Overview
overview
10Static
static
3AvastProxy...xy.exe
windows7-x64
10AvastProxy...xy.exe
windows10-2004-x64
10AvastProxyQUY/wsc.dll
windows7-x64
1AvastProxyQUY/wsc.dll
windows10-2004-x64
1How Cathol...e.docx
windows7-x64
4How Cathol...e.docx
windows10-2004-x64
1How Cathol...ve.exe
windows7-x64
4How Cathol...ve.exe
windows10-2004-x64
7wwlib.dll
windows7-x64
8wwlib.dll
windows10-2004-x64
8Analysis
-
max time kernel
99s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 06:33
Static task
static1
Behavioral task
behavioral1
Sample
AvastProxyQUY/AvastProxy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
AvastProxyQUY/AvastProxy.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
AvastProxyQUY/wsc.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
AvastProxyQUY/wsc.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
How Catholics Adapt to Changes in China A Missiological Perspective.docx
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
How Catholics Adapt to Changes in China A Missiological Perspective.docx
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
How Catholics Adapt to Changes in China A Missiological Perspective.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
How Catholics Adapt to Changes in China A Missiological Perspective.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
wwlib.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
wwlib.dll
Resource
win10v2004-20240508-en
General
-
Target
wwlib.dll
-
Size
72KB
-
MD5
08dbf918208f44f0d74d096a901358cc
-
SHA1
0def86a1ad13283fe79f2e3d4f139eadd298d138
-
SHA256
a64997b94ebfea461c95d445a4d13aa4c4bd49604451208746d95d106b677053
-
SHA512
84ce422251a18bc0c3989ffd90a37f3aafe21c984fd8727384606f67f9b4f7f490dce1a960ec26b3a080204efd7bcde13b8cef19acec4ff28c534021c5f452b9
-
SSDEEP
1536:OqZc36GWQ679o77Kl0Evn9JKFkpQ1Ah1:OqZQmz0+l0Ev9FwAh1
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeflow pid process 7 1488 rundll32.exe 27 1488 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4848 WINWORD.EXE 4848 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
WINWORD.EXEpid process 4848 WINWORD.EXE 4848 WINWORD.EXE 4848 WINWORD.EXE 4848 WINWORD.EXE 4848 WINWORD.EXE 4848 WINWORD.EXE 4848 WINWORD.EXE 4848 WINWORD.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 2596 wrote to memory of 1488 2596 rundll32.exe rundll32.exe PID 2596 wrote to memory of 1488 2596 rundll32.exe rundll32.exe PID 2596 wrote to memory of 1488 2596 rundll32.exe rundll32.exe PID 1488 wrote to memory of 4848 1488 rundll32.exe WINWORD.EXE PID 1488 wrote to memory of 4848 1488 rundll32.exe WINWORD.EXE
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\wwlib.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\wwlib.dll,#12⤵
- Blocklisted process makes network request
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\How Catholics Adapt to Changes in China A Missiological Perspective.docx" /o ""3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4848
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\How Catholics Adapt to Changes in China A Missiological Perspective.docx
Filesize39KB
MD5b9c4cfefa7917160f4f0aa9d33c36eb1
SHA101f5b14973d3e29bd091a34df813d4959d2a2893
SHA256a4bfbccb9b567e077d1998cd081df974ebde88ce8f2c8319353fb404a3293a73
SHA5120cdca0417af28bac87499e5d104ddc6fc41b998fa5aea34eaa48101c422cbfa4f1507dbee95963e71846b3036f4940160f013f8d29ba8366e02da45f9275dbed
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84