Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 04:11
Static task
static1
Behavioral task
behavioral1
Sample
四川大学-硕士研究生-个人简历.docx.lnk
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
四川大学-硕士研究生-个人简历.docx.lnk
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
附件/docx/AppVIsvSubsystems64.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
附件/docx/AppVIsvSubsystems64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
附件/docx/appvlp.exe
Resource
win10v2004-20240802-en
General
-
Target
四川大学-硕士研究生-个人简历.docx.lnk
-
Size
736B
-
MD5
e9cb7495732489f80b5d639c165e0220
-
SHA1
7aca884d4c8d13d74aeca963bc65b197fb50fdee
-
SHA256
581439600098ce0758f7241e6ab4ad888fd43c10a0653f6326e1b8b76aeb90b4
-
SHA512
88563d2c7f031c1deeee93166ac25d0385b1b2a71b8cc1e03de8014107eedeb615dc299cf304484adfeb2dcf35833d283ee3aa44f23ead0f13f48beb176fda81
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2776 wrote to memory of 1672 2776 cmd.exe 85 PID 2776 wrote to memory of 1672 2776 cmd.exe 85 PID 4196 wrote to memory of 3964 4196 explorer.exe 87 PID 4196 wrote to memory of 3964 4196 explorer.exe 87
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\四川大学-硕士研究生-个人简历.docx.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe" ".\附件\docx\appvlp.exe"2⤵PID:1672
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\附件\docx\appvlp.exe"C:\Users\Admin\AppData\Local\Temp\附件\docx\appvlp.exe"2⤵PID:3964
-