Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 20:53
Behavioral task
behavioral1
Sample
加密文件破解工具 4.0/FileDecrypt.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
加密文件破解工具 4.0/FileDecrypt.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
加密文件破解工具 4.0/GetFile.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
加密文件破解工具 4.0/GetFile.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
加密文件破解工具 4.0/飘域家园.url
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
加密文件破解工具 4.0/飘域家园.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
加密文件破解工具 4.0/飘域家园,大型技术综合娱乐社区!.doc
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
加密文件破解工具 4.0/飘域家园,大型技术综合娱乐社区!.doc
Resource
win10v2004-20240802-en
General
-
Target
加密文件破解工具 4.0/飘域家园,大型技术综合娱乐社区!.doc
-
Size
13KB
-
MD5
8568b3bb8462803548780ac95a3b2932
-
SHA1
77ca00365c9939b15c9dffa55140fa2644e91d70
-
SHA256
fad653ae99e59f0d463b23f51c45dcb751c09c2081ce0411394393ec9b8371a1
-
SHA512
e498f4222cd7ea6d9cc7ab64fd7ebf4998168f69675412a6a5690699631e52c395f338f9edd4b9e4af7890bb63e1a44c9aa4c47032c36ab57cd573650c94ea3e
-
SSDEEP
96:x8dbZ2V0wzoo1FZ0MAy2YSYlTYlFelLlhgZvfT1LcwCZMRmTc6uHvfJQA1:x2bgzHFZYy2YSaYT1wDZMRmc6ur
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 5104 WINWORD.EXE 5104 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5104 WINWORD.EXE 5104 WINWORD.EXE 5104 WINWORD.EXE 5104 WINWORD.EXE 5104 WINWORD.EXE 5104 WINWORD.EXE 5104 WINWORD.EXE 5104 WINWORD.EXE 5104 WINWORD.EXE 5104 WINWORD.EXE 5104 WINWORD.EXE 5104 WINWORD.EXE 5104 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\加密文件破解工具 4.0\飘域家园,大型技术综合娱乐社区!.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:5104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5a0ecd5e720416a1afa419c1e90a7088a
SHA10c6fa89e7701331b63d858c4a8cdbf82565695cd
SHA2567998ed1e161ff9a061b907f8abbe53daa081367363da6e3e7dc6f3cc7fda8dff
SHA512b4fe2ca492b741ed0699a00a3b49a1d852e8fe40d140b9ac5e179d92490cae772afd9c4d76ba9f55cf9a600ee9db6b9166345563a600f993472fd21e4bf38b2a