Overview
overview
7Static
static
3ARSoft.Tools.Net.dll
windows7-x64
1ARSoft.Tools.Net.dll
windows10-2004-x64
1Autofac.dll
windows7-x64
1Autofac.dll
windows10-2004-x64
1GalaSoft.M...rm.dll
windows7-x64
1GalaSoft.M...rm.dll
windows10-2004-x64
1GalaSoft.M...ht.dll
windows7-x64
1GalaSoft.M...ht.dll
windows10-2004-x64
1JudgeLZT.exe
windows7-x64
3JudgeLZT.exe
windows10-2004-x64
5TapInstaller.dll
windows7-x64
1TapInstaller.dll
windows10-2004-x64
1WSearchMigPlugin.dll
windows10-2004-x64
5WpcMigrati...el.dll
windows10-2004-x64
1WsUpgrade.dll
windows10-2004-x64
7Resubmissions
01-07-2024 19:00
240701-xnp9zstfnc 501-07-2024 18:54
240701-xkj9kaxflj 401-07-2024 18:53
240701-xjrbgstdrf 1001-07-2024 18:44
240701-xdytdatbqe 7Analysis
-
max time kernel
117s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 18:44
Static task
static1
Behavioral task
behavioral1
Sample
ARSoft.Tools.Net.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
ARSoft.Tools.Net.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Autofac.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
Autofac.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
GalaSoft.MvvmLight.Platform.dll
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
GalaSoft.MvvmLight.Platform.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
GalaSoft.MvvmLight.dll
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
GalaSoft.MvvmLight.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
JudgeLZT.exe
Resource
win7-20240419-en
Behavioral task
behavioral10
Sample
JudgeLZT.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
TapInstaller.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
TapInstaller.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral13
Sample
WSearchMigPlugin.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral14
Sample
WpcMigration.Uplevel.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
WsUpgrade.dll
Resource
win10v2004-20240611-en
General
-
Target
JudgeLZT.exe
-
Size
951KB
-
MD5
18f16ea3096e479cc7923df5269b25d8
-
SHA1
c0169fdb70ca980a8ca0baebb2fc3a118fd290c6
-
SHA256
1c84f3a2fd0a00690b2a2e385d952ec3f7a7c94223fd0e3a80aff510d329d13c
-
SHA512
5a38cf66a137a51776335f520f8b6a39db025a426b0669088f813979fabfe279c38c19504db233153865c6d0f2f759c61af751465245454498ef006a85a04d36
-
SSDEEP
24576:vuZIdQCtwQpFZWRmqU573CYz6VJyH+np1Vu1OxkCTK:HwQpFZWRh/A6VJyH+zVueTK
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
JudgeLZT.exedescription pid process target process PID 4968 set thread context of 4648 4968 JudgeLZT.exe RegAsm.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 756 4968 WerFault.exe JudgeLZT.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 3976 WINWORD.EXE 3976 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 3976 WINWORD.EXE 3976 WINWORD.EXE 3976 WINWORD.EXE 3976 WINWORD.EXE 3976 WINWORD.EXE 3976 WINWORD.EXE 3976 WINWORD.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
JudgeLZT.exedescription pid process target process PID 4968 wrote to memory of 4648 4968 JudgeLZT.exe RegAsm.exe PID 4968 wrote to memory of 4648 4968 JudgeLZT.exe RegAsm.exe PID 4968 wrote to memory of 4648 4968 JudgeLZT.exe RegAsm.exe PID 4968 wrote to memory of 4648 4968 JudgeLZT.exe RegAsm.exe PID 4968 wrote to memory of 4648 4968 JudgeLZT.exe RegAsm.exe PID 4968 wrote to memory of 4648 4968 JudgeLZT.exe RegAsm.exe PID 4968 wrote to memory of 4648 4968 JudgeLZT.exe RegAsm.exe PID 4968 wrote to memory of 4648 4968 JudgeLZT.exe RegAsm.exe PID 4968 wrote to memory of 4648 4968 JudgeLZT.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JudgeLZT.exe"C:\Users\Admin\AppData\Local\Temp\JudgeLZT.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4968 -s 2802⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4968 -ip 49681⤵
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Documents\These.docx" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.datFilesize
202B
MD54566d1d70073cd75fe35acb78ff9d082
SHA1f602ecc057a3c19aa07671b34b4fdd662aa033cc
SHA256fe33f57205e2ebb981c4744d5a4ddc231f587a9a0589e6565c52e1051eadb0c0
SHA512b9584ebfdd25cc588162dd6525a399c72ac03bf0c61709b96a19feba7217d840ae2c60d7b0d3b43307a2776f497a388e79ef8a646c12ae59a7f5cc4789bbf3c8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-msFilesize
3KB
MD5c7615966e23dbfefa7bafbb4ec414fea
SHA1eb7768d21f187136fdf40b1defef8e40e157081e
SHA2567255134cf7d7a71adc33539ae367ffed07b8029c05ff82dde580b7dcb89a6a0b
SHA512c069c117098bf8e7824a38746ce943204f3bdce9df7c5c2806dcbaa2e786047bc77a9e42cdd61903a48a44a711df4521f65fbae28930b6446c03e0e83cf8ff69
-
memory/3976-15-0x00007FFA16B10000-0x00007FFA16D05000-memory.dmpFilesize
2.0MB
-
memory/3976-50-0x00007FFA16B10000-0x00007FFA16D05000-memory.dmpFilesize
2.0MB
-
memory/3976-16-0x00007FFA16B10000-0x00007FFA16D05000-memory.dmpFilesize
2.0MB
-
memory/3976-7-0x00007FF9D6B90000-0x00007FF9D6BA0000-memory.dmpFilesize
64KB
-
memory/3976-9-0x00007FFA16BAD000-0x00007FFA16BAE000-memory.dmpFilesize
4KB
-
memory/3976-8-0x00007FF9D6B90000-0x00007FF9D6BA0000-memory.dmpFilesize
64KB
-
memory/3976-6-0x00007FF9D6B90000-0x00007FF9D6BA0000-memory.dmpFilesize
64KB
-
memory/3976-10-0x00007FFA16B10000-0x00007FFA16D05000-memory.dmpFilesize
2.0MB
-
memory/3976-12-0x00007FFA16B10000-0x00007FFA16D05000-memory.dmpFilesize
2.0MB
-
memory/3976-11-0x00007FF9D6B90000-0x00007FF9D6BA0000-memory.dmpFilesize
64KB
-
memory/3976-13-0x00007FFA16B10000-0x00007FFA16D05000-memory.dmpFilesize
2.0MB
-
memory/3976-14-0x00007FFA16B10000-0x00007FFA16D05000-memory.dmpFilesize
2.0MB
-
memory/3976-5-0x00007FF9D6B90000-0x00007FF9D6BA0000-memory.dmpFilesize
64KB
-
memory/3976-26-0x00007FF9D4390000-0x00007FF9D43A0000-memory.dmpFilesize
64KB
-
memory/3976-19-0x00007FFA16B10000-0x00007FFA16D05000-memory.dmpFilesize
2.0MB
-
memory/3976-18-0x00007FFA16B10000-0x00007FFA16D05000-memory.dmpFilesize
2.0MB
-
memory/3976-23-0x00007FFA16B10000-0x00007FFA16D05000-memory.dmpFilesize
2.0MB
-
memory/3976-24-0x00007FFA16B10000-0x00007FFA16D05000-memory.dmpFilesize
2.0MB
-
memory/3976-22-0x00007FFA16B10000-0x00007FFA16D05000-memory.dmpFilesize
2.0MB
-
memory/3976-21-0x00007FFA16B10000-0x00007FFA16D05000-memory.dmpFilesize
2.0MB
-
memory/3976-20-0x00007FFA16B10000-0x00007FFA16D05000-memory.dmpFilesize
2.0MB
-
memory/3976-17-0x00007FFA16B10000-0x00007FFA16D05000-memory.dmpFilesize
2.0MB
-
memory/3976-25-0x00007FF9D4390000-0x00007FF9D43A0000-memory.dmpFilesize
64KB
-
memory/4648-4-0x0000000000400000-0x000000000045A000-memory.dmpFilesize
360KB
-
memory/4648-3-0x0000000000400000-0x000000000045A000-memory.dmpFilesize
360KB
-
memory/4648-1-0x0000000000400000-0x000000000045A000-memory.dmpFilesize
360KB
-
memory/4968-0-0x0000000000730000-0x0000000000731000-memory.dmpFilesize
4KB