Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
06-07-2022 04:55
Static task
static1
Behavioral task
behavioral1
Sample
bbdy_document_07.06.2022.docm
Resource
win7-20220414-en
General
-
Target
bbdy_document_07.06.2022.docm
-
Size
2.8MB
-
MD5
d099b942e5e42a6f4cf0428a16d9e234
-
SHA1
f79cc392c65c3242ceac6314bcf86a5162a87208
-
SHA256
bddea66a3234b3773af6aff828f02df1c894516a54cbd2ccea6ff722262d0fa5
-
SHA512
b253d0d91e7415cea6f44f1cd72bcb86e3195aa8fc09e3a3a10aeb10429518963e218a7c271e467c37604ef447136d1d14452d938eacd2b02d9a1900f481f321
Malware Config
Signatures
-
Detects SVCReady loader 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3912-144-0x00000000012A0000-0x000000000137E000-memory.dmp family_svcready -
Executes dropped EXE 1 IoCs
Processes:
rBB37.tmp.exepid process 3912 rBB37.tmp.exe -
Loads dropped DLL 2 IoCs
Processes:
rBB37.tmp.exepid process 3912 rBB37.tmp.exe 3912 rBB37.tmp.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 1736 WINWORD.EXE 1736 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 1736 WINWORD.EXE 1736 WINWORD.EXE 1736 WINWORD.EXE 1736 WINWORD.EXE 1736 WINWORD.EXE 1736 WINWORD.EXE 1736 WINWORD.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
WINWORD.EXEdescription pid process target process PID 1736 wrote to memory of 3912 1736 WINWORD.EXE rBB37.tmp.exe PID 1736 wrote to memory of 3912 1736 WINWORD.EXE rBB37.tmp.exe PID 1736 wrote to memory of 3912 1736 WINWORD.EXE rBB37.tmp.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\bbdy_document_07.06.2022.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\rBB37.tmp.exe"C:\Users\Admin\AppData\Local\Temp\rBB37.tmp.exe" "C:\Users\Admin\AppData\Local\Temp\yBB36.tmp.dll",DllRegisterServer2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3912
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
872KB
MD5b58d95a3f3aec8e9deebf8c78ca6a064
SHA14c7a68e412ce0a362ac9595462ce0c8676ce0953
SHA25658cdbd0377fe68e45161aafc0dd6a2b1fd188b87c34bd44d92afe34ebb186123
SHA5125a4bb554bab0dc8986aa8e061a17568dfe0adc55a563e7249d9a9fb43bcb30e5ac30aef57fad2173b223bae9e2591979450c45251a837bd4ac5217172d2b1735
-
Filesize
872KB
MD5b58d95a3f3aec8e9deebf8c78ca6a064
SHA14c7a68e412ce0a362ac9595462ce0c8676ce0953
SHA25658cdbd0377fe68e45161aafc0dd6a2b1fd188b87c34bd44d92afe34ebb186123
SHA5125a4bb554bab0dc8986aa8e061a17568dfe0adc55a563e7249d9a9fb43bcb30e5ac30aef57fad2173b223bae9e2591979450c45251a837bd4ac5217172d2b1735
-
Filesize
872KB
MD5b58d95a3f3aec8e9deebf8c78ca6a064
SHA14c7a68e412ce0a362ac9595462ce0c8676ce0953
SHA25658cdbd0377fe68e45161aafc0dd6a2b1fd188b87c34bd44d92afe34ebb186123
SHA5125a4bb554bab0dc8986aa8e061a17568dfe0adc55a563e7249d9a9fb43bcb30e5ac30aef57fad2173b223bae9e2591979450c45251a837bd4ac5217172d2b1735