Overview
overview
8Static
static
3idm注册�...�.docx
windows7-x64
4idm注册�...�.docx
windows10-2004-x64
1idm注册�....7.exe
windows7-x64
8idm注册�....7.exe
windows10-2004-x64
8idm注册�...��.bat
windows7-x64
1idm注册�...��.bat
windows10-2004-x64
1idm注册�...19.exe
windows7-x64
8idm注册�...19.exe
windows10-2004-x64
8idm注册�...�.html
windows7-x64
3idm注册�...�.html
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-11-2024 09:58
Static task
static1
Behavioral task
behavioral1
Sample
idm注册机激活/B站外网油管下载设置方法.docx
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
idm注册机激活/B站外网油管下载设置方法.docx
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
idm注册机激活/IDM_6.4x_Crack_v19.7.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
idm注册机激活/IDM_6.4x_Crack_v19.7.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
idm注册机激活/IDM卸载后执行.bat
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
idm注册机激活/IDM卸载后执行.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
idm注册机激活/idman642build19.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
idm注册机激活/idman642build19.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
idm注册机激活/安装及使用教程.html
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
idm注册机激活/安装及使用教程.html
Resource
win10v2004-20241007-en
General
-
Target
idm注册机激活/B站外网油管下载设置方法.docx
-
Size
494KB
-
MD5
7568d5a37ea13c23388c7d9b0f557ac7
-
SHA1
012776c41fc8810f40d67bc0d92ab3c9d2c10f95
-
SHA256
d0092c80d3cc66f8516f92561840685f8ad9617bf07953812bf2b2a106c4ad32
-
SHA512
9dbf8f5574341d8f28e3db892ee2c521f6da2f5844da383c979bb792a3823b3d3c54111fc1dc695fd190fe0e31fa5424bcb8aa2493ada80d588e602ce5533924
-
SSDEEP
12288:Cg43aqmEuacAQEAI1pTSPO3aJ5tloaE7JYm:T4qqmz/AQfepz3aJ/lC/
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2336 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2336 WINWORD.EXE 2336 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2148 2336 WINWORD.EXE 32 PID 2336 wrote to memory of 2148 2336 WINWORD.EXE 32 PID 2336 wrote to memory of 2148 2336 WINWORD.EXE 32 PID 2336 wrote to memory of 2148 2336 WINWORD.EXE 32
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\idm注册机激活\B站外网油管下载设置方法.docx"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2148
-