Resubmissions
16-06-2022 16:21
220616-ttrs8afhhq 1013-06-2022 09:28
220613-lfsjlafcfl 1013-06-2022 08:34
220613-kgyxbsbab6 8Analysis
-
max time kernel
1799s -
max time network
1609s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-it -
submitted
13-06-2022 09:28
Static task
static1
Behavioral task
behavioral1
Sample
varacalli-file-13.06.2022.docm
Resource
win7-20220414-it
Behavioral task
behavioral2
Sample
varacalli-file-13.06.2022.docm
Resource
win10v2004-20220414-it
General
-
Target
varacalli-file-13.06.2022.docm
-
Size
1.9MB
-
MD5
f2dbc8b51a88d4c6631042bb0f62df74
-
SHA1
b9769be211e29dec9c7a03c0d255d2abbee9f73c
-
SHA256
9894b3d3ab4a2f3303c0aea040cae4c50e5d9711fd5cb24b9c2500f5be9a23fe
-
SHA512
354527aaaccfc18315b866fb6375b3fddeb9d264297127868fb06cb1b11da8e77e9bd07c73a040bd6a6bc5a9079651642b33f9db2267fdbc40f1b79d41dad41e
Malware Config
Signatures
-
suricata: ET MALWARE Observed Win32/SVCReady Loader User-Agent
suricata: ET MALWARE Observed Win32/SVCReady Loader User-Agent
-
suricata: ET MALWARE Win32/SVCReady Loader CnC Activity M2
suricata: ET MALWARE Win32/SVCReady Loader CnC Activity M2
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 896 rC8B5.tmp.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rC8B5.tmp.exe -
Loads dropped DLL 2 IoCs
pid Process 896 rC8B5.tmp.exe 896 rC8B5.tmp.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 18 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct rC8B5.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSReleaseDate rC8B5.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVendor rC8B5.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer rC8B5.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer rC8B5.tmp.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rC8B5.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\ECFirmwareMinorRelease rC8B5.tmp.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU rC8B5.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardVersion rC8B5.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BiosMajorRelease rC8B5.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BiosMinorRelease rC8B5.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVersion rC8B5.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\ECFirmwareMajorRelease rC8B5.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily rC8B5.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rC8B5.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 4940 systeminfo.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000_Classes\CLSID\{E6D34FFC-AD32-4d6a-934C-D387FA873A19} rC8B5.tmp.exe Set value (data) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000_Classes\CLSID\{E6D34FFC-AD32-4d6a-934C-D387FA873A19}\ = 110000005ac452876377bda27b35b4c77f7a0da7b555d773e029ef69cb2fc5438a6715fb0fa61b878f9b6f14dc786cd8b4e4b77e89 rC8B5.tmp.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4788 WINWORD.EXE 4788 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 896 rC8B5.tmp.exe 896 rC8B5.tmp.exe 896 rC8B5.tmp.exe 896 rC8B5.tmp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4788 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 4788 WINWORD.EXE 4788 WINWORD.EXE 4788 WINWORD.EXE 4788 WINWORD.EXE 4788 WINWORD.EXE 4788 WINWORD.EXE 4788 WINWORD.EXE 4788 WINWORD.EXE 4788 WINWORD.EXE 4788 WINWORD.EXE 4788 WINWORD.EXE 4788 WINWORD.EXE 4788 WINWORD.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4788 wrote to memory of 896 4788 WINWORD.EXE 84 PID 4788 wrote to memory of 896 4788 WINWORD.EXE 84 PID 4788 wrote to memory of 896 4788 WINWORD.EXE 84 PID 896 wrote to memory of 4940 896 rC8B5.tmp.exe 90 PID 896 wrote to memory of 4940 896 rC8B5.tmp.exe 90 PID 896 wrote to memory of 4940 896 rC8B5.tmp.exe 90
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\varacalli-file-13.06.2022.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\rC8B5.tmp.exe"C:\Users\Admin\AppData\Local\Temp\rC8B5.tmp.exe" "C:\Users\Admin\AppData\Local\Temp\yC4EB.tmp.dll",DllRegisterServer2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\SysWOW64\systeminfo.exeC:\Windows\System32\systeminfo.exe3⤵
- Gathers system information
PID:4940
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
816KB
MD594ed97a7d00dfeb3356df3fd73fa5c38
SHA10f926e5bb2389ad919b438a2d1b9a24e93c9e501
SHA256788d09f17caf8e95bc28d1f122bb2b3ffb4567c1dc92856428327ebe1ac26ce4
SHA5128e26f88f187d34d5f1d292dee9179c0451b188c7abb87d51b8594357d12f9c81f6e7eb629769e1c620c693364387a557b1173315038000529c946c0da2bc93ae
-
Filesize
816KB
MD594ed97a7d00dfeb3356df3fd73fa5c38
SHA10f926e5bb2389ad919b438a2d1b9a24e93c9e501
SHA256788d09f17caf8e95bc28d1f122bb2b3ffb4567c1dc92856428327ebe1ac26ce4
SHA5128e26f88f187d34d5f1d292dee9179c0451b188c7abb87d51b8594357d12f9c81f6e7eb629769e1c620c693364387a557b1173315038000529c946c0da2bc93ae
-
Filesize
816KB
MD594ed97a7d00dfeb3356df3fd73fa5c38
SHA10f926e5bb2389ad919b438a2d1b9a24e93c9e501
SHA256788d09f17caf8e95bc28d1f122bb2b3ffb4567c1dc92856428327ebe1ac26ce4
SHA5128e26f88f187d34d5f1d292dee9179c0451b188c7abb87d51b8594357d12f9c81f6e7eb629769e1c620c693364387a557b1173315038000529c946c0da2bc93ae