Analysis
-
max time kernel
102s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 01:32
Static task
static1
Behavioral task
behavioral1
Sample
30米石拱桥施工图/人行桥校审记录单.doc
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
30米石拱桥施工图/人行桥校审记录单.doc
Resource
win10v2004-20240802-en
General
-
Target
30米石拱桥施工图/人行桥校审记录单.doc
-
Size
35KB
-
MD5
681cada9a6da5e9390f57cdbea14dc67
-
SHA1
c37086a92375355d8d94691c589cc2d91e706731
-
SHA256
60922ec37b2be27238f487dc9dfde21ab8b53ec414e2a24d12068be1caa17902
-
SHA512
01b34a2dd4d709fc55cd122030d1bd644d33e5cdf227ab18a6e34985c14e9da6feb9e595483bbf0f9af11137cc511cd12769e560b79acd2a757312fea497488d
-
SSDEEP
384:OQxelYS1W222222NsbKXYEtYqAGBNYTjl:Pk2S1qoE6bl
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 756 WINWORD.EXE 756 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 756 WINWORD.EXE 756 WINWORD.EXE 756 WINWORD.EXE 756 WINWORD.EXE 756 WINWORD.EXE 756 WINWORD.EXE 756 WINWORD.EXE 756 WINWORD.EXE 756 WINWORD.EXE 756 WINWORD.EXE 756 WINWORD.EXE 756 WINWORD.EXE 756 WINWORD.EXE 756 WINWORD.EXE 756 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\30米石拱桥施工图\人行桥校审记录单.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
Filesize
16B
MD5d29962abc88624befc0135579ae485ec
SHA1e40a6458296ec6a2427bcb280572d023a9862b31
SHA256a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866
SHA5124311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize1KB
MD56500210c1d2b6bcb812da5aeb1283368
SHA17d4575d3b3045584134618e587cfe2fd737a6f56
SHA256e0bfa644b84878f7c3eb25c1b50807b424e060acf3a89586a058c3610ddb819a
SHA5125b4429d6fa13b634579adc312c3479532906a9f4e8b4df64465a47e2882289b36fca6e5269a632ae8ed59c300d8368c65434426fb2e9d7d1b3df57d4e7acd718