Analysis

  • max time kernel
    133s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/10/2024, 05:55

General

  • Target

    暴雨在线QQ搜索2009/暴雨在线QQ搜索注册版/help.doc

  • Size

    187KB

  • MD5

    67f56ed09f9d01a6e5d20991e4b2f3e8

  • SHA1

    562e2f03d55176e1a9cab26cbc91e374791256db

  • SHA256

    35484a2868743a35f173b5c47ca93129fdba3c0cca7f8b44442cfc43ace477ea

  • SHA512

    1b594d264d92b99ddd7ff88b7fa5bdaa45e0db4a8c28b995d724c08da25aaa735ce5bab0d7dd0a4362f542227b38836074d3bb25f1b350c193157eee6ce34d02

  • SSDEEP

    3072:OLsek1pROnrhyF44QfqXp+JS3O1LKMInQjzat/5SbvE3gSEFW7MLmz/30HvbDDDB:OLsek1pROnrhyF44ys+JS3O0v6e/kbv4

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\暴雨在线QQ搜索2009\暴雨在线QQ搜索注册版\help.doc" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TCDF10B.tmp\sist02.xsl

    Filesize

    245KB

    MD5

    f883b260a8d67082ea895c14bf56dd56

    SHA1

    7954565c1f243d46ad3b1e2f1baf3281451fc14b

    SHA256

    ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

    SHA512

    d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

    Filesize

    3KB

    MD5

    60105479286ae91d7c05d67af23382ae

    SHA1

    23a2c216a5ae768a71d11957cbfecb3dbf4ac6ff

    SHA256

    552bc4751c6eace5d47963def9e3384779218933f89d662f983efeafaf356a05

    SHA512

    72b3132f011a77c136caafb3e7c2d49fbdeb2cf995efa9f4f5aa464c44b05ca5466cfb9798fbc5874b131006b71d018985b9b219a829795921c0f82965646b1e

  • memory/1492-16-0x00007FF84F460000-0x00007FF84F470000-memory.dmp

    Filesize

    64KB

  • memory/1492-11-0x00007FF891D10000-0x00007FF891F05000-memory.dmp

    Filesize

    2.0MB

  • memory/1492-4-0x00007FF891D10000-0x00007FF891F05000-memory.dmp

    Filesize

    2.0MB

  • memory/1492-6-0x00007FF891D10000-0x00007FF891F05000-memory.dmp

    Filesize

    2.0MB

  • memory/1492-8-0x00007FF851D90000-0x00007FF851DA0000-memory.dmp

    Filesize

    64KB

  • memory/1492-9-0x00007FF891D10000-0x00007FF891F05000-memory.dmp

    Filesize

    2.0MB

  • memory/1492-12-0x00007FF891D10000-0x00007FF891F05000-memory.dmp

    Filesize

    2.0MB

  • memory/1492-15-0x00007FF891D10000-0x00007FF891F05000-memory.dmp

    Filesize

    2.0MB

  • memory/1492-14-0x00007FF891D10000-0x00007FF891F05000-memory.dmp

    Filesize

    2.0MB

  • memory/1492-10-0x00007FF891D10000-0x00007FF891F05000-memory.dmp

    Filesize

    2.0MB

  • memory/1492-2-0x00007FF851D90000-0x00007FF851DA0000-memory.dmp

    Filesize

    64KB

  • memory/1492-0-0x00007FF851D90000-0x00007FF851DA0000-memory.dmp

    Filesize

    64KB

  • memory/1492-13-0x00007FF891D10000-0x00007FF891F05000-memory.dmp

    Filesize

    2.0MB

  • memory/1492-7-0x00007FF891D10000-0x00007FF891F05000-memory.dmp

    Filesize

    2.0MB

  • memory/1492-5-0x00007FF851D90000-0x00007FF851DA0000-memory.dmp

    Filesize

    64KB

  • memory/1492-17-0x00007FF84F460000-0x00007FF84F470000-memory.dmp

    Filesize

    64KB

  • memory/1492-29-0x00007FF891D10000-0x00007FF891F05000-memory.dmp

    Filesize

    2.0MB

  • memory/1492-30-0x00007FF891DAD000-0x00007FF891DAE000-memory.dmp

    Filesize

    4KB

  • memory/1492-31-0x00007FF891D10000-0x00007FF891F05000-memory.dmp

    Filesize

    2.0MB

  • memory/1492-32-0x00007FF891D10000-0x00007FF891F05000-memory.dmp

    Filesize

    2.0MB

  • memory/1492-3-0x00007FF851D90000-0x00007FF851DA0000-memory.dmp

    Filesize

    64KB

  • memory/1492-1-0x00007FF891DAD000-0x00007FF891DAE000-memory.dmp

    Filesize

    4KB