Overview
overview
10Static
static
3Resource/A...me.xml
windows10-2004-x64
1Resource/A...gs.xml
windows10-2004-x64
1Resource/T...r.admx
windows10-2004-x64
3Resource/T...r.admx
windows10-2004-x64
3Resource/T...r.admx
windows10-2004-x64
3Resource/inetres.xml
windows10-2004-x64
1Resource/kdc.admx
windows10-2004-x64
3Resource/msched.xml
windows10-2004-x64
1Resource/nca.admx
windows10-2004-x64
3Resource/pca.admx
windows10-2004-x64
3Resource/s...g.admx
windows10-2004-x64
3Resource/srm-fci.admx
windows10-2004-x64
3Resource/tcpip.xml
windows10-2004-x64
1Resource/wlansvc.xml
windows10-2004-x64
1Resource/wwansvc.xml
windows10-2004-x64
1Setup.exe
windows10-2004-x64
10cufflink.vcf
windows10-2004-x64
3madbasic_.dll
windows10-2004-x64
1maddisAsm_.dll
windows10-2004-x64
1madexcept_.dll
windows10-2004-x64
1quin.doc
windows10-2004-x64
1resources.pak
windows10-2004-x64
3rtl120.dll
windows10-2004-x64
1vcl120.dll
windows10-2004-x64
1vclx120.dll
windows10-2004-x64
3x64/Templa...te.htm
windows10-2004-x64
1x64/plugin...ns.dll
windows10-2004-x64
1x64/ripp.exe
windows10-2004-x64
1x64/tipa.exe
windows10-2004-x64
1x64/upd.exe
windows10-2004-x64
8x64/zlib.exe
windows10-2004-x64
18866 Passwords.txt
windows10-2004-x64
1Analysis
-
max time kernel
335s -
max time network
361s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 06:33
Static task
static1
Behavioral task
behavioral1
Sample
Resource/AppXRuntime.xml
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
Resource/AuditSettings.xml
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
Resource/TaskScheduler.admx
Resource
win10v2004-20240412-en
Behavioral task
behavioral4
Sample
Resource/TerminalServer-Server.admx
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
Resource/TerminalServer.admx
Resource
win10v2004-20240412-en
Behavioral task
behavioral6
Sample
Resource/inetres.xml
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
Resource/kdc.admx
Resource
win10v2004-20240412-en
Behavioral task
behavioral8
Sample
Resource/msched.xml
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
Resource/nca.admx
Resource
win10v2004-20240412-en
Behavioral task
behavioral10
Sample
Resource/pca.admx
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
Resource/sdiageng.admx
Resource
win10v2004-20240226-en
Behavioral task
behavioral12
Sample
Resource/srm-fci.admx
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
Resource/tcpip.xml
Resource
win10v2004-20240412-en
Behavioral task
behavioral14
Sample
Resource/wlansvc.xml
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
Resource/wwansvc.xml
Resource
win10v2004-20240412-en
Behavioral task
behavioral16
Sample
Setup.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
cufflink.vcf
Resource
win10v2004-20240412-en
Behavioral task
behavioral18
Sample
madbasic_.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
maddisAsm_.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral20
Sample
madexcept_.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
quin.doc
Resource
win10v2004-20240412-en
Behavioral task
behavioral22
Sample
resources.pak
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
rtl120.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral24
Sample
vcl120.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral25
Sample
vclx120.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral26
Sample
x64/Templates/TemplateCorreoCliente.htm
Resource
win10v2004-20240412-en
Behavioral task
behavioral27
Sample
x64/plugins/MahApps.Metro.IconPacks.PixelartIcons.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral28
Sample
x64/ripp.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
x64/tipa.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral30
Sample
x64/upd.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral31
Sample
x64/zlib.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral32
Sample
8866 Passwords.txt
Resource
win10v2004-20240412-en
General
-
Target
quin.doc
-
Size
779KB
-
MD5
d6e4657a83e3388fbd9b1b33e2aa868a
-
SHA1
87473eb0b2bfd1c84c8e605655a5d7e1b9861914
-
SHA256
4e5a146637b0bbb3ae7c6d24c2afe979e2cee2ae1df61ed6225d68cf7e4ac3ec
-
SHA512
30857ba44582505ef2b0909a476d2c51013066ea207b70a8b6f47e1a13459a69edcc02da2fb85e3034d01f38edf66f15fbf3056f2ac9ad93637bc081106dede8
-
SSDEEP
12288:/NGBdMAYY8b1JNKu17yD8T4Xf7gMH8k+7JP5Hmk8MBH5ldI6lwp63/zDGm5z:gHuB7yA4P7lcz7t9mk8MRacwUXF
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3620 WINWORD.EXE 3620 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 30 IoCs
pid Process 3620 WINWORD.EXE 3620 WINWORD.EXE 3620 WINWORD.EXE 3620 WINWORD.EXE 3620 WINWORD.EXE 3620 WINWORD.EXE 3620 WINWORD.EXE 3620 WINWORD.EXE 3620 WINWORD.EXE 3620 WINWORD.EXE 3620 WINWORD.EXE 3620 WINWORD.EXE 3620 WINWORD.EXE 3620 WINWORD.EXE 3620 WINWORD.EXE 3620 WINWORD.EXE 3620 WINWORD.EXE 3620 WINWORD.EXE 3620 WINWORD.EXE 3620 WINWORD.EXE 3620 WINWORD.EXE 3620 WINWORD.EXE 3620 WINWORD.EXE 3620 WINWORD.EXE 3620 WINWORD.EXE 3620 WINWORD.EXE 3620 WINWORD.EXE 3620 WINWORD.EXE 3620 WINWORD.EXE 3620 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\quin.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3620