Analysis

  • max time kernel
    1758s
  • max time network
    1613s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    06-07-2022 04:20

General

  • Target

    bbdy_document_07.06.2022.docm

  • Size

    2.8MB

  • MD5

    d099b942e5e42a6f4cf0428a16d9e234

  • SHA1

    f79cc392c65c3242ceac6314bcf86a5162a87208

  • SHA256

    bddea66a3234b3773af6aff828f02df1c894516a54cbd2ccea6ff722262d0fa5

  • SHA512

    b253d0d91e7415cea6f44f1cd72bcb86e3195aa8fc09e3a3a10aeb10429518963e218a7c271e467c37604ef447136d1d14452d938eacd2b02d9a1900f481f321

Malware Config

Signatures

  • Detects SVCReady loader 2 IoCs
  • SVCReady

    SVCReady is a malware loader first seen in April 2022.

  • suricata: ET MALWARE Observed Win32/SVCReady Loader User-Agent

    suricata: ET MALWARE Observed Win32/SVCReady Loader User-Agent

  • suricata: ET MALWARE Win32/SVCReady Loader CnC Activity M2

    suricata: ET MALWARE Win32/SVCReady Loader CnC Activity M2

  • Executes dropped EXE 1 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 15 IoCs
  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\bbdy_document_07.06.2022.docm"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1716
      • C:\Users\Admin\AppData\Local\Temp\r8920.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\r8920.tmp.exe" "C:\Users\Admin\AppData\Local\Temp\y891F.tmp.dll",DllRegisterServer
        2⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Loads dropped DLL
        • Enumerates system info in registry
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1508
        • C:\Windows\SysWOW64\systeminfo.exe
          C:\Windows\System32\systeminfo.exe
          3⤵
          • Gathers system information
          PID:1948
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:1584

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\r8920.tmp.exe

        Filesize

        43KB

        MD5

        51138beea3e2c21ec44d0932c71762a8

        SHA1

        8939cf35447b22dd2c6e6f443446acc1bf986d58

        SHA256

        5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

        SHA512

        794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

      • C:\Users\Admin\AppData\Local\Temp\r8920.tmp.exe

        Filesize

        43KB

        MD5

        51138beea3e2c21ec44d0932c71762a8

        SHA1

        8939cf35447b22dd2c6e6f443446acc1bf986d58

        SHA256

        5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

        SHA512

        794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

      • C:\Users\Admin\AppData\Local\Temp\y891F.tmp.dll

        Filesize

        872KB

        MD5

        b58d95a3f3aec8e9deebf8c78ca6a064

        SHA1

        4c7a68e412ce0a362ac9595462ce0c8676ce0953

        SHA256

        58cdbd0377fe68e45161aafc0dd6a2b1fd188b87c34bd44d92afe34ebb186123

        SHA512

        5a4bb554bab0dc8986aa8e061a17568dfe0adc55a563e7249d9a9fb43bcb30e5ac30aef57fad2173b223bae9e2591979450c45251a837bd4ac5217172d2b1735

      • \??\PIPE\wkssvc

        MD5

        d41d8cd98f00b204e9800998ecf8427e

        SHA1

        da39a3ee5e6b4b0d3255bfef95601890afd80709

        SHA256

        e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

        SHA512

        cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

      • \Users\Admin\AppData\Local\Temp\r8920.tmp.exe

        Filesize

        43KB

        MD5

        51138beea3e2c21ec44d0932c71762a8

        SHA1

        8939cf35447b22dd2c6e6f443446acc1bf986d58

        SHA256

        5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

        SHA512

        794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

      • \Users\Admin\AppData\Local\Temp\y891F.tmp.dll

        Filesize

        872KB

        MD5

        b58d95a3f3aec8e9deebf8c78ca6a064

        SHA1

        4c7a68e412ce0a362ac9595462ce0c8676ce0953

        SHA256

        58cdbd0377fe68e45161aafc0dd6a2b1fd188b87c34bd44d92afe34ebb186123

        SHA512

        5a4bb554bab0dc8986aa8e061a17568dfe0adc55a563e7249d9a9fb43bcb30e5ac30aef57fad2173b223bae9e2591979450c45251a837bd4ac5217172d2b1735

      • \Users\Admin\AppData\Local\Temp\y891F.tmp.dll

        Filesize

        872KB

        MD5

        b58d95a3f3aec8e9deebf8c78ca6a064

        SHA1

        4c7a68e412ce0a362ac9595462ce0c8676ce0953

        SHA256

        58cdbd0377fe68e45161aafc0dd6a2b1fd188b87c34bd44d92afe34ebb186123

        SHA512

        5a4bb554bab0dc8986aa8e061a17568dfe0adc55a563e7249d9a9fb43bcb30e5ac30aef57fad2173b223bae9e2591979450c45251a837bd4ac5217172d2b1735

      • \Users\Admin\AppData\Local\Temp\y891F.tmp.dll

        Filesize

        872KB

        MD5

        b58d95a3f3aec8e9deebf8c78ca6a064

        SHA1

        4c7a68e412ce0a362ac9595462ce0c8676ce0953

        SHA256

        58cdbd0377fe68e45161aafc0dd6a2b1fd188b87c34bd44d92afe34ebb186123

        SHA512

        5a4bb554bab0dc8986aa8e061a17568dfe0adc55a563e7249d9a9fb43bcb30e5ac30aef57fad2173b223bae9e2591979450c45251a837bd4ac5217172d2b1735

      • \Users\Admin\AppData\Local\Temp\y891F.tmp.dll

        Filesize

        872KB

        MD5

        b58d95a3f3aec8e9deebf8c78ca6a064

        SHA1

        4c7a68e412ce0a362ac9595462ce0c8676ce0953

        SHA256

        58cdbd0377fe68e45161aafc0dd6a2b1fd188b87c34bd44d92afe34ebb186123

        SHA512

        5a4bb554bab0dc8986aa8e061a17568dfe0adc55a563e7249d9a9fb43bcb30e5ac30aef57fad2173b223bae9e2591979450c45251a837bd4ac5217172d2b1735

      • memory/1508-105-0x0000000000450000-0x000000000052E000-memory.dmp

        Filesize

        888KB

      • memory/1508-104-0x0000000000450000-0x000000000052E000-memory.dmp

        Filesize

        888KB

      • memory/1508-96-0x0000000000000000-mapping.dmp

      • memory/1508-112-0x00000000000A0000-0x00000000000A6000-memory.dmp

        Filesize

        24KB

      • memory/1716-93-0x0000000000000000-mapping.dmp

      • memory/1716-94-0x000007FEFC3A1000-0x000007FEFC3A3000-memory.dmp

        Filesize

        8KB

      • memory/1948-118-0x0000000000000000-mapping.dmp

      • memory/2008-69-0x00000000004BC000-0x00000000004C0000-memory.dmp

        Filesize

        16KB

      • memory/2008-88-0x00000000004BC000-0x00000000004C0000-memory.dmp

        Filesize

        16KB

      • memory/2008-73-0x00000000004BC000-0x00000000004C0000-memory.dmp

        Filesize

        16KB

      • memory/2008-72-0x00000000004BC000-0x00000000004C0000-memory.dmp

        Filesize

        16KB

      • memory/2008-75-0x00000000004BC000-0x00000000004C0000-memory.dmp

        Filesize

        16KB

      • memory/2008-74-0x00000000004BC000-0x00000000004C0000-memory.dmp

        Filesize

        16KB

      • memory/2008-76-0x00000000004BC000-0x00000000004C0000-memory.dmp

        Filesize

        16KB

      • memory/2008-77-0x00000000004BC000-0x00000000004C0000-memory.dmp

        Filesize

        16KB

      • memory/2008-78-0x00000000004BC000-0x00000000004C0000-memory.dmp

        Filesize

        16KB

      • memory/2008-79-0x00000000004BC000-0x00000000004C0000-memory.dmp

        Filesize

        16KB

      • memory/2008-80-0x00000000004BC000-0x00000000004C0000-memory.dmp

        Filesize

        16KB

      • memory/2008-81-0x00000000004BC000-0x00000000004C0000-memory.dmp

        Filesize

        16KB

      • memory/2008-83-0x00000000004BC000-0x00000000004C0000-memory.dmp

        Filesize

        16KB

      • memory/2008-82-0x00000000004BC000-0x00000000004C0000-memory.dmp

        Filesize

        16KB

      • memory/2008-84-0x00000000004BC000-0x00000000004C0000-memory.dmp

        Filesize

        16KB

      • memory/2008-85-0x00000000004BC000-0x00000000004C0000-memory.dmp

        Filesize

        16KB

      • memory/2008-86-0x00000000004BC000-0x00000000004C0000-memory.dmp

        Filesize

        16KB

      • memory/2008-91-0x00000000004BC000-0x00000000004C0000-memory.dmp

        Filesize

        16KB

      • memory/2008-92-0x00000000004BC000-0x00000000004C0000-memory.dmp

        Filesize

        16KB

      • memory/2008-90-0x00000000004BC000-0x00000000004C0000-memory.dmp

        Filesize

        16KB

      • memory/2008-89-0x00000000004BC000-0x00000000004C0000-memory.dmp

        Filesize

        16KB

      • memory/2008-70-0x00000000004BC000-0x00000000004C0000-memory.dmp

        Filesize

        16KB

      • memory/2008-71-0x00000000004BC000-0x00000000004C0000-memory.dmp

        Filesize

        16KB

      • memory/2008-68-0x00000000004BC000-0x00000000004C0000-memory.dmp

        Filesize

        16KB

      • memory/2008-54-0x0000000072E91000-0x0000000072E94000-memory.dmp

        Filesize

        12KB

      • memory/2008-66-0x00000000004BC000-0x00000000004C0000-memory.dmp

        Filesize

        16KB

      • memory/2008-67-0x00000000004BC000-0x00000000004C0000-memory.dmp

        Filesize

        16KB

      • memory/2008-64-0x00000000004BC000-0x00000000004C0000-memory.dmp

        Filesize

        16KB

      • memory/2008-65-0x00000000004BC000-0x00000000004C0000-memory.dmp

        Filesize

        16KB

      • memory/2008-63-0x00000000004BC000-0x00000000004C0000-memory.dmp

        Filesize

        16KB

      • memory/2008-60-0x00000000004BC000-0x00000000004C0000-memory.dmp

        Filesize

        16KB

      • memory/2008-62-0x00000000004BC000-0x00000000004C0000-memory.dmp

        Filesize

        16KB

      • memory/2008-61-0x00000000004BC000-0x00000000004C0000-memory.dmp

        Filesize

        16KB

      • memory/2008-59-0x00000000004BC000-0x00000000004C0000-memory.dmp

        Filesize

        16KB

      • memory/2008-58-0x00000000718FD000-0x0000000071908000-memory.dmp

        Filesize

        44KB

      • memory/2008-109-0x00000000068B0000-0x00000000074FA000-memory.dmp

        Filesize

        12.3MB

      • memory/2008-110-0x0000000002450000-0x0000000002503000-memory.dmp

        Filesize

        716KB

      • memory/2008-111-0x00000000068B0000-0x00000000074FA000-memory.dmp

        Filesize

        12.3MB

      • memory/2008-57-0x0000000075F21000-0x0000000075F23000-memory.dmp

        Filesize

        8KB

      • memory/2008-113-0x00000000718FD000-0x0000000071908000-memory.dmp

        Filesize

        44KB

      • memory/2008-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/2008-55-0x0000000070911000-0x0000000070913000-memory.dmp

        Filesize

        8KB