Overview
overview
7Static
static
3OFW1_SDK/D...m1.vbs
windows7-x64
1OFW1_SDK/D...m1.vbs
windows10-2004-x64
1OFW1_SDK/D...32.dll
windows7-x64
3OFW1_SDK/D...32.dll
windows10-2004-x64
3OFW1_SDK/D...CK.dll
windows7-x64
3OFW1_SDK/D...CK.dll
windows10-2004-x64
3OFW1_SDK/D...VB.exe
windows7-x64
3OFW1_SDK/D...VB.exe
windows10-2004-x64
3OFW1_SDK/D...CX.dll
windows7-x64
3OFW1_SDK/D...CX.dll
windows10-2004-x64
3OFW1_SDK/D...CX.dll
windows7-x64
3OFW1_SDK/D...CX.dll
windows10-2004-x64
3OFW1_SDK/D...pk.dll
windows7-x64
7OFW1_SDK/D...pk.dll
windows10-2004-x64
7OFW1_SDK/D...��.doc
windows7-x64
4OFW1_SDK/D...��.doc
windows10-2004-x64
1OFW1_SDK/D...��.doc
windows7-x64
4OFW1_SDK/D...��.doc
windows10-2004-x64
1OFW1_SDK/D...m1.vbs
windows7-x64
1OFW1_SDK/D...m1.vbs
windows10-2004-x64
1OFW1_SDK/D...32.dll
windows7-x64
3OFW1_SDK/D...32.dll
windows10-2004-x64
3OFW1_SDK/D...CK.dll
windows7-x64
3OFW1_SDK/D...CK.dll
windows10-2004-x64
3OFW1_SDK/D...in.doc
windows7-x64
4OFW1_SDK/D...in.doc
windows10-2004-x64
1OFW1_SDK/D...W1.doc
windows7-x64
4OFW1_SDK/D...W1.doc
windows10-2004-x64
1OFW1_SDK/D...VB.exe
windows7-x64
3OFW1_SDK/D...VB.exe
windows10-2004-x64
3OFW1_SDK/D...CX.dll
windows7-x64
3OFW1_SDK/D...CX.dll
windows10-2004-x64
Analysis
-
max time kernel
133s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 11:38
Static task
static1
Behavioral task
behavioral1
Sample
OFW1_SDK/Demo_VB_CN/Form1.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
OFW1_SDK/Demo_VB_CN/Form1.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
OFW1_SDK/Demo_VB_CN/MSCOMM32.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
OFW1_SDK/Demo_VB_CN/MSCOMM32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
OFW1_SDK/Demo_VB_CN/MSWINSCK.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
OFW1_SDK/Demo_VB_CN/MSWINSCK.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
OFW1_SDK/Demo_VB_CN/OFW1_Demo_VB.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
OFW1_SDK/Demo_VB_CN/OFW1_Demo_VB.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
OFW1_SDK/Demo_VB_CN/OFW1_OCX.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
OFW1_SDK/Demo_VB_CN/OFW1_OCX.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
OFW1_SDK/Demo_VB_CN/OFW1_OCX.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
OFW1_SDK/Demo_VB_CN/OFW1_OCX.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
OFW1_SDK/Demo_VB_CN/lpk.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
OFW1_SDK/Demo_VB_CN/lpk.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
OFW1_SDK/Demo_VB_CN/消费机操作说明书.doc
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
OFW1_SDK/Demo_VB_CN/消费机操作说明书.doc
Resource
win10v2004-20240910-en
Behavioral task
behavioral17
Sample
OFW1_SDK/Demo_VB_CN/说明.doc
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
OFW1_SDK/Demo_VB_CN/说明.doc
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
OFW1_SDK/Demo_VB_TW/Form1.vbs
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
OFW1_SDK/Demo_VB_TW/Form1.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
OFW1_SDK/Demo_VB_TW/MSCOMM32.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
OFW1_SDK/Demo_VB_TW/MSCOMM32.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
OFW1_SDK/Demo_VB_TW/MSWINSCK.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
OFW1_SDK/Demo_VB_TW/MSWINSCK.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
OFW1_SDK/Demo_VB_TW/Mach_Explain.doc
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
OFW1_SDK/Demo_VB_TW/Mach_Explain.doc
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
OFW1_SDK/Demo_VB_TW/OFW1.doc
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
OFW1_SDK/Demo_VB_TW/OFW1.doc
Resource
win10v2004-20240910-en
Behavioral task
behavioral29
Sample
OFW1_SDK/Demo_VB_TW/OFW1_Demo_VB.exe
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
OFW1_SDK/Demo_VB_TW/OFW1_Demo_VB.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
OFW1_SDK/Demo_VB_TW/OFW1_OCX.dll
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
OFW1_SDK/Demo_VB_TW/OFW1_OCX.dll
Resource
win10v2004-20240802-en
General
-
Target
OFW1_SDK/Demo_VB_TW/Mach_Explain.doc
-
Size
53KB
-
MD5
58165d3f6d81ac1518395c5fe85ce120
-
SHA1
4c80e3e45ef6fd1e4dd2fced2131c07fb29beafa
-
SHA256
62eacd2f812d5cef2afe6c4048b41e9882c5f94b92f1b791cd6884ccdcf4a07f
-
SHA512
07a29f3ef14d4aa0a4fe5e3633e21dd0a73db365eff8ff0f40e9bb7357c32734f24c366379b08b74c98434b17c680e4e63854820ea5cfc29d1e1e16d5b884fa2
-
SSDEEP
384:slhexjflAUntXi5O4IvIBOIu32kkd6Lj56+Tpds9YpTddC:mhexDnAMtdN6VupTH
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 532 WINWORD.EXE 532 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 532 WINWORD.EXE 532 WINWORD.EXE 532 WINWORD.EXE 532 WINWORD.EXE 532 WINWORD.EXE 532 WINWORD.EXE 532 WINWORD.EXE 532 WINWORD.EXE 532 WINWORD.EXE 532 WINWORD.EXE 532 WINWORD.EXE 532 WINWORD.EXE 532 WINWORD.EXE 532 WINWORD.EXE 532 WINWORD.EXE 532 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\OFW1_SDK\Demo_VB_TW\Mach_Explain.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize2KB
MD55c73306a4479358b2cb62e379baa09ef
SHA11348911e6d65878de75afdccf2c727e60258d0b1
SHA2561cbdd654f3e34881e2e466976ac1a521cdc541aa8013026de694163fdaaeab82
SHA512558f348ba8a0b7bcbb03b583c4a20fbf3a70b3744391763f99d78f3141cbcbc3f876e817382539329f107161719db5f811b279cdf5a586edd36c60a08e688b0a