Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-07-2022 18:34
Static task
static1
Behavioral task
behavioral1
Sample
gol document 07.01.2022.docm
Resource
win7-20220414-en
General
-
Target
gol document 07.01.2022.docm
-
Size
2.7MB
-
MD5
7c643a355b758fd95dca7a8f97196406
-
SHA1
3514f451d022a132d9a3d5df91d2f1433f3f38be
-
SHA256
3046ec7af6142d2aa32b2c486cb8bbec6a48f7aa3d31da6321c7cf47dcee525b
-
SHA512
7b09befd4abb8a6f46a6ff9a09eabb35b26cdd00b4c1df87ab3fd0ea77ab266cdc4d405cbd9aa0fc193dd474da022b5b603527758da386bc259c56e87bf78bc4
Malware Config
Signatures
-
Detects SVCReady loader 1 IoCs
resource yara_rule behavioral2/memory/372-146-0x0000000000400000-0x00000000004DE000-memory.dmp family_svcready -
Executes dropped EXE 1 IoCs
pid Process 372 r8DA.tmp.exe -
Loads dropped DLL 1 IoCs
pid Process 372 r8DA.tmp.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2832 WINWORD.EXE 2832 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2832 WINWORD.EXE 2832 WINWORD.EXE 2832 WINWORD.EXE 2832 WINWORD.EXE 2832 WINWORD.EXE 2832 WINWORD.EXE 2832 WINWORD.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2832 wrote to memory of 372 2832 WINWORD.EXE 87 PID 2832 wrote to memory of 372 2832 WINWORD.EXE 87 PID 2832 wrote to memory of 372 2832 WINWORD.EXE 87
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\gol document 07.01.2022.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\r8DA.tmp.exe"C:\Users\Admin\AppData\Local\Temp\r8DA.tmp.exe" "C:\Users\Admin\AppData\Local\Temp\y8CA.tmp.dll",DllRegisterServer2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:372
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
872KB
MD5d4455b15eb5686cd8380fa8ad4f59a90
SHA18572d1a599b85484db897acd41995d703391d9fb
SHA25666865d056e97b6a1e28d119f2eb4ce288e9fdcdf9c5810799e8f5b0f98d0b9b3
SHA512fec15896971f15966df10c4bb6281830b2f5fc746e354aeaca4bf9e02c7079f61841b5712a034dcac5c48cf6f20a376af3c0a682541b9ac3d2080d2b754b121d
-
Filesize
872KB
MD5d4455b15eb5686cd8380fa8ad4f59a90
SHA18572d1a599b85484db897acd41995d703391d9fb
SHA25666865d056e97b6a1e28d119f2eb4ce288e9fdcdf9c5810799e8f5b0f98d0b9b3
SHA512fec15896971f15966df10c4bb6281830b2f5fc746e354aeaca4bf9e02c7079f61841b5712a034dcac5c48cf6f20a376af3c0a682541b9ac3d2080d2b754b121d