Analysis
-
max time kernel
133s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 09:08
Static task
static1
Behavioral task
behavioral1
Sample
lititruanjian/众邦2009立体软件/~$众邦文档.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
lititruanjian/众邦2009立体软件/~$众邦文档.doc
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
lititruanjian/众邦2009立体软件/众邦文档.doc
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
lititruanjian/众邦2009立体软件/众邦文档.doc
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
lititruanjian/众邦2009立体软件/众邦立体软件2008.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
lititruanjian/众邦2009立体软件/众邦立体软件2008.exe
Resource
win10v2004-20241007-en
General
-
Target
lititruanjian/众邦2009立体软件/~$众邦文档.doc
-
Size
162B
-
MD5
b7ac0dce049e20893a45702c6b28b7bc
-
SHA1
dc8b746a3cde88c3ce01204d17fa25f7c095bb1c
-
SHA256
95899a7f08de44ecadca9e1ee5e2142934f1bf0daf0948c66212bca130775599
-
SHA512
c9187587e2fa54058abe0335872e197e304ee362a4aea52aa0c3fdd65b5065f35927ca926278c78f0ca50cd8707ceecf1cc999d6f93128c60c10125e3e45d10b
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3260 WINWORD.EXE 3260 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 3260 WINWORD.EXE 3260 WINWORD.EXE 3260 WINWORD.EXE 3260 WINWORD.EXE 3260 WINWORD.EXE 3260 WINWORD.EXE 3260 WINWORD.EXE 3260 WINWORD.EXE 3260 WINWORD.EXE 3260 WINWORD.EXE 3260 WINWORD.EXE 3260 WINWORD.EXE 3260 WINWORD.EXE 3260 WINWORD.EXE 3260 WINWORD.EXE 3260 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\lititruanjian\众邦2009立体软件\~$众邦文档.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3260