Overview
overview
10Static
static
1ETool.exe
windows10-2004-x64
10$TEMP/Exposure.doc
windows10-2004-x64
1$TEMP/Surrey.doc
windows10-2004-x64
1$TEMP/Tramadol.doc
windows10-2004-x64
1SpringPrer...ck.doc
windows10-2004-x64
1SpringPrer...ge.doc
windows10-2004-x64
1SpringPrer...ne.doc
windows10-2004-x64
1SpringPrer...em.doc
windows10-2004-x64
1SpringPrer...on.doc
windows10-2004-x64
1SpringPrer...nt.doc
windows10-2004-x64
1Analysis
-
max time kernel
133s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2025, 17:36
Static task
static1
Behavioral task
behavioral1
Sample
ETool.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
$TEMP/Exposure.doc
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
$TEMP/Surrey.doc
Resource
win10v2004-20250314-en
Behavioral task
behavioral4
Sample
$TEMP/Tramadol.doc
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
SpringPrerequisite/Click.doc
Resource
win10v2004-20250313-en
Behavioral task
behavioral6
Sample
SpringPrerequisite/Dosage.doc
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
SpringPrerequisite/Hurricane.doc
Resource
win10v2004-20250314-en
Behavioral task
behavioral8
Sample
SpringPrerequisite/Jerusalem.doc
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
SpringPrerequisite/Replication.doc
Resource
win10v2004-20250314-en
Behavioral task
behavioral10
Sample
SpringPrerequisite/Vincent.doc
Resource
win10v2004-20250314-en
General
-
Target
SpringPrerequisite/Replication.doc
-
Size
60KB
-
MD5
3aacde3acd5fb86ac3ff0039ec0c1c25
-
SHA1
f46599080cd55389392ce516818c9385e4f44037
-
SHA256
a9f85f7d7beaac38d8fa0c43368207d23d515079125ad2124ead74290c7ad6a9
-
SHA512
3e592723efee5193f5bb80db3d85ce44db4ba0d8583f8d8399ebb7a2c6284fb9463992d207849c0c7cb369a9f692243a15fe45f0ceaf7eb00de12ab5322a00f5
-
SSDEEP
1536:oV5ej6wl2xLHJ7IKeoDDbGDaTHTtcLNIhtXZI6m8U:ic6wlmLp74oD2DihcLNclm6m8U
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2344 WINWORD.EXE 2344 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 2344 WINWORD.EXE 2344 WINWORD.EXE 2344 WINWORD.EXE 2344 WINWORD.EXE 2344 WINWORD.EXE 2344 WINWORD.EXE 2344 WINWORD.EXE 2344 WINWORD.EXE 2344 WINWORD.EXE 2344 WINWORD.EXE 2344 WINWORD.EXE 2344 WINWORD.EXE 2344 WINWORD.EXE 2344 WINWORD.EXE 2344 WINWORD.EXE 2344 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\SpringPrerequisite\Replication.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2344