Resource
win10v2004-20240412-en
General
-
Target
our project templet test/our project templet test.docx
-
Size
108KB
-
MD5
515a1ba1611a2212b4b6d2ae121898ad
-
SHA1
6214855065576ec84a0ff1f6fa3a4a69be20122e
-
SHA256
332794745f5622beb843399e988a12b2d388c97c92ff1860f847b4aeadc5e0a0
-
SHA512
58f8a5b000297dbb74741792b12b5eae5e05c16a5102d68b60c6c1c8dc866350466ac829bbd38fe69a52bf5195cea481ea4de758babab5b0cb97648d5768467a
-
SSDEEP
3072:MeL3WwspME/+buj2GixpE4qcO+a+W5bg2cWz0s0X:Mm39spXotlOdh5bg2NzEX
Malware Config
Signatures
-
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\~$sicSimple.dotx WINWORD.EXE File opened for modification C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\Word2013BW.dotx WINWORD.EXE File created C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\~$sicElegant.dotx WINWORD.EXE File created C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\~$Capitalized.dotx WINWORD.EXE File created C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\~$Classic.dotx WINWORD.EXE File opened for modification C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\Casual.dotx WINWORD.EXE File created C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\~$ntered.dotx WINWORD.EXE File opened for modification C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\BasicSimple.dotx WINWORD.EXE File created C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\~$sicStylish.dotx WINWORD.EXE File created C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\~$Numbered.dotx WINWORD.EXE File created C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\~$Casual.dotx WINWORD.EXE File opened for modification C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\BasicElegant.dotx WINWORD.EXE File opened for modification C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\BWCapitalized.dotx WINWORD.EXE File opened for modification C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\BWClassic.dotx WINWORD.EXE File opened for modification C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\BWNumbered.dotx WINWORD.EXE File created C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\~$rd2013BW.dotx WINWORD.EXE File opened for modification C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\Centered.dotx WINWORD.EXE File opened for modification C:\Program Files\Microsoft Office\Root\Office16\1033\QuickStyles\BasicStylish.dotx WINWORD.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4500 WINWORD.EXE 4500 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4500 WINWORD.EXE 4500 WINWORD.EXE 4500 WINWORD.EXE 4500 WINWORD.EXE 4500 WINWORD.EXE 4500 WINWORD.EXE 4500 WINWORD.EXE 4500 WINWORD.EXE 4500 WINWORD.EXE 4500 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\our project templet test\our project templet test.docx" /o ""1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5c4c38a7d937c652fe5c5a39c668f8d86
SHA1baacab0836afc11765e1896388d06f7a5deb9253
SHA25648b090cbfa1300a7a60f6eaafa08ddaccfc96943c8a3e943a4b9d9e45a18b52a
SHA51268c53bf3920cf12e2bcf5129dfe2ac61b4a0ef4bff6692daed401e53fda7eeda73a80ff13ed83d29fb03f97b8c5f5f3ad88890acffd3c12df0f3710dcd4d7caf
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.Word\~WRS{C9B695C2-6AC5-44F6-85FF-32B162F8D9FE}.tmp
Filesize1024B
MD55d4d94ee7e06bbb0af9584119797b23a
SHA1dbb111419c704f116efa8e72471dd83e86e49677
SHA2564826c0d860af884d3343ca6460b0006a7a2ce7dbccc4d743208585d997cc5fd1
SHA51295f83ae84cafcced5eaf504546725c34d5f9710e5ca2d11761486970f2fbeccb25f9cf50bbfc272bd75e1a66a18b7783f09e1c1454afda519624bc2bb2f28ba4
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84