Overview
overview
10Static
static
3SbieCtrl.exe
windows7-x64
1SbieCtrl.exe
windows10-2004-x64
10SbieDll.dll
windows7-x64
1SbieDll.dll
windows10-2004-x64
1medina.rtf
windows7-x64
3medina.rtf
windows10-2004-x64
1steamerror...er.exe
windows7-x64
5steamerror...er.exe
windows10-2004-x64
5tier0_s.dll
windows7-x64
3tier0_s.dll
windows10-2004-x64
3vstdlib_s.dll
windows7-x64
3vstdlib_s.dll
windows10-2004-x64
3Analysis
-
max time kernel
299s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2025 16:56
Static task
static1
Behavioral task
behavioral1
Sample
SbieCtrl.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
SbieCtrl.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
SbieDll.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
SbieDll.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
medina.rtf
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
medina.rtf
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
steamerrorreporter.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
steamerrorreporter.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
tier0_s.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
tier0_s.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
vstdlib_s.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
vstdlib_s.dll
Resource
win10v2004-20241007-en
General
-
Target
medina.rtf
-
Size
37KB
-
MD5
d125cedbbfe725a94948561401f0a555
-
SHA1
3b2484f8600f42ebbeb89093b8efeab4cb173c37
-
SHA256
c10719865726f362838d5ac424bfb83679e9c8e27743894faeccc5c2d55dc07f
-
SHA512
18280f1741ff0f3d93d7f476974d736fdf67678fd0e53b277459203679e43fdea48423e4c43122ecc7cf605ca0a197788bb446753f52c24820b1fc1870d9fef5
-
SSDEEP
768:Vec0FGaL4s1gnoQcVn03vM1dKu+olkjW4AcYihDTclVTEK5:EGaL4s1gJ3v6KuJTc9h+L
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1856 WINWORD.EXE 1856 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1856 WINWORD.EXE 1856 WINWORD.EXE 1856 WINWORD.EXE 1856 WINWORD.EXE 1856 WINWORD.EXE 1856 WINWORD.EXE 1856 WINWORD.EXE 1856 WINWORD.EXE 1856 WINWORD.EXE 1856 WINWORD.EXE 1856 WINWORD.EXE 1856 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\medina.rtf" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1856