Analysis

  • max time kernel
    101s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    23-07-2022 16:17

General

  • Target

    pelagagge_doc_22.07.22.docm

  • Size

    3.3MB

  • MD5

    f39f8d7d2f12d79fefd14ea74c995d61

  • SHA1

    c6fe79e4bb53730a6e6ffccba595974b55a9fb79

  • SHA256

    492634563551d944bb219f40b9b78694dd23377013023de597047ff4f9ecbff8

  • SHA512

    a7a32d83968d591e3b8bcad5280e26c7207c19bf9c2032d401df1c636e245e2770e27a5c4e24cffc85b9a4ab2444bee81842c6af2c29554a62ab1f7ef1bd7b6b

Score
10/10

Malware Config

Signatures

  • Detects SVCReady loader 1 IoCs
  • SVCReady

    SVCReady is a malware loader first seen in April 2022.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\pelagagge_doc_22.07.22.docm"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:992
      • C:\Users\Admin\AppData\Local\Temp\r24F1.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\r24F1.tmp.exe" "C:\Users\Admin\AppData\Local\Temp\y24F0.tmp.dll",DllRegisterServer
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:836

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\r24F1.tmp.exe

      Filesize

      43KB

      MD5

      51138beea3e2c21ec44d0932c71762a8

      SHA1

      8939cf35447b22dd2c6e6f443446acc1bf986d58

      SHA256

      5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

      SHA512

      794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

    • C:\Users\Admin\AppData\Local\Temp\r24F1.tmp.exe

      Filesize

      43KB

      MD5

      51138beea3e2c21ec44d0932c71762a8

      SHA1

      8939cf35447b22dd2c6e6f443446acc1bf986d58

      SHA256

      5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

      SHA512

      794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

    • C:\Users\Admin\AppData\Local\Temp\y24F0.tmp.dll

      Filesize

      1.2MB

      MD5

      d85878e661e2a7d2902ab49a297ba3cd

      SHA1

      b17d78e56099066c2a96c187947346ef5f5662ed

      SHA256

      a22bf0a51208ad469cec79dca709a28061c649de65544e2cedc18b2d05070331

      SHA512

      b24a52e0784882cec245cd52451627198f036504e52bd696a0b488417c48f98e0ca6d26b1bfcaa8ffd3e2074ae2612b1d33b0ea083dcce1552fe4070448b8351

    • \Users\Admin\AppData\Local\Temp\r24F1.tmp.exe

      Filesize

      43KB

      MD5

      51138beea3e2c21ec44d0932c71762a8

      SHA1

      8939cf35447b22dd2c6e6f443446acc1bf986d58

      SHA256

      5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

      SHA512

      794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

    • \Users\Admin\AppData\Local\Temp\y24F0.tmp.dll

      Filesize

      1.2MB

      MD5

      d85878e661e2a7d2902ab49a297ba3cd

      SHA1

      b17d78e56099066c2a96c187947346ef5f5662ed

      SHA256

      a22bf0a51208ad469cec79dca709a28061c649de65544e2cedc18b2d05070331

      SHA512

      b24a52e0784882cec245cd52451627198f036504e52bd696a0b488417c48f98e0ca6d26b1bfcaa8ffd3e2074ae2612b1d33b0ea083dcce1552fe4070448b8351

    • \Users\Admin\AppData\Local\Temp\y24F0.tmp.dll

      Filesize

      1.2MB

      MD5

      d85878e661e2a7d2902ab49a297ba3cd

      SHA1

      b17d78e56099066c2a96c187947346ef5f5662ed

      SHA256

      a22bf0a51208ad469cec79dca709a28061c649de65544e2cedc18b2d05070331

      SHA512

      b24a52e0784882cec245cd52451627198f036504e52bd696a0b488417c48f98e0ca6d26b1bfcaa8ffd3e2074ae2612b1d33b0ea083dcce1552fe4070448b8351

    • \Users\Admin\AppData\Local\Temp\y24F0.tmp.dll

      Filesize

      1.2MB

      MD5

      d85878e661e2a7d2902ab49a297ba3cd

      SHA1

      b17d78e56099066c2a96c187947346ef5f5662ed

      SHA256

      a22bf0a51208ad469cec79dca709a28061c649de65544e2cedc18b2d05070331

      SHA512

      b24a52e0784882cec245cd52451627198f036504e52bd696a0b488417c48f98e0ca6d26b1bfcaa8ffd3e2074ae2612b1d33b0ea083dcce1552fe4070448b8351

    • \Users\Admin\AppData\Local\Temp\y24F0.tmp.dll

      Filesize

      1.2MB

      MD5

      d85878e661e2a7d2902ab49a297ba3cd

      SHA1

      b17d78e56099066c2a96c187947346ef5f5662ed

      SHA256

      a22bf0a51208ad469cec79dca709a28061c649de65544e2cedc18b2d05070331

      SHA512

      b24a52e0784882cec245cd52451627198f036504e52bd696a0b488417c48f98e0ca6d26b1bfcaa8ffd3e2074ae2612b1d33b0ea083dcce1552fe4070448b8351

    • memory/836-72-0x0000000010000000-0x0000000010091000-memory.dmp

      Filesize

      580KB

    • memory/992-61-0x000007FEFB761000-0x000007FEFB763000-memory.dmp

      Filesize

      8KB

    • memory/2020-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2020-58-0x000000007097D000-0x0000000070988000-memory.dmp

      Filesize

      44KB

    • memory/2020-57-0x0000000075141000-0x0000000075143000-memory.dmp

      Filesize

      8KB

    • memory/2020-70-0x00000000066D0000-0x000000000731A000-memory.dmp

      Filesize

      12.3MB

    • memory/2020-71-0x0000000002420000-0x00000000024D3000-memory.dmp

      Filesize

      716KB

    • memory/2020-54-0x0000000071F11000-0x0000000071F14000-memory.dmp

      Filesize

      12KB

    • memory/2020-73-0x0000000007E50000-0x0000000007F88000-memory.dmp

      Filesize

      1.2MB

    • memory/2020-55-0x000000006F991000-0x000000006F993000-memory.dmp

      Filesize

      8KB

    • memory/2020-79-0x000000007097D000-0x0000000070988000-memory.dmp

      Filesize

      44KB

    • memory/2020-80-0x00000000066D0000-0x000000000731A000-memory.dmp

      Filesize

      12.3MB

    • memory/2020-81-0x0000000002420000-0x00000000024D3000-memory.dmp

      Filesize

      716KB

    • memory/2020-82-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2020-83-0x000000007097D000-0x0000000070988000-memory.dmp

      Filesize

      44KB