Overview
overview
7Static
static
3OFW1_SDK/D...m1.vbs
windows7-x64
1OFW1_SDK/D...m1.vbs
windows10-2004-x64
1OFW1_SDK/D...32.dll
windows7-x64
3OFW1_SDK/D...32.dll
windows10-2004-x64
3OFW1_SDK/D...CK.dll
windows7-x64
3OFW1_SDK/D...CK.dll
windows10-2004-x64
3OFW1_SDK/D...VB.exe
windows7-x64
3OFW1_SDK/D...VB.exe
windows10-2004-x64
3OFW1_SDK/D...CX.dll
windows7-x64
3OFW1_SDK/D...CX.dll
windows10-2004-x64
3OFW1_SDK/D...CX.dll
windows7-x64
3OFW1_SDK/D...CX.dll
windows10-2004-x64
3OFW1_SDK/D...pk.dll
windows7-x64
7OFW1_SDK/D...pk.dll
windows10-2004-x64
7OFW1_SDK/D...��.doc
windows7-x64
4OFW1_SDK/D...��.doc
windows10-2004-x64
1OFW1_SDK/D...��.doc
windows7-x64
4OFW1_SDK/D...��.doc
windows10-2004-x64
1OFW1_SDK/D...m1.vbs
windows7-x64
1OFW1_SDK/D...m1.vbs
windows10-2004-x64
1OFW1_SDK/D...32.dll
windows7-x64
3OFW1_SDK/D...32.dll
windows10-2004-x64
3OFW1_SDK/D...CK.dll
windows7-x64
3OFW1_SDK/D...CK.dll
windows10-2004-x64
3OFW1_SDK/D...in.doc
windows7-x64
4OFW1_SDK/D...in.doc
windows10-2004-x64
1OFW1_SDK/D...W1.doc
windows7-x64
4OFW1_SDK/D...W1.doc
windows10-2004-x64
1OFW1_SDK/D...VB.exe
windows7-x64
3OFW1_SDK/D...VB.exe
windows10-2004-x64
3OFW1_SDK/D...CX.dll
windows7-x64
3OFW1_SDK/D...CX.dll
windows10-2004-x64
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 11:38
Static task
static1
Behavioral task
behavioral1
Sample
OFW1_SDK/Demo_VB_CN/Form1.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
OFW1_SDK/Demo_VB_CN/Form1.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
OFW1_SDK/Demo_VB_CN/MSCOMM32.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
OFW1_SDK/Demo_VB_CN/MSCOMM32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
OFW1_SDK/Demo_VB_CN/MSWINSCK.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
OFW1_SDK/Demo_VB_CN/MSWINSCK.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
OFW1_SDK/Demo_VB_CN/OFW1_Demo_VB.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
OFW1_SDK/Demo_VB_CN/OFW1_Demo_VB.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
OFW1_SDK/Demo_VB_CN/OFW1_OCX.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
OFW1_SDK/Demo_VB_CN/OFW1_OCX.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
OFW1_SDK/Demo_VB_CN/OFW1_OCX.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
OFW1_SDK/Demo_VB_CN/OFW1_OCX.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
OFW1_SDK/Demo_VB_CN/lpk.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
OFW1_SDK/Demo_VB_CN/lpk.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
OFW1_SDK/Demo_VB_CN/消费机操作说明书.doc
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
OFW1_SDK/Demo_VB_CN/消费机操作说明书.doc
Resource
win10v2004-20240910-en
Behavioral task
behavioral17
Sample
OFW1_SDK/Demo_VB_CN/说明.doc
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
OFW1_SDK/Demo_VB_CN/说明.doc
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
OFW1_SDK/Demo_VB_TW/Form1.vbs
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
OFW1_SDK/Demo_VB_TW/Form1.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
OFW1_SDK/Demo_VB_TW/MSCOMM32.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
OFW1_SDK/Demo_VB_TW/MSCOMM32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
OFW1_SDK/Demo_VB_TW/MSWINSCK.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
OFW1_SDK/Demo_VB_TW/MSWINSCK.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
OFW1_SDK/Demo_VB_TW/Mach_Explain.doc
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
OFW1_SDK/Demo_VB_TW/Mach_Explain.doc
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
OFW1_SDK/Demo_VB_TW/OFW1.doc
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
OFW1_SDK/Demo_VB_TW/OFW1.doc
Resource
win10v2004-20240910-en
Behavioral task
behavioral29
Sample
OFW1_SDK/Demo_VB_TW/OFW1_Demo_VB.exe
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
OFW1_SDK/Demo_VB_TW/OFW1_Demo_VB.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
OFW1_SDK/Demo_VB_TW/OFW1_OCX.dll
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
OFW1_SDK/Demo_VB_TW/OFW1_OCX.dll
Resource
win10v2004-20240802-en
General
-
Target
OFW1_SDK/Demo_VB_CN/消费机操作说明书.doc
-
Size
49KB
-
MD5
318a8333cbf03dcd5054e51274ce0b0c
-
SHA1
427d3bfed04d48f62a2496bcdaf234700e707a55
-
SHA256
33b7de975b08a0244b4081a407dbd487d5be75a193f72875ad0b1f823badb101
-
SHA512
92212b7232fd17526f4c3260cf86f56464678d023c80db057ad89eaaacb38e18d750efb95792874aa38bbe9a1111c3a3fd7b0b81ad4891eb26d4a6523ae53356
-
SSDEEP
384:O1E6FwkqwJ6JL16akklbkAJoBL3TCbI3:Oi76ckSoBL3TB3
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4840 WINWORD.EXE 4840 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 4840 WINWORD.EXE 4840 WINWORD.EXE 4840 WINWORD.EXE 4840 WINWORD.EXE 4840 WINWORD.EXE 4840 WINWORD.EXE 4840 WINWORD.EXE 4840 WINWORD.EXE 4840 WINWORD.EXE 4840 WINWORD.EXE 4840 WINWORD.EXE 4840 WINWORD.EXE 4840 WINWORD.EXE 4840 WINWORD.EXE 4840 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\OFW1_SDK\Demo_VB_CN\消费机操作说明书.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD5077625b18266861cb6f009823dfd10e4
SHA195af0fde2e2d1c94e76fab96c670fa2a08536fa3
SHA2569e5c22d6d3ac1d4d5c099e386f7e8e1438ebeb245939d4e9d2bed475a60017e5
SHA5126fa78c4b39cf677d986d5dcb2ab94b847b4aa1c71079ee5835f03be204923dfb85905a9d0a9ec74645c28a6cd97db732c0e69f935bcc7c6482e31026341b5d85