Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
04-07-2022 14:13
Static task
static1
General
-
Target
tcrc-central-le file 07.01.22.docm
-
Size
2.7MB
-
MD5
0c95040bdebc9056d2819805d0f57df1
-
SHA1
41e5aed2a800d199198527cc382d9284c2840edd
-
SHA256
1dc652ce6616a4dc16dc065ab189eb0f365d02c1d1ec45a5875c41ff98b24753
-
SHA512
07bdd43a5eec5b8b2a2ff6814c81542ef157db186703cd0b3e6ca0a3fe07bcd8e28cc0ccd49f53f7f952aa04bf0c88469fde204a8be98be8dca3911e3292a06a
Malware Config
Signatures
-
Detects SVCReady loader 1 IoCs
Processes:
resource yara_rule behavioral1/memory/660-142-0x0000000000400000-0x00000000004DE000-memory.dmp family_svcready -
Executes dropped EXE 1 IoCs
Processes:
r6D56.tmp.exepid process 660 r6D56.tmp.exe -
Loads dropped DLL 1 IoCs
Processes:
r6D56.tmp.exepid process 660 r6D56.tmp.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 2296 WINWORD.EXE 2296 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 2296 WINWORD.EXE 2296 WINWORD.EXE 2296 WINWORD.EXE 2296 WINWORD.EXE 2296 WINWORD.EXE 2296 WINWORD.EXE 2296 WINWORD.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
WINWORD.EXEdescription pid process target process PID 2296 wrote to memory of 660 2296 WINWORD.EXE r6D56.tmp.exe PID 2296 wrote to memory of 660 2296 WINWORD.EXE r6D56.tmp.exe PID 2296 wrote to memory of 660 2296 WINWORD.EXE r6D56.tmp.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\tcrc-central-le file 07.01.22.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\r6D56.tmp.exe"C:\Users\Admin\AppData\Local\Temp\r6D56.tmp.exe" "C:\Users\Admin\AppData\Local\Temp\y6D55.tmp.dll",DllRegisterServer2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:660
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
872KB
MD578d5c6d3f346887ea9b4faab633d64b9
SHA1d06c561de71e171077a0b54a0dd6b14675567e38
SHA2566f02e29e39b15b843fea13880a6e772e9bd9427d8420130adbc8dc8b0e286cb3
SHA512429f0c92f980150f8379454759a8a4d204195c78a0e68ce028e2f92d04ac830ba2cc7aa0b709c80d956ca04a5cfc705f58f9611fa31e20ef09658237bf5b4025
-
Filesize
872KB
MD578d5c6d3f346887ea9b4faab633d64b9
SHA1d06c561de71e171077a0b54a0dd6b14675567e38
SHA2566f02e29e39b15b843fea13880a6e772e9bd9427d8420130adbc8dc8b0e286cb3
SHA512429f0c92f980150f8379454759a8a4d204195c78a0e68ce028e2f92d04ac830ba2cc7aa0b709c80d956ca04a5cfc705f58f9611fa31e20ef09658237bf5b4025