Overview
overview
10Static
static
1ETool.exe
windows10-2004-x64
10$TEMP/Exposure.doc
windows10-2004-x64
1$TEMP/Surrey.doc
windows10-2004-x64
1$TEMP/Tramadol.doc
windows10-2004-x64
1SpringPrer...ck.doc
windows10-2004-x64
1SpringPrer...ge.doc
windows10-2004-x64
1SpringPrer...ne.doc
windows10-2004-x64
1SpringPrer...em.doc
windows10-2004-x64
1SpringPrer...on.doc
windows10-2004-x64
1SpringPrer...nt.doc
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2025, 17:43
Static task
static1
Behavioral task
behavioral1
Sample
ETool.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
$TEMP/Exposure.doc
Resource
win10v2004-20250313-en
Behavioral task
behavioral3
Sample
$TEMP/Surrey.doc
Resource
win10v2004-20250314-en
Behavioral task
behavioral4
Sample
$TEMP/Tramadol.doc
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
SpringPrerequisite/Click.doc
Resource
win10v2004-20250314-en
Behavioral task
behavioral6
Sample
SpringPrerequisite/Dosage.doc
Resource
win10v2004-20250313-en
Behavioral task
behavioral7
Sample
SpringPrerequisite/Hurricane.doc
Resource
win10v2004-20250314-en
Behavioral task
behavioral8
Sample
SpringPrerequisite/Jerusalem.doc
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
SpringPrerequisite/Replication.doc
Resource
win10v2004-20250314-en
Behavioral task
behavioral10
Sample
SpringPrerequisite/Vincent.doc
Resource
win10v2004-20250314-en
General
-
Target
SpringPrerequisite/Hurricane.doc
-
Size
59KB
-
MD5
3ab779ed45de152d80aa68e8d5b6b025
-
SHA1
997ddc9b0841c067fef81dbc683076e115d06407
-
SHA256
1ff967545525b752f371b319dcc8efe78d2f35b5049c8aef312beb4b811d00bf
-
SHA512
0837f528ef92f43630b5e4f3c667e3963f85487090f877916f2d2bec5233b61312292fb2e6c9ff67c55b56c7004d326219eaaca8748a3cadaadf6b120f350482
-
SSDEEP
1536:CPp+3p0J+SeK5ym2awJst8uBbWre0uQaQSGGYS497eVis4:gp+3iQSxx2aw4/ByUVQSGGl49KVG
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3688 WINWORD.EXE 3688 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 3688 WINWORD.EXE 3688 WINWORD.EXE 3688 WINWORD.EXE 3688 WINWORD.EXE 3688 WINWORD.EXE 3688 WINWORD.EXE 3688 WINWORD.EXE 3688 WINWORD.EXE 3688 WINWORD.EXE 3688 WINWORD.EXE 3688 WINWORD.EXE 3688 WINWORD.EXE 3688 WINWORD.EXE 3688 WINWORD.EXE 3688 WINWORD.EXE 3688 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\SpringPrerequisite\Hurricane.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3688