Overview
overview
5Static
static
5暴雨在�...��.url
windows7-x64
1暴雨在�...��.url
windows10-2004-x64
1暴雨在�...il.exe
windows7-x64
5暴雨在�...il.exe
windows10-2004-x64
5暴雨在�...LL.dll
windows7-x64
3暴雨在�...LL.dll
windows10-2004-x64
3暴雨在�...TL.dll
windows7-x64
3暴雨在�...TL.dll
windows10-2004-x64
暴雨在�...lp.doc
windows7-x64
4暴雨在�...lp.doc
windows10-2004-x64
1暴雨在�...��.exe
windows7-x64
3暴雨在�...��.exe
windows10-2004-x64
3Analysis
-
max time kernel
133s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 05:55
Behavioral task
behavioral1
Sample
暴雨在线QQ搜索2009/暴雨在线QQ搜索注册版/!创e下载┆绿色软件天堂.url
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
暴雨在线QQ搜索2009/暴雨在线QQ搜索注册版/!创e下载┆绿色软件天堂.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
暴雨在线QQ搜索2009/暴雨在线QQ搜索注册版/GetQQMail.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
暴雨在线QQ搜索2009/暴雨在线QQ搜索注册版/GetQQMail.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
暴雨在线QQ搜索2009/暴雨在线QQ搜索注册版/SendMailDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
暴雨在线QQ搜索2009/暴雨在线QQ搜索注册版/SendMailDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
暴雨在线QQ搜索2009/暴雨在线QQ搜索注册版/SkinPPWTL.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
暴雨在线QQ搜索2009/暴雨在线QQ搜索注册版/SkinPPWTL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
暴雨在线QQ搜索2009/暴雨在线QQ搜索注册版/help.doc
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
暴雨在线QQ搜索2009/暴雨在线QQ搜索注册版/help.doc
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
暴雨在线QQ搜索2009/暴雨在线QQ搜索注册版/破解补丁.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
暴雨在线QQ搜索2009/暴雨在线QQ搜索注册版/破解补丁.exe
Resource
win10v2004-20240802-en
General
-
Target
暴雨在线QQ搜索2009/暴雨在线QQ搜索注册版/help.doc
-
Size
187KB
-
MD5
67f56ed09f9d01a6e5d20991e4b2f3e8
-
SHA1
562e2f03d55176e1a9cab26cbc91e374791256db
-
SHA256
35484a2868743a35f173b5c47ca93129fdba3c0cca7f8b44442cfc43ace477ea
-
SHA512
1b594d264d92b99ddd7ff88b7fa5bdaa45e0db4a8c28b995d724c08da25aaa735ce5bab0d7dd0a4362f542227b38836074d3bb25f1b350c193157eee6ce34d02
-
SSDEEP
3072:OLsek1pROnrhyF44QfqXp+JS3O1LKMInQjzat/5SbvE3gSEFW7MLmz/30HvbDDDB:OLsek1pROnrhyF44ys+JS3O0v6e/kbv4
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1492 WINWORD.EXE 1492 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 1492 WINWORD.EXE 1492 WINWORD.EXE 1492 WINWORD.EXE 1492 WINWORD.EXE 1492 WINWORD.EXE 1492 WINWORD.EXE 1492 WINWORD.EXE 1492 WINWORD.EXE 1492 WINWORD.EXE 1492 WINWORD.EXE 1492 WINWORD.EXE 1492 WINWORD.EXE 1492 WINWORD.EXE 1492 WINWORD.EXE 1492 WINWORD.EXE 1492 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\暴雨在线QQ搜索2009\暴雨在线QQ搜索注册版\help.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize3KB
MD560105479286ae91d7c05d67af23382ae
SHA123a2c216a5ae768a71d11957cbfecb3dbf4ac6ff
SHA256552bc4751c6eace5d47963def9e3384779218933f89d662f983efeafaf356a05
SHA51272b3132f011a77c136caafb3e7c2d49fbdeb2cf995efa9f4f5aa464c44b05ca5466cfb9798fbc5874b131006b71d018985b9b219a829795921c0f82965646b1e