Overview
overview
7Static
static
7replacesetup.exe
windows7-x64
7replacesetup.exe
windows10-2004-x64
7Clash Pack....1.exe
windows7-x64
7Clash Pack....1.exe
windows10-2004-x64
7Sinicizati...er.exe
windows7-x64
7Sinicizati...er.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3asar/linux...�.docx
windows7-x64
4asar/linux...�.docx
windows10-2004-x64
1Clash-for-...rer.js
windows7-x64
3Clash-for-...rer.js
windows10-2004-x64
3Clash-for-...ain.js
windows7-x64
3Clash-for-...ain.js
windows10-2004-x64
3Clash-for-...rer.js
windows7-x64
3Clash-for-...rer.js
windows10-2004-x64
3简易封�....1.exe
windows7-x64
7简易封�....1.exe
windows10-2004-x64
7Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-07-2024 12:49
Behavioral task
behavioral1
Sample
replacesetup.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
replacesetup.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Clash Packager/简易封包工具_3.2.0.1.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Clash Packager/简易封包工具_3.2.0.1.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Sinicization/npp.8.1.4.Installer.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Sinicization/npp.8.1.4.Installer.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
asar/linux安装asar文件解压打包组件.docx
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
asar/linux安装asar文件解压打包组件.docx
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
Clash-for-Windows_Chinese-CFA/chinese_file/Manual-Chinese/renderer.js
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
Clash-for-Windows_Chinese-CFA/chinese_file/Manual-Chinese/renderer.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
Clash-for-Windows_Chinese-CFA/chinese_file/Sinicization_files/main.js
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
Clash-for-Windows_Chinese-CFA/chinese_file/Sinicization_files/main.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
Clash-for-Windows_Chinese-CFA/chinese_file/Sinicization_files/renderer.js
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
Clash-for-Windows_Chinese-CFA/chinese_file/Sinicization_files/renderer.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
简易封包工具_3.2.0.1.exe
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
简易封包工具_3.2.0.1.exe
Resource
win10v2004-20240709-en
General
-
Target
asar/linux安装asar文件解压打包组件.docx
-
Size
16KB
-
MD5
973a163e8cb4d6c4da477dd6e6b78063
-
SHA1
c25cdc29859d0131971c5122bc5de1ff6b64e5f6
-
SHA256
e58679811fe06fd16642942a8f61b77eb8c5f3efcee7396ec5e41b77da46d7dd
-
SHA512
c897f7bd124053118063d8a28a71b2ee2e4245d9726d63176541921eb415a9dfecda195260d11b2f4cf91fab428a97faa62cbd347c1dff82dc012c3739f19743
-
SSDEEP
192:jhvAkoUR7fznSqqi6+zxFgbET6sjbnlJ1jtyQDubjya4LOrgDBIwMIT1TkRiW:d7bRnnzqi6q2oTjjlwQDubmxqgFSpRiW
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
Processes:
WINWORD.EXEdescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 2800 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 2800 WINWORD.EXE 2800 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
WINWORD.EXEdescription pid process target process PID 2800 wrote to memory of 2748 2800 WINWORD.EXE splwow64.exe PID 2800 wrote to memory of 2748 2800 WINWORD.EXE splwow64.exe PID 2800 wrote to memory of 2748 2800 WINWORD.EXE splwow64.exe PID 2800 wrote to memory of 2748 2800 WINWORD.EXE splwow64.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\asar\linux安装asar文件解压打包组件.docx"1⤵
- Drops file in Windows directory
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2748
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5edfdae071105eb66cbcf94826ad819f3
SHA1b457d3fe9c79c5105e20d1b3a2ff3cfa2d049e27
SHA25619a4baccb2dfe9b2cba3d28c098b42b2c5c74a690f1ee69918a25d0395fc7478
SHA5122f7c2a15e3fea5cb8187072e24d9b4665b5f8c6968c3d3a669dc9b5b74001f49fd507a153e822e7b1aed56857f73daeaa8b894a6c4b9c5d5e2dc263a1b2ed85a