Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220718-en -
resource tags
arch:x64arch:x86image:win10v2004-20220718-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2022 08:48
Static task
static1
Behavioral task
behavioral1
Sample
file.docm
Resource
win7-20220715-en
General
-
Target
file.docm
-
Size
3.2MB
-
MD5
9f624e07ac899fe81216f4f03f805d11
-
SHA1
16c4a5a94a31a116a5fdc4d2c874aad8949e7ec0
-
SHA256
547fcfe99ba45c0cc805339365a7b5f1858f2cf208499bccaf6b432da4711660
-
SHA512
8c96378647d1b8337279ec58aff481054a2678173483493e1fc20b956f80e34a5a8f56703596f6fa017b8c3e9d13b695c61eecf455c45952650195cc2dc92f99
Malware Config
Signatures
-
Detects SVCReady loader 1 IoCs
Processes:
resource yara_rule behavioral2/memory/900-144-0x0000000010000000-0x0000000010091000-memory.dmp family_svcready -
Executes dropped EXE 1 IoCs
Processes:
rED15.tmp.exepid process 900 rED15.tmp.exe -
Loads dropped DLL 1 IoCs
Processes:
rED15.tmp.exepid process 900 rED15.tmp.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 1248 WINWORD.EXE 1248 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 1248 WINWORD.EXE 1248 WINWORD.EXE 1248 WINWORD.EXE 1248 WINWORD.EXE 1248 WINWORD.EXE 1248 WINWORD.EXE 1248 WINWORD.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
WINWORD.EXEdescription pid process target process PID 1248 wrote to memory of 900 1248 WINWORD.EXE rED15.tmp.exe PID 1248 wrote to memory of 900 1248 WINWORD.EXE rED15.tmp.exe PID 1248 wrote to memory of 900 1248 WINWORD.EXE rED15.tmp.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\file.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\rED15.tmp.exe"C:\Users\Admin\AppData\Local\Temp\rED15.tmp.exe" "C:\Users\Admin\AppData\Local\Temp\yED14.tmp.dll",DllRegisterServer2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:900
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
1.1MB
MD5ff5f830dc322184515b3a48cef3ab9d4
SHA1095cede1a8181e1ca896aabf7749aad20f225edf
SHA2565939c06ca06629ffac62aa5c2f5b81deacc7d540773b00cb603183c45c246d70
SHA5127384e2eab8acea1f76890ee02d11fa2818b01e61a9f4e7aca506c4ef27d58109961bdc752b25f015861fc35087bcf1e1f5f3b0f7eab6a85fb68eca3f70dc4266
-
Filesize
1.1MB
MD5ff5f830dc322184515b3a48cef3ab9d4
SHA1095cede1a8181e1ca896aabf7749aad20f225edf
SHA2565939c06ca06629ffac62aa5c2f5b81deacc7d540773b00cb603183c45c246d70
SHA5127384e2eab8acea1f76890ee02d11fa2818b01e61a9f4e7aca506c4ef27d58109961bdc752b25f015861fc35087bcf1e1f5f3b0f7eab6a85fb68eca3f70dc4266