Resubmissions
13/04/2025, 09:55
250413-lx71lstjt7 1013/04/2025, 09:52
250413-lv39mstvbz 1013/04/2025, 07:04
250413-hv884s1vd1 10Analysis
-
max time kernel
126s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
13/04/2025, 07:04
Static task
static1
Behavioral task
behavioral1
Sample
virusshare/3/VirusShare_3fb34964fa7b8c6bfad8d960380ff04e.doc
Resource
win10v2004-20250410-en
General
-
Target
virusshare/3/VirusShare_3fb34964fa7b8c6bfad8d960380ff04e.doc
-
Size
34KB
-
MD5
3fb34964fa7b8c6bfad8d960380ff04e
-
SHA1
9a3aec40056ce74bac833989ed71dfb6c2626f4c
-
SHA256
26026b1b3d0cb660c6be6c536df679acca0b5562a3adbb507d001474d23f5650
-
SHA512
a82b522dfd7eac30292a9e9ab19ddac94563804e77a1090e5f44de7e794ef4e5ebe0e7fb36e5177479417c8176ae0475613700755ca015c7ce941a4740215faa
-
SSDEEP
384:bzIPMepSbSsG/CdPvunCpeJzKoSS3D6JO5LfBqtjbjk4Eohubn3ezta:nIPMecWsGKVunFFRDE6pqjhust
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule behavioral1/files/0x000d0000000242f8-186.dat office_macro_on_action -
Deletes itself 1 IoCs
pid Process 1252 WINWORD.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\virusshare\3\~WRD0003.tmp\:Zone.Identifier:$DATA WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1252 WINWORD.EXE 1252 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 35 IoCs
pid Process 1252 WINWORD.EXE 1252 WINWORD.EXE 1252 WINWORD.EXE 1252 WINWORD.EXE 1252 WINWORD.EXE 1252 WINWORD.EXE 1252 WINWORD.EXE 1252 WINWORD.EXE 1252 WINWORD.EXE 1252 WINWORD.EXE 1252 WINWORD.EXE 1252 WINWORD.EXE 1252 WINWORD.EXE 1252 WINWORD.EXE 1252 WINWORD.EXE 1252 WINWORD.EXE 1252 WINWORD.EXE 1252 WINWORD.EXE 1252 WINWORD.EXE 1252 WINWORD.EXE 1252 WINWORD.EXE 1252 WINWORD.EXE 1252 WINWORD.EXE 1252 WINWORD.EXE 1252 WINWORD.EXE 1252 WINWORD.EXE 1252 WINWORD.EXE 1252 WINWORD.EXE 1252 WINWORD.EXE 1252 WINWORD.EXE 1252 WINWORD.EXE 1252 WINWORD.EXE 1252 WINWORD.EXE 1252 WINWORD.EXE 1252 WINWORD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1252 wrote to memory of 768 1252 WINWORD.EXE 97 PID 1252 wrote to memory of 768 1252 WINWORD.EXE 97
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\virusshare\3\VirusShare_3fb34964fa7b8c6bfad8d960380ff04e.doc" /o ""1⤵
- Deletes itself
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:768
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:1588
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD579499dd572b4c733c511050ca6df3dcf
SHA1e85c4c40ee5204536905b86a48751a46936defa2
SHA2569c32a25ed099cb742264d639526580395848c303b2e98b4ecff61c5ad4ec4d3c
SHA5123b1eaf2acebce2c46b72bc65ae158218ef5c764b8db2ebf685acdca3f1dd7e825be70ce75b0b30665240478579e5fdd485a4f13c3cb10c22d6daaa48960d3716
-
Filesize
11KB
MD54d881c4002133d61be437ff0a6331e53
SHA120055370077b8e05bc69da2f323893a8c3176c10
SHA256f91f651ae217c76f8bcb98cbc12853081ed62eb0d1e9b669dce375391dee0193
SHA512ab02f000b9ac2873f8bcca1133c4f61e4a1888f07204dd76b359b78957db0feef8631f1c668537879a5ee7330c3e4eaedb77a73523c64d120c7b19c30a36b2da
-
Filesize
262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810
-
Filesize
35KB
MD50810875ab3ac2f86487256074ab842b2
SHA1b0d5c9592f1918d7b6ed6f45fb958cab15b6976e
SHA2567ccaeb349e3a40dc2abf0619d1b1f072a23cc3ff2bcb9e7eafa3e6d6d7d806a2
SHA51260cb57503ea8494b7e6c507b726080bffad6a89066594e901d4bd0b3f3c026b8185d8431d851197b6eac30c215a07026f14e538d4e29d8fdb6734530c8822749
-
Filesize
16B
MD5d29962abc88624befc0135579ae485ec
SHA1e40a6458296ec6a2427bcb280572d023a9862b31
SHA256a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866
SHA5124311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize1KB
MD541e387fdb97e102176c147832d43b0b7
SHA132e17e5951c6f6771de27d02fb783e6c6b370bc2
SHA2565de6dee4dd83e0f09756271836923c865125388cb6699d4c35e57dc512756247
SHA5124bafd4a94fc73b68d641cdf1bb84c9471b593155a0a872a2357ed870b88376cd34b456d93f3c70eed06aa8edf31dcca5fc48deba2db19bd0bafcabe275fc85b7
-
Filesize
95KB
MD565ed85c1ba68c18d8303cd96de4fa15f
SHA146d8fc0b8083154d8b6d2cc726bcc4d77a92c4b3
SHA2561b99f31a11fca0cb1baa7bf0ec1cc03ec637202e5f61dc99f2484e7d3413fff3
SHA51227de04b6ff67bb8947a499120d2db0f17f3497257f651712411b17a95524201bde50df0161c42575cc57c0d388c0de87148da7f8582127ce73f4155a3c668ede