Resubmissions
16-06-2022 16:21
220616-ttrs8afhhq 1013-06-2022 09:28
220613-lfsjlafcfl 1013-06-2022 08:34
220613-kgyxbsbab6 8Analysis
-
max time kernel
296s -
max time network
294s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
13-06-2022 08:34
Static task
static1
Behavioral task
behavioral1
Sample
varacalli-file-13.06.2022.docm
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
varacalli-file-13.06.2022.docm
Resource
win10v2004-20220414-en
General
-
Target
varacalli-file-13.06.2022.docm
-
Size
1.9MB
-
MD5
f2dbc8b51a88d4c6631042bb0f62df74
-
SHA1
b9769be211e29dec9c7a03c0d255d2abbee9f73c
-
SHA256
9894b3d3ab4a2f3303c0aea040cae4c50e5d9711fd5cb24b9c2500f5be9a23fe
-
SHA512
354527aaaccfc18315b866fb6375b3fddeb9d264297127868fb06cb1b11da8e77e9bd07c73a040bd6a6bc5a9079651642b33f9db2267fdbc40f1b79d41dad41e
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 1980 r1444.tmp.exe -
Loads dropped DLL 1 IoCs
pid Process 1980 r1444.tmp.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1124 WINWORD.EXE 1124 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1124 WINWORD.EXE 1124 WINWORD.EXE 1124 WINWORD.EXE 1124 WINWORD.EXE 1124 WINWORD.EXE 1124 WINWORD.EXE 1124 WINWORD.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1124 wrote to memory of 1980 1124 WINWORD.EXE 85 PID 1124 wrote to memory of 1980 1124 WINWORD.EXE 85 PID 1124 wrote to memory of 1980 1124 WINWORD.EXE 85
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\varacalli-file-13.06.2022.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\r1444.tmp.exe"C:\Users\Admin\AppData\Local\Temp\r1444.tmp.exe" "C:\Users\Admin\AppData\Local\Temp\y103C.tmp.dll",DllRegisterServer2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1980
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
816KB
MD594ed97a7d00dfeb3356df3fd73fa5c38
SHA10f926e5bb2389ad919b438a2d1b9a24e93c9e501
SHA256788d09f17caf8e95bc28d1f122bb2b3ffb4567c1dc92856428327ebe1ac26ce4
SHA5128e26f88f187d34d5f1d292dee9179c0451b188c7abb87d51b8594357d12f9c81f6e7eb629769e1c620c693364387a557b1173315038000529c946c0da2bc93ae
-
Filesize
816KB
MD594ed97a7d00dfeb3356df3fd73fa5c38
SHA10f926e5bb2389ad919b438a2d1b9a24e93c9e501
SHA256788d09f17caf8e95bc28d1f122bb2b3ffb4567c1dc92856428327ebe1ac26ce4
SHA5128e26f88f187d34d5f1d292dee9179c0451b188c7abb87d51b8594357d12f9c81f6e7eb629769e1c620c693364387a557b1173315038000529c946c0da2bc93ae