Analysis
-
max time kernel
132s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2022 16:19
Static task
static1
Behavioral task
behavioral1
Sample
66ef41864983219306c16626c53422dd17ceef884b54b03badbc3b7fb3ec11ed.docm
Resource
win7-20220715-en
General
-
Target
66ef41864983219306c16626c53422dd17ceef884b54b03badbc3b7fb3ec11ed.docm
-
Size
3.3MB
-
MD5
b611c91f4f8a4a6a960a5593763804d3
-
SHA1
3ffa197ddc94c4f33a6cdf5373cecb6f8d0223fe
-
SHA256
66ef41864983219306c16626c53422dd17ceef884b54b03badbc3b7fb3ec11ed
-
SHA512
10a97d482c2477da35191381f59f0a18c7da7b2f2a55ea2da36551f8e555700d5eac7a7084fbd4981b4b6a6a25b1f463044bba9f8329181c89b5880e6ba8cc93
Malware Config
Signatures
-
Detects SVCReady loader 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4120-141-0x0000000010000000-0x0000000010091000-memory.dmp family_svcready -
Executes dropped EXE 1 IoCs
Processes:
rF718.tmp.exepid process 4120 rF718.tmp.exe -
Loads dropped DLL 1 IoCs
Processes:
rF718.tmp.exepid process 4120 rF718.tmp.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 2052 WINWORD.EXE 2052 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 9 IoCs
Processes:
WINWORD.EXEpid process 2052 WINWORD.EXE 2052 WINWORD.EXE 2052 WINWORD.EXE 2052 WINWORD.EXE 2052 WINWORD.EXE 2052 WINWORD.EXE 2052 WINWORD.EXE 2052 WINWORD.EXE 2052 WINWORD.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
WINWORD.EXEdescription pid process target process PID 2052 wrote to memory of 4120 2052 WINWORD.EXE rF718.tmp.exe PID 2052 wrote to memory of 4120 2052 WINWORD.EXE rF718.tmp.exe PID 2052 wrote to memory of 4120 2052 WINWORD.EXE rF718.tmp.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\66ef41864983219306c16626c53422dd17ceef884b54b03badbc3b7fb3ec11ed.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\rF718.tmp.exe"C:\Users\Admin\AppData\Local\Temp\rF718.tmp.exe" "C:\Users\Admin\AppData\Local\Temp\yF717.tmp.dll",DllRegisterServer2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4120
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
1.2MB
MD5c715898435d9682024c2bd949c22024a
SHA12ff989fa5025bfce061818b2a62c7d651fefd5f9
SHA256f8e0fefa01f40cb670c96e2b932d46426ccbdf93f44b88e7412bea8910d5307c
SHA512b72534878e3747133724d16d1cd0e79d2e94c976eba8c9102f6dab8ff39294c81ca834a6567d19035d2f1ed353cfb1f6054d5ed0c5f28b9a1a3c1aec9ef90f94
-
Filesize
1.2MB
MD5c715898435d9682024c2bd949c22024a
SHA12ff989fa5025bfce061818b2a62c7d651fefd5f9
SHA256f8e0fefa01f40cb670c96e2b932d46426ccbdf93f44b88e7412bea8910d5307c
SHA512b72534878e3747133724d16d1cd0e79d2e94c976eba8c9102f6dab8ff39294c81ca834a6567d19035d2f1ed353cfb1f6054d5ed0c5f28b9a1a3c1aec9ef90f94