Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 05:01
Static task
static1
Behavioral task
behavioral1
Sample
药品追溯上传1120(盘点和库存变更)/国家医保结算清单上传程序.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
药品追溯上传1120(盘点和库存变更)/国家医保结算清单上传程序.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
药品追溯上传1120(盘点和库存变更)/操作文档_药品追溯.doc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
药品追溯上传1120(盘点和库存变更)/操作文档_药品追溯.doc
Resource
win10v2004-20241007-en
General
-
Target
药品追溯上传1120(盘点和库存变更)/操作文档_药品追溯.doc
-
Size
104KB
-
MD5
90cc1b8c3dcc35d02cc79cb05aa0b274
-
SHA1
62786dde33bf863e09f20ccff19a14a7f32ed3c0
-
SHA256
32e98226da14c5f3fb7a350ee6b2bc90f50a1a35c3e51f7af11f89d4e014d0f5
-
SHA512
93b0cd2386e176da9a2120a223a3642d4ea51ca2352718c7c3fc76714ebbc1344220a5aa9e07563892ca2829487defa0e337783dd6457dc4ff97d4ce1f500122
-
SSDEEP
3072:CJCsf29Zdp2VEZkYxJnX3zl4sKlQ4oo6MF2oon2nw:YEvp2eZ31PKC4oo6MF2oon2nw
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2380 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2380 WINWORD.EXE 2380 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2824 2380 WINWORD.EXE 32 PID 2380 wrote to memory of 2824 2380 WINWORD.EXE 32 PID 2380 wrote to memory of 2824 2380 WINWORD.EXE 32 PID 2380 wrote to memory of 2824 2380 WINWORD.EXE 32
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\药品追溯上传1120(盘点和库存变更)\操作文档_药品追溯.doc"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2824
-