Analysis

  • max time kernel
    105s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    02-07-2022 13:47

General

  • Target

    ida,file,07.01.2022.docm

  • Size

    2.8MB

  • MD5

    accf5b80c36e2a334a22606a368d69c0

  • SHA1

    00b9895fe48adf1a577c0588ad7ef387eca64d5f

  • SHA256

    6ef2abb48d06c99ab6a6893581cfaf4544dcf01583325042ca03062496466c70

  • SHA512

    d1ea87e6824a0d5ef47b9ed7d9376a0ca10a9faed98223df5a8c7d0dad43d8aa302a0be39250a23a3a5c2d4e9d1db9f5b6872499602d5508648cce491dd6947d

Score
10/10

Malware Config

Signatures

  • Detects SVCReady loader 1 IoCs
  • SVCReady

    SVCReady is a malware loader first seen in April 2022.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ida,file,07.01.2022.docm"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1336
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1784
      • C:\Users\Admin\AppData\Local\Temp\r25FB.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\r25FB.tmp.exe" "C:\Users\Admin\AppData\Local\Temp\y25EA.tmp.dll",DllRegisterServer
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1124

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\r25FB.tmp.exe

      Filesize

      43KB

      MD5

      51138beea3e2c21ec44d0932c71762a8

      SHA1

      8939cf35447b22dd2c6e6f443446acc1bf986d58

      SHA256

      5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

      SHA512

      794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

    • C:\Users\Admin\AppData\Local\Temp\r25FB.tmp.exe

      Filesize

      43KB

      MD5

      51138beea3e2c21ec44d0932c71762a8

      SHA1

      8939cf35447b22dd2c6e6f443446acc1bf986d58

      SHA256

      5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

      SHA512

      794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

    • C:\Users\Admin\AppData\Local\Temp\y25EA.tmp.dll

      Filesize

      872KB

      MD5

      5fdcea322cf58363b0306d9c2285ed67

      SHA1

      fc32557fe96bb871646255a4f99f902fa351a4b8

      SHA256

      785f6622521fe6e41854c8be9f507fe7aef9c48b814aeb1d77dca8c7bccf1f46

      SHA512

      8c306c0f13dcd5fdf20af8d0d1d7a2c1d90f4bff2ef7f8702afcbf45b1d00313138257f90adca399831d0a31fa6f4e9fcb03277eb8b065e0f87be27c8d6217cd

    • \Users\Admin\AppData\Local\Temp\r25FB.tmp.exe

      Filesize

      43KB

      MD5

      51138beea3e2c21ec44d0932c71762a8

      SHA1

      8939cf35447b22dd2c6e6f443446acc1bf986d58

      SHA256

      5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

      SHA512

      794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

    • \Users\Admin\AppData\Local\Temp\y25EA.tmp.dll

      Filesize

      872KB

      MD5

      5fdcea322cf58363b0306d9c2285ed67

      SHA1

      fc32557fe96bb871646255a4f99f902fa351a4b8

      SHA256

      785f6622521fe6e41854c8be9f507fe7aef9c48b814aeb1d77dca8c7bccf1f46

      SHA512

      8c306c0f13dcd5fdf20af8d0d1d7a2c1d90f4bff2ef7f8702afcbf45b1d00313138257f90adca399831d0a31fa6f4e9fcb03277eb8b065e0f87be27c8d6217cd

    • \Users\Admin\AppData\Local\Temp\y25EA.tmp.dll

      Filesize

      872KB

      MD5

      5fdcea322cf58363b0306d9c2285ed67

      SHA1

      fc32557fe96bb871646255a4f99f902fa351a4b8

      SHA256

      785f6622521fe6e41854c8be9f507fe7aef9c48b814aeb1d77dca8c7bccf1f46

      SHA512

      8c306c0f13dcd5fdf20af8d0d1d7a2c1d90f4bff2ef7f8702afcbf45b1d00313138257f90adca399831d0a31fa6f4e9fcb03277eb8b065e0f87be27c8d6217cd

    • \Users\Admin\AppData\Local\Temp\y25EA.tmp.dll

      Filesize

      872KB

      MD5

      5fdcea322cf58363b0306d9c2285ed67

      SHA1

      fc32557fe96bb871646255a4f99f902fa351a4b8

      SHA256

      785f6622521fe6e41854c8be9f507fe7aef9c48b814aeb1d77dca8c7bccf1f46

      SHA512

      8c306c0f13dcd5fdf20af8d0d1d7a2c1d90f4bff2ef7f8702afcbf45b1d00313138257f90adca399831d0a31fa6f4e9fcb03277eb8b065e0f87be27c8d6217cd

    • \Users\Admin\AppData\Local\Temp\y25EA.tmp.dll

      Filesize

      872KB

      MD5

      5fdcea322cf58363b0306d9c2285ed67

      SHA1

      fc32557fe96bb871646255a4f99f902fa351a4b8

      SHA256

      785f6622521fe6e41854c8be9f507fe7aef9c48b814aeb1d77dca8c7bccf1f46

      SHA512

      8c306c0f13dcd5fdf20af8d0d1d7a2c1d90f4bff2ef7f8702afcbf45b1d00313138257f90adca399831d0a31fa6f4e9fcb03277eb8b065e0f87be27c8d6217cd

    • memory/1124-112-0x0000000000150000-0x0000000000156000-memory.dmp

      Filesize

      24KB

    • memory/1124-108-0x0000000001D60000-0x0000000001E3E000-memory.dmp

      Filesize

      888KB

    • memory/1124-104-0x0000000001D60000-0x0000000001E3E000-memory.dmp

      Filesize

      888KB

    • memory/1124-96-0x0000000000000000-mapping.dmp

    • memory/1336-68-0x0000000000461000-0x0000000000465000-memory.dmp

      Filesize

      16KB

    • memory/1336-89-0x0000000000461000-0x0000000000465000-memory.dmp

      Filesize

      16KB

    • memory/1336-69-0x0000000000461000-0x0000000000465000-memory.dmp

      Filesize

      16KB

    • memory/1336-54-0x0000000072171000-0x0000000072174000-memory.dmp

      Filesize

      12KB

    • memory/1336-71-0x0000000000461000-0x0000000000465000-memory.dmp

      Filesize

      16KB

    • memory/1336-70-0x0000000000461000-0x0000000000465000-memory.dmp

      Filesize

      16KB

    • memory/1336-72-0x0000000000461000-0x0000000000465000-memory.dmp

      Filesize

      16KB

    • memory/1336-73-0x0000000000461000-0x0000000000465000-memory.dmp

      Filesize

      16KB

    • memory/1336-75-0x0000000000461000-0x0000000000465000-memory.dmp

      Filesize

      16KB

    • memory/1336-74-0x0000000000461000-0x0000000000465000-memory.dmp

      Filesize

      16KB

    • memory/1336-76-0x0000000000461000-0x0000000000465000-memory.dmp

      Filesize

      16KB

    • memory/1336-77-0x0000000000461000-0x0000000000465000-memory.dmp

      Filesize

      16KB

    • memory/1336-78-0x0000000000461000-0x0000000000465000-memory.dmp

      Filesize

      16KB

    • memory/1336-80-0x0000000000461000-0x0000000000465000-memory.dmp

      Filesize

      16KB

    • memory/1336-79-0x0000000000461000-0x0000000000465000-memory.dmp

      Filesize

      16KB

    • memory/1336-81-0x0000000000461000-0x0000000000465000-memory.dmp

      Filesize

      16KB

    • memory/1336-83-0x0000000000461000-0x0000000000465000-memory.dmp

      Filesize

      16KB

    • memory/1336-82-0x0000000000461000-0x0000000000465000-memory.dmp

      Filesize

      16KB

    • memory/1336-84-0x0000000000461000-0x0000000000465000-memory.dmp

      Filesize

      16KB

    • memory/1336-86-0x0000000000461000-0x0000000000465000-memory.dmp

      Filesize

      16KB

    • memory/1336-85-0x0000000000461000-0x0000000000465000-memory.dmp

      Filesize

      16KB

    • memory/1336-91-0x0000000000461000-0x0000000000465000-memory.dmp

      Filesize

      16KB

    • memory/1336-90-0x0000000000461000-0x0000000000465000-memory.dmp

      Filesize

      16KB

    • memory/1336-66-0x0000000000461000-0x0000000000465000-memory.dmp

      Filesize

      16KB

    • memory/1336-92-0x0000000000461000-0x0000000000465000-memory.dmp

      Filesize

      16KB

    • memory/1336-88-0x0000000000461000-0x0000000000465000-memory.dmp

      Filesize

      16KB

    • memory/1336-117-0x0000000070BDD000-0x0000000070BE8000-memory.dmp

      Filesize

      44KB

    • memory/1336-116-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1336-67-0x0000000000461000-0x0000000000465000-memory.dmp

      Filesize

      16KB

    • memory/1336-65-0x0000000000461000-0x0000000000465000-memory.dmp

      Filesize

      16KB

    • memory/1336-64-0x0000000000461000-0x0000000000465000-memory.dmp

      Filesize

      16KB

    • memory/1336-62-0x0000000000461000-0x0000000000465000-memory.dmp

      Filesize

      16KB

    • memory/1336-63-0x0000000000461000-0x0000000000465000-memory.dmp

      Filesize

      16KB

    • memory/1336-61-0x0000000000461000-0x0000000000465000-memory.dmp

      Filesize

      16KB

    • memory/1336-59-0x0000000000461000-0x0000000000465000-memory.dmp

      Filesize

      16KB

    • memory/1336-60-0x0000000000461000-0x0000000000465000-memory.dmp

      Filesize

      16KB

    • memory/1336-58-0x0000000070BDD000-0x0000000070BE8000-memory.dmp

      Filesize

      44KB

    • memory/1336-57-0x0000000074B51000-0x0000000074B53000-memory.dmp

      Filesize

      8KB

    • memory/1336-105-0x0000000006720000-0x000000000736A000-memory.dmp

      Filesize

      12.3MB

    • memory/1336-106-0x0000000002470000-0x0000000002523000-memory.dmp

      Filesize

      716KB

    • memory/1336-107-0x0000000006720000-0x000000000736A000-memory.dmp

      Filesize

      12.3MB

    • memory/1336-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1336-55-0x000000006FBF1000-0x000000006FBF3000-memory.dmp

      Filesize

      8KB

    • memory/1336-113-0x0000000070BDD000-0x0000000070BE8000-memory.dmp

      Filesize

      44KB

    • memory/1336-114-0x0000000006720000-0x000000000736A000-memory.dmp

      Filesize

      12.3MB

    • memory/1336-115-0x0000000002470000-0x0000000002523000-memory.dmp

      Filesize

      716KB

    • memory/1784-94-0x000007FEFB5D1000-0x000007FEFB5D3000-memory.dmp

      Filesize

      8KB

    • memory/1784-93-0x0000000000000000-mapping.dmp