Analysis
-
max time kernel
150s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2022 16:17
Static task
static1
Behavioral task
behavioral1
Sample
pelagagge_doc_22.07.22.docm
Resource
win7-20220718-en
General
-
Target
pelagagge_doc_22.07.22.docm
-
Size
3.3MB
-
MD5
f39f8d7d2f12d79fefd14ea74c995d61
-
SHA1
c6fe79e4bb53730a6e6ffccba595974b55a9fb79
-
SHA256
492634563551d944bb219f40b9b78694dd23377013023de597047ff4f9ecbff8
-
SHA512
a7a32d83968d591e3b8bcad5280e26c7207c19bf9c2032d401df1c636e245e2770e27a5c4e24cffc85b9a4ab2444bee81842c6af2c29554a62ab1f7ef1bd7b6b
Malware Config
Signatures
-
Detects SVCReady loader 1 IoCs
resource yara_rule behavioral2/memory/1680-141-0x0000000010000000-0x0000000010091000-memory.dmp family_svcready -
Executes dropped EXE 1 IoCs
pid Process 1680 r7862.tmp.exe -
Loads dropped DLL 1 IoCs
pid Process 1680 r7862.tmp.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4584 WINWORD.EXE 4584 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4584 WINWORD.EXE 4584 WINWORD.EXE 4584 WINWORD.EXE 4584 WINWORD.EXE 4584 WINWORD.EXE 4584 WINWORD.EXE 4584 WINWORD.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4584 wrote to memory of 1680 4584 WINWORD.EXE 78 PID 4584 wrote to memory of 1680 4584 WINWORD.EXE 78 PID 4584 wrote to memory of 1680 4584 WINWORD.EXE 78
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\pelagagge_doc_22.07.22.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\r7862.tmp.exe"C:\Users\Admin\AppData\Local\Temp\r7862.tmp.exe" "C:\Users\Admin\AppData\Local\Temp\y7861.tmp.dll",DllRegisterServer2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1680
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
1.2MB
MD5d85878e661e2a7d2902ab49a297ba3cd
SHA1b17d78e56099066c2a96c187947346ef5f5662ed
SHA256a22bf0a51208ad469cec79dca709a28061c649de65544e2cedc18b2d05070331
SHA512b24a52e0784882cec245cd52451627198f036504e52bd696a0b488417c48f98e0ca6d26b1bfcaa8ffd3e2074ae2612b1d33b0ea083dcce1552fe4070448b8351
-
Filesize
1.2MB
MD5d85878e661e2a7d2902ab49a297ba3cd
SHA1b17d78e56099066c2a96c187947346ef5f5662ed
SHA256a22bf0a51208ad469cec79dca709a28061c649de65544e2cedc18b2d05070331
SHA512b24a52e0784882cec245cd52451627198f036504e52bd696a0b488417c48f98e0ca6d26b1bfcaa8ffd3e2074ae2612b1d33b0ea083dcce1552fe4070448b8351