Analysis
-
max time kernel
102s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
13/06/2024, 22:28
Static task
static1
Behavioral task
behavioral1
Sample
交通设计课程设计/交叉口交通设计.doc
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
交通设计课程设计/交叉口交通设计.doc
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
交通设计课程设计/仿真说明书.doc
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
交通设计课程设计/仿真说明书.doc
Resource
win10v2004-20240611-en
General
-
Target
交通设计课程设计/交叉口交通设计.doc
-
Size
254KB
-
MD5
dd8a1e23ecce502b5599c70f22acc013
-
SHA1
a22f8000d9f3b577a29222dd8ca44434d57248f2
-
SHA256
816d126e0af467999c7c537ebddc391746c2c7ae79db9d65c6627858afe16140
-
SHA512
154845944d13011d1beae731a61b738194dea706acc1d71033dad35ba7dd4bfda422f527e156c9f7aebd61dd021c0a7bcc1fe0e37129c429127807fe7ad51f9c
-
SSDEEP
3072:9CYIY4BvLj263i0yHPIsXv4GRQI2s9hugZTMnz0mL1UpZZA:9qBvLj263iFL4yQI2s9jZmzxL
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4472 WINWORD.EXE 4472 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 4472 WINWORD.EXE 4472 WINWORD.EXE 4472 WINWORD.EXE 4472 WINWORD.EXE 4472 WINWORD.EXE 4472 WINWORD.EXE 4472 WINWORD.EXE 4472 WINWORD.EXE 4472 WINWORD.EXE 4472 WINWORD.EXE 4472 WINWORD.EXE 4472 WINWORD.EXE 4472 WINWORD.EXE 4472 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\交通设计课程设计\交叉口交通设计.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD5c00654dd99cf8804416c1bec63a91a39
SHA1b6cece2b410f6affbe8d12e0fda9856f5eb9efe8
SHA25614e322bc34f826476435f3990dde6d0e305f0d5df3c29e6f5f2bf4e58cd4d190
SHA512df1cc8a6cf7c43f28079e9f3b05d18a77c292ee64d130254742ee300611e13e651a04ab0929feb50deb40a6d168c29575d736e7cd5eca54e5c047c78c149ac40
-
Filesize
1KB
MD56d240969d121e7db5a95d1e9f727707e
SHA1aa4e56de4a4381d665fd6f2f97cb37bf422ad910
SHA25682e187377ce45c330e7868bdcaa13c856237c033cf2f544f4ed26d553859f66a
SHA5123bfce9bf01e164ec46a5dde5449b03a10caea486da6fed4296b0db2a3665f903189e4931062e7a58cbc3824c7021211bfb7f8f03701d86e8da7826a361047b08
-
Filesize
162B
MD5a53ff3b2b74b0493cd2dd5351bcb2760
SHA1982c525be61d9769829d2f0a94db5d61d95ba050
SHA256ac5f55a119b8894f347a6e85328d4a1e7ba350e0d4ea98ce1d3b2f95faecb5f2
SHA5120e33adb10427d0e8bef3e170009361cc569f0ea0ccba63609bb91cb7830a8ee7b4c65c92fc56def2d0ab5e69f6ca955410f1b3761ab34d18cc45bbdcb10f7f65
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84