Analysis
-
max time kernel
101s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 20:18
Static task
static1
Behavioral task
behavioral1
Sample
images/新云软件.url
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
images/新云软件.url
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
setup.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
setup.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
安装与配置说明.htm
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
安装与配置说明.htm
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
软件最终用户许可协议.rtf
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
软件最终用户许可协议.rtf
Resource
win10v2004-20240709-en
General
-
Target
软件最终用户许可协议.rtf
-
Size
45KB
-
MD5
512e9294770aa35fe9521002cb806d66
-
SHA1
43b83c1746deed8f66a3eb1e8f5c816031a63440
-
SHA256
422017b74b784353f40d4058ef38eea605abd1f7e409fe8b652c57360071d1e9
-
SHA512
480ca110415c22bf037363b9c4117855915a3f8e91ffdff13192fbe38171c21caf85fcee33c96490702d4bb5b24056edec4766b4e7c2d2f28c740a248ee68c4b
-
SSDEEP
192:cONPQflhdIe3rLt0N0yPfyXb57/evDvtdsts5bJ64UMwrzl7nxtIrgH070wNJEyQ:c6QhjLmLjrdxjVDZxG56oOGxGoxLB
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2780 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2780 WINWORD.EXE 2780 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2228 2780 WINWORD.EXE 30 PID 2780 wrote to memory of 2228 2780 WINWORD.EXE 30 PID 2780 wrote to memory of 2228 2780 WINWORD.EXE 30 PID 2780 wrote to memory of 2228 2780 WINWORD.EXE 30
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\软件最终用户许可协议.rtf"1⤵
- Drops file in Windows directory
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2228
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5011a071444dd467fd7101d47676947bc
SHA1fed570b2b7d722ed49a8052dca10c8ab5d8ff6b9
SHA256c00e79f90e7832eb0f7ef7e9c323cd7bfb0c134109b5cbdb7c2efa2622c6574b
SHA512e5f0311e8080d808586d819aa4629700f338f3c68534f8f20c3799430a9a199c6229138a85d2286f686bfa74912deba78c37827abbd434ba17f63f9117f37118