Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
resource tags
arch:x64arch:x86image:win10v2004-20220414-enlocale:en-usos:windows10-2004-x64system -
submitted
18-07-2022 10:19
Static task
static1
Behavioral task
behavioral1
Sample
istitutomargherita.file.18.07.docm
Resource
win7-20220414-en
General
-
Target
istitutomargherita.file.18.07.docm
-
Size
3.2MB
-
MD5
3c3aeb87e50a8c12be02cfd72dceee5e
-
SHA1
814ea26a811a4f1c847a4bc598638c28c960670d
-
SHA256
d6acdac122f88d9b41441921cc28cd4dd9f0d7ea2c19bd8b00c34e0644f93fbf
-
SHA512
c166bc64d3c72aabe98964b528814b862c58b1ff833b85c74ab72d53cfc25b754f32562fe50467dfe6137fa0c7d5719b68785c387edff603c5d3b903caac5ae4
Malware Config
Signatures
-
Detects SVCReady loader 1 IoCs
resource yara_rule behavioral2/memory/2708-141-0x0000000010000000-0x0000000010091000-memory.dmp family_svcready -
Executes dropped EXE 1 IoCs
pid Process 2708 r72C5.tmp.exe -
Loads dropped DLL 1 IoCs
pid Process 2708 r72C5.tmp.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4948 WINWORD.EXE 4948 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4948 WINWORD.EXE 4948 WINWORD.EXE 4948 WINWORD.EXE 4948 WINWORD.EXE 4948 WINWORD.EXE 4948 WINWORD.EXE 4948 WINWORD.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4948 wrote to memory of 2708 4948 WINWORD.EXE 83 PID 4948 wrote to memory of 2708 4948 WINWORD.EXE 83 PID 4948 wrote to memory of 2708 4948 WINWORD.EXE 83
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\istitutomargherita.file.18.07.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\r72C5.tmp.exe"C:\Users\Admin\AppData\Local\Temp\r72C5.tmp.exe" "C:\Users\Admin\AppData\Local\Temp\y72C4.tmp.dll",DllRegisterServer2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2708
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
1.1MB
MD57ec1c191a4090c2ac974f4cf35059514
SHA11802bb7f75292ad26f53328b9c7df044d8f41dad
SHA2565feb8b2988d631bca34004c8ba13f043f585150b9cd83aad3a8e8c4839eb6a0b
SHA512ccd1172e975821ff175dafbe3c84267b038af829952bdf47ffe24f76000fb41e06d9175922b6b3edad65411a141c4ba800a15ff51209af522aeee2495361b8ab
-
Filesize
1.1MB
MD57ec1c191a4090c2ac974f4cf35059514
SHA11802bb7f75292ad26f53328b9c7df044d8f41dad
SHA2565feb8b2988d631bca34004c8ba13f043f585150b9cd83aad3a8e8c4839eb6a0b
SHA512ccd1172e975821ff175dafbe3c84267b038af829952bdf47ffe24f76000fb41e06d9175922b6b3edad65411a141c4ba800a15ff51209af522aeee2495361b8ab