Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10_x64 -
resource
win10-20220414-en -
resource tags
arch:x64arch:x86image:win10-20220414-enlocale:en-usos:windows10-1703-x64system -
submitted
16-07-2022 21:21
Static task
static1
Behavioral task
behavioral1
Sample
comune.pozzoleone.vi document 17.06.docm
Resource
win7-20220715-en
General
-
Target
comune.pozzoleone.vi document 17.06.docm
-
Size
2.6MB
-
MD5
6238cf8f3223ca8cd3424d4b0845b979
-
SHA1
b9d1b3be74d8b659f3bd0dc4f0f079c9c70822d4
-
SHA256
96fbcbc57ca0b207ad0c1c3069b9eeab87b34fb27fb135be4979245852852434
-
SHA512
e08d5b7c8b5f175ee0e0308cb6fa10efb167e93a2012b07e5a187980d8c658faa716b79fbd25adac02bbf0e3fdb1e685904813b4593753a57a530a92fe877f0d
Malware Config
Signatures
-
Detects SVCReady loader 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3804-320-0x0000000000980000-0x0000000000A50000-memory.dmp family_svcready -
Executes dropped EXE 1 IoCs
Processes:
r938B.tmp.exepid process 3804 r938B.tmp.exe -
Loads dropped DLL 2 IoCs
Processes:
r938B.tmp.exepid process 3804 r938B.tmp.exe 3804 r938B.tmp.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4552 WINWORD.EXE 4552 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
WINWORD.EXEpid process 4552 WINWORD.EXE 4552 WINWORD.EXE 4552 WINWORD.EXE 4552 WINWORD.EXE 4552 WINWORD.EXE 4552 WINWORD.EXE 4552 WINWORD.EXE 4552 WINWORD.EXE 4552 WINWORD.EXE 4552 WINWORD.EXE 4552 WINWORD.EXE 4552 WINWORD.EXE 4552 WINWORD.EXE 4552 WINWORD.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
WINWORD.EXEdescription pid process target process PID 4552 wrote to memory of 3804 4552 WINWORD.EXE r938B.tmp.exe PID 4552 wrote to memory of 3804 4552 WINWORD.EXE r938B.tmp.exe PID 4552 wrote to memory of 3804 4552 WINWORD.EXE r938B.tmp.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\comune.pozzoleone.vi document 17.06.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\r938B.tmp.exe"C:\Users\Admin\AppData\Local\Temp\r938B.tmp.exe" "C:\Users\Admin\AppData\Local\Temp\y938A.tmp.dll",DllRegisterServer2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3804
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD5f57886ace1ab4972b0308f69b1a0029c
SHA1519b2a981cb522ed2b0901f9871f9aa9781a6cd5
SHA2562be981b3686ee5e725583f5936f5f0a0992723cad784457f91d9d1d5a15a0852
SHA512c2b3f016a8c3993771cd5709e469c9dedfa1dd35047691de5e853e2ad0ac025ec210fc6cb662c82d08f62e2c889e5060e796414a4eaf6a6c1719cdd7e5debdf8
-
Filesize
59KB
MD5f57886ace1ab4972b0308f69b1a0029c
SHA1519b2a981cb522ed2b0901f9871f9aa9781a6cd5
SHA2562be981b3686ee5e725583f5936f5f0a0992723cad784457f91d9d1d5a15a0852
SHA512c2b3f016a8c3993771cd5709e469c9dedfa1dd35047691de5e853e2ad0ac025ec210fc6cb662c82d08f62e2c889e5060e796414a4eaf6a6c1719cdd7e5debdf8
-
Filesize
820KB
MD5e9334bc1f6db1fe8db13e17c47299c74
SHA1da12f863b1c4f437efc8a5faa8e04e32439eb479
SHA256a7628a09046bc9f9144ecf506ef5a399befb8a985b028db8032a40ae0f96cf86
SHA512b2e10ccb89dc2ec23a824cf9c39d76c698f3f1f4a3498c1fcc7b68a73a9a15e28aac512a010c769582b965d544ee558cfdc2e59a672dd7e782826e9776640d95
-
Filesize
820KB
MD5e9334bc1f6db1fe8db13e17c47299c74
SHA1da12f863b1c4f437efc8a5faa8e04e32439eb479
SHA256a7628a09046bc9f9144ecf506ef5a399befb8a985b028db8032a40ae0f96cf86
SHA512b2e10ccb89dc2ec23a824cf9c39d76c698f3f1f4a3498c1fcc7b68a73a9a15e28aac512a010c769582b965d544ee558cfdc2e59a672dd7e782826e9776640d95
-
Filesize
820KB
MD5e9334bc1f6db1fe8db13e17c47299c74
SHA1da12f863b1c4f437efc8a5faa8e04e32439eb479
SHA256a7628a09046bc9f9144ecf506ef5a399befb8a985b028db8032a40ae0f96cf86
SHA512b2e10ccb89dc2ec23a824cf9c39d76c698f3f1f4a3498c1fcc7b68a73a9a15e28aac512a010c769582b965d544ee558cfdc2e59a672dd7e782826e9776640d95