Analysis
-
max time kernel
1688s -
max time network
1612s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
06-07-2022 04:20
Static task
static1
Behavioral task
behavioral1
Sample
bbdy_document_07.06.2022.docm
Resource
win7-20220414-en
General
-
Target
bbdy_document_07.06.2022.docm
-
Size
2.8MB
-
MD5
d099b942e5e42a6f4cf0428a16d9e234
-
SHA1
f79cc392c65c3242ceac6314bcf86a5162a87208
-
SHA256
bddea66a3234b3773af6aff828f02df1c894516a54cbd2ccea6ff722262d0fa5
-
SHA512
b253d0d91e7415cea6f44f1cd72bcb86e3195aa8fc09e3a3a10aeb10429518963e218a7c271e467c37604ef447136d1d14452d938eacd2b02d9a1900f481f321
Malware Config
Signatures
-
Detects SVCReady loader 1 IoCs
Processes:
resource yara_rule behavioral2/memory/5028-325-0x0000000000400000-0x00000000004DE000-memory.dmp family_svcready -
suricata: ET MALWARE Observed Win32/SVCReady Loader User-Agent
suricata: ET MALWARE Observed Win32/SVCReady Loader User-Agent
-
suricata: ET MALWARE Win32/SVCReady Loader CnC Activity M2
suricata: ET MALWARE Win32/SVCReady Loader CnC Activity M2
-
Executes dropped EXE 1 IoCs
Processes:
rC3C3.tmp.exepid Process 5028 rC3C3.tmp.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
rC3C3.tmp.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rC3C3.tmp.exe -
Loads dropped DLL 1 IoCs
Processes:
rC3C3.tmp.exepid Process 5028 rC3C3.tmp.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE -
Enumerates system info in registry 2 TTPs 18 IoCs
Processes:
rC3C3.tmp.exeWINWORD.EXEdescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardManufacturer rC3C3.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\ECFirmwareMajorRelease rC3C3.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\ECFirmwareMinorRelease rC3C3.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU rC3C3.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVendor rC3C3.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVersion rC3C3.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer rC3C3.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rC3C3.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BiosMajorRelease rC3C3.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BiosMinorRelease rC3C3.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardVersion rC3C3.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily rC3C3.tmp.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct rC3C3.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSReleaseDate rC3C3.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName rC3C3.tmp.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Modifies registry class 2 IoCs
Processes:
rC3C3.tmp.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000_Classes\CLSID\{E6D34FFC-AD32-4d6a-934C-D387FA873A19} rC3C3.tmp.exe Set value (data) \REGISTRY\USER\S-1-5-21-3297182285-798020602-2032295036-1000_Classes\CLSID\{E6D34FFC-AD32-4d6a-934C-D387FA873A19}\ = 0e0000005ac751876577a1aa7d34b3867f21ad406251b5792f90facb0043ca249ffaa265a59cb4ee411337a503b6a604e7d3 rC3C3.tmp.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid Process 2384 WINWORD.EXE 2384 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
rC3C3.tmp.exepid Process 5028 rC3C3.tmp.exe 5028 rC3C3.tmp.exe 5028 rC3C3.tmp.exe 5028 rC3C3.tmp.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
WINWORD.EXEpid Process 2384 WINWORD.EXE 2384 WINWORD.EXE 2384 WINWORD.EXE 2384 WINWORD.EXE 2384 WINWORD.EXE 2384 WINWORD.EXE 2384 WINWORD.EXE 2384 WINWORD.EXE 2384 WINWORD.EXE 2384 WINWORD.EXE 2384 WINWORD.EXE 2384 WINWORD.EXE 2384 WINWORD.EXE 2384 WINWORD.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
WINWORD.EXErC3C3.tmp.exedescription pid Process procid_target PID 2384 wrote to memory of 5028 2384 WINWORD.EXE 68 PID 2384 wrote to memory of 5028 2384 WINWORD.EXE 68 PID 2384 wrote to memory of 5028 2384 WINWORD.EXE 68 PID 5028 wrote to memory of 1348 5028 rC3C3.tmp.exe 74 PID 5028 wrote to memory of 1348 5028 rC3C3.tmp.exe 74 PID 5028 wrote to memory of 1348 5028 rC3C3.tmp.exe 74
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\bbdy_document_07.06.2022.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\rC3C3.tmp.exe"C:\Users\Admin\AppData\Local\Temp\rC3C3.tmp.exe" "C:\Users\Admin\AppData\Local\Temp\yC3C2.tmp.dll",DllRegisterServer2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\systeminfo.exeC:\Windows\System32\systeminfo.exe3⤵
- Gathers system information
PID:1348
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD5f57886ace1ab4972b0308f69b1a0029c
SHA1519b2a981cb522ed2b0901f9871f9aa9781a6cd5
SHA2562be981b3686ee5e725583f5936f5f0a0992723cad784457f91d9d1d5a15a0852
SHA512c2b3f016a8c3993771cd5709e469c9dedfa1dd35047691de5e853e2ad0ac025ec210fc6cb662c82d08f62e2c889e5060e796414a4eaf6a6c1719cdd7e5debdf8
-
Filesize
59KB
MD5f57886ace1ab4972b0308f69b1a0029c
SHA1519b2a981cb522ed2b0901f9871f9aa9781a6cd5
SHA2562be981b3686ee5e725583f5936f5f0a0992723cad784457f91d9d1d5a15a0852
SHA512c2b3f016a8c3993771cd5709e469c9dedfa1dd35047691de5e853e2ad0ac025ec210fc6cb662c82d08f62e2c889e5060e796414a4eaf6a6c1719cdd7e5debdf8
-
Filesize
872KB
MD5b58d95a3f3aec8e9deebf8c78ca6a064
SHA14c7a68e412ce0a362ac9595462ce0c8676ce0953
SHA25658cdbd0377fe68e45161aafc0dd6a2b1fd188b87c34bd44d92afe34ebb186123
SHA5125a4bb554bab0dc8986aa8e061a17568dfe0adc55a563e7249d9a9fb43bcb30e5ac30aef57fad2173b223bae9e2591979450c45251a837bd4ac5217172d2b1735
-
Filesize
872KB
MD5b58d95a3f3aec8e9deebf8c78ca6a064
SHA14c7a68e412ce0a362ac9595462ce0c8676ce0953
SHA25658cdbd0377fe68e45161aafc0dd6a2b1fd188b87c34bd44d92afe34ebb186123
SHA5125a4bb554bab0dc8986aa8e061a17568dfe0adc55a563e7249d9a9fb43bcb30e5ac30aef57fad2173b223bae9e2591979450c45251a837bd4ac5217172d2b1735