Overview
overview
4Static
static
1广州铁�...�.docx
windows7-x64
4广州铁�...�.docx
windows10-2004-x64
1广州铁�...��.xls
windows7-x64
1广州铁�...��.xls
windows10-2004-x64
1广州铁�...��.xls
windows7-x64
1广州铁�...��.xls
windows10-2004-x64
1广州铁�...��.doc
windows7-x64
4广州铁�...��.doc
windows10-2004-x64
1广州铁�...��.doc
windows7-x64
4广州铁�...��.doc
windows10-2004-x64
1Analysis
-
max time kernel
112s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
27/04/2024, 08:11
Static task
static1
Behavioral task
behavioral1
Sample
广州铁通增城分局沙庄局点龙地村FTTH接入工程/广州铁通增城分局沙庄局点龙地集客接入工程.docx
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
广州铁通增城分局沙庄局点龙地村FTTH接入工程/广州铁通增城分局沙庄局点龙地集客接入工程.docx
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
广州铁通增城分局沙庄局点龙地村FTTH接入工程/广州铁通增城分局沙庄局点龙地集客接入工程.xls
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
广州铁通增城分局沙庄局点龙地村FTTH接入工程/广州铁通增城分局沙庄局点龙地集客接入工程.xls
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
广州铁通增城分局沙庄局点龙地村FTTH接入工程/立项估算.xls
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
广州铁通增城分局沙庄局点龙地村FTTH接入工程/立项估算.xls
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
广州铁通增城分局沙庄局点龙地村FTTH接入工程/需求信息表.doc
Resource
win7-20240419-en
Behavioral task
behavioral8
Sample
广州铁通增城分局沙庄局点龙地村FTTH接入工程/需求信息表.doc
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
广州铁通增城分局沙庄局点龙地村FTTH接入工程/项目技术实施方案.doc
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
广州铁通增城分局沙庄局点龙地村FTTH接入工程/项目技术实施方案.doc
Resource
win10v2004-20240226-en
General
-
Target
广州铁通增城分局沙庄局点龙地村FTTH接入工程/需求信息表.doc
-
Size
37KB
-
MD5
605bee90c4a4bf5741a6a310560e0e6f
-
SHA1
72cd54974ffb074f8e7c6be9115c8b44a0868948
-
SHA256
4e5cdc63c90b99a35f74d1e1608d4ba01fcb52860049809628598a527e7a90a7
-
SHA512
255e3ff2290dd02ef8eff118d9f2cf09767b233a142e5d95395a9872d03b0ff50fff26b2bcba08c5b2db736bccc0d59a17921591a45470f20e7e259dfc9780e7
-
SSDEEP
384:iIAoU/C8BLIxL3X7T5yGcSxwAjLRN59hgV:izLBUfRlhq
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 876 WINWORD.EXE 876 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 876 WINWORD.EXE 876 WINWORD.EXE 876 WINWORD.EXE 876 WINWORD.EXE 876 WINWORD.EXE 876 WINWORD.EXE 876 WINWORD.EXE 876 WINWORD.EXE 876 WINWORD.EXE 876 WINWORD.EXE 876 WINWORD.EXE 876 WINWORD.EXE 876 WINWORD.EXE 876 WINWORD.EXE 876 WINWORD.EXE 876 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\广州铁通增城分局沙庄局点龙地村FTTH接入工程\需求信息表.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:876