Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 09:08
Static task
static1
Behavioral task
behavioral1
Sample
lititruanjian/众邦2009立体软件/~$众邦文档.doc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
lititruanjian/众邦2009立体软件/~$众邦文档.doc
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
lititruanjian/众邦2009立体软件/众邦文档.doc
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
lititruanjian/众邦2009立体软件/众邦文档.doc
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
lititruanjian/众邦2009立体软件/众邦立体软件2008.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
lititruanjian/众邦2009立体软件/众邦立体软件2008.exe
Resource
win10v2004-20241007-en
General
-
Target
lititruanjian/众邦2009立体软件/众邦文档.doc
-
Size
26KB
-
MD5
0e7f52c80ee9e8dfcf18a24906ae3db8
-
SHA1
e8dbc87bf922696812b634fa8b8233c1143b3cb0
-
SHA256
59ee2c57932f38972f8afbae4c930b9cf477545f0c6583d42d55382be4c44530
-
SHA512
0116bfb30550f065318acda7a8d1e3b5eb3db5fd0f10dd997d58576952bff364a03d6c95a20bb4501fda4a7ad6cd804a4742b54487d10ec64496d748b3db0d3b
-
SSDEEP
96:IJTTrh3rXJovWPB9mvZypYgEuRcz/1vVbtL0TDZiOy14qRVQKc/Jz5Q8dz:0h7ZovWPB9mh/9uRspPwoOy14Em
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2816 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2816 WINWORD.EXE 2816 WINWORD.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2816 wrote to memory of 2668 2816 WINWORD.EXE 31 PID 2816 wrote to memory of 2668 2816 WINWORD.EXE 31 PID 2816 wrote to memory of 2668 2816 WINWORD.EXE 31 PID 2816 wrote to memory of 2668 2816 WINWORD.EXE 31
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\lititruanjian\众邦2009立体软件\众邦文档.doc"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2668
-