Resubmissions
16-06-2022 16:21
220616-ttrs8afhhq 1013-06-2022 09:28
220613-lfsjlafcfl 1013-06-2022 08:34
220613-kgyxbsbab6 8Analysis
-
max time kernel
978s -
max time network
984s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-it -
submitted
16-06-2022 16:21
Static task
static1
General
-
Target
varacalli-file-13.06.2022.docm
-
Size
1.9MB
-
MD5
f2dbc8b51a88d4c6631042bb0f62df74
-
SHA1
b9769be211e29dec9c7a03c0d255d2abbee9f73c
-
SHA256
9894b3d3ab4a2f3303c0aea040cae4c50e5d9711fd5cb24b9c2500f5be9a23fe
-
SHA512
354527aaaccfc18315b866fb6375b3fddeb9d264297127868fb06cb1b11da8e77e9bd07c73a040bd6a6bc5a9079651642b33f9db2267fdbc40f1b79d41dad41e
Malware Config
Signatures
-
Detects SVCReady loader 1 IoCs
Processes:
resource yara_rule behavioral1/memory/5100-147-0x0000000000CE0000-0x0000000000DAF000-memory.dmp family_svcready -
suricata: ET MALWARE Observed Win32/SVCReady Loader User-Agent
suricata: ET MALWARE Observed Win32/SVCReady Loader User-Agent
-
suricata: ET MALWARE Win32/SVCReady Loader CnC Activity M2
suricata: ET MALWARE Win32/SVCReady Loader CnC Activity M2
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
r9178.tmp.exepid Process 5100 r9178.tmp.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
r9178.tmp.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion r9178.tmp.exe -
Loads dropped DLL 2 IoCs
Processes:
r9178.tmp.exepid Process 5100 r9178.tmp.exe 5100 r9178.tmp.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 18 IoCs
Processes:
r9178.tmp.exeWINWORD.EXEdescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSReleaseDate r9178.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily r9178.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName r9178.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer r9178.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BiosMajorRelease r9178.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVendor r9178.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardVersion r9178.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\ECFirmwareMajorRelease r9178.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer r9178.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct r9178.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BiosMinorRelease r9178.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVersion r9178.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\ECFirmwareMinorRelease r9178.tmp.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS r9178.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU r9178.tmp.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Modifies registry class 2 IoCs
Processes:
r9178.tmp.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\CLSID\{E6D34FFC-AD32-4d6a-934C-D387FA873A19} r9178.tmp.exe Set value (data) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000_Classes\CLSID\{E6D34FFC-AD32-4d6a-934C-D387FA873A19}\ = 110000005ac452876377bda27b35b4c77f7a0da7b555d773e029ef69cb2fc5438a6715fb0fa61b878f9b6f14dc786cd8b4e4b77e89 r9178.tmp.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid Process 3656 WINWORD.EXE 3656 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
r9178.tmp.exepid Process 5100 r9178.tmp.exe 5100 r9178.tmp.exe 5100 r9178.tmp.exe 5100 r9178.tmp.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
WINWORD.EXEpid Process 3656 WINWORD.EXE 3656 WINWORD.EXE 3656 WINWORD.EXE 3656 WINWORD.EXE 3656 WINWORD.EXE 3656 WINWORD.EXE 3656 WINWORD.EXE 3656 WINWORD.EXE 3656 WINWORD.EXE 3656 WINWORD.EXE 3656 WINWORD.EXE 3656 WINWORD.EXE 3656 WINWORD.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
WINWORD.EXEr9178.tmp.exedescription pid Process procid_target PID 3656 wrote to memory of 5100 3656 WINWORD.EXE 82 PID 3656 wrote to memory of 5100 3656 WINWORD.EXE 82 PID 3656 wrote to memory of 5100 3656 WINWORD.EXE 82 PID 5100 wrote to memory of 2720 5100 r9178.tmp.exe 96 PID 5100 wrote to memory of 2720 5100 r9178.tmp.exe 96 PID 5100 wrote to memory of 2720 5100 r9178.tmp.exe 96
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\varacalli-file-13.06.2022.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\r9178.tmp.exe"C:\Users\Admin\AppData\Local\Temp\r9178.tmp.exe" "C:\Users\Admin\AppData\Local\Temp\y8C08.tmp.dll",DllRegisterServer2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\systeminfo.exeC:\Windows\System32\systeminfo.exe3⤵
- Gathers system information
PID:2720
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
816KB
MD594ed97a7d00dfeb3356df3fd73fa5c38
SHA10f926e5bb2389ad919b438a2d1b9a24e93c9e501
SHA256788d09f17caf8e95bc28d1f122bb2b3ffb4567c1dc92856428327ebe1ac26ce4
SHA5128e26f88f187d34d5f1d292dee9179c0451b188c7abb87d51b8594357d12f9c81f6e7eb629769e1c620c693364387a557b1173315038000529c946c0da2bc93ae
-
Filesize
816KB
MD594ed97a7d00dfeb3356df3fd73fa5c38
SHA10f926e5bb2389ad919b438a2d1b9a24e93c9e501
SHA256788d09f17caf8e95bc28d1f122bb2b3ffb4567c1dc92856428327ebe1ac26ce4
SHA5128e26f88f187d34d5f1d292dee9179c0451b188c7abb87d51b8594357d12f9c81f6e7eb629769e1c620c693364387a557b1173315038000529c946c0da2bc93ae
-
Filesize
816KB
MD594ed97a7d00dfeb3356df3fd73fa5c38
SHA10f926e5bb2389ad919b438a2d1b9a24e93c9e501
SHA256788d09f17caf8e95bc28d1f122bb2b3ffb4567c1dc92856428327ebe1ac26ce4
SHA5128e26f88f187d34d5f1d292dee9179c0451b188c7abb87d51b8594357d12f9c81f6e7eb629769e1c620c693364387a557b1173315038000529c946c0da2bc93ae