Analysis

  • max time kernel
    101s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    26-07-2022 07:29

General

  • Target

    58c91dd2f302fbfbc513dd143f563d071fcedec1e62ebad3be99ca2e9faafee8.docm

  • Size

    3.3MB

  • MD5

    5f81f6f36fbf9e20cb197f38afbfce00

  • SHA1

    14974eec471ff92a0d9dfa1636ec50bac2fadb60

  • SHA256

    58c91dd2f302fbfbc513dd143f563d071fcedec1e62ebad3be99ca2e9faafee8

  • SHA512

    dc93ea1c24db9d6695e3696701acc0b5a0431e56ad4e33388b16541951f259cfc037698588e9d2d4a62d5b33fa62d9fa97e7ff4563e39fce5593fcb0fa284487

Score
10/10

Malware Config

Signatures

  • Detects SVCReady loader 2 IoCs
  • SVCReady

    SVCReady is a malware loader first seen in April 2022.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\58c91dd2f302fbfbc513dd143f563d071fcedec1e62ebad3be99ca2e9faafee8.docm"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1064
      • C:\Users\Admin\AppData\Local\Temp\r61F1.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\r61F1.tmp.exe" "C:\Users\Admin\AppData\Local\Temp\y61F0.tmp.dll",DllRegisterServer
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1884

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\r61F1.tmp.exe

      Filesize

      43KB

      MD5

      51138beea3e2c21ec44d0932c71762a8

      SHA1

      8939cf35447b22dd2c6e6f443446acc1bf986d58

      SHA256

      5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

      SHA512

      794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

    • C:\Users\Admin\AppData\Local\Temp\r61F1.tmp.exe

      Filesize

      43KB

      MD5

      51138beea3e2c21ec44d0932c71762a8

      SHA1

      8939cf35447b22dd2c6e6f443446acc1bf986d58

      SHA256

      5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

      SHA512

      794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

    • C:\Users\Admin\AppData\Local\Temp\y61F0.tmp.dll

      Filesize

      1.2MB

      MD5

      3e01366b212a0014db7d6fa886cebab1

      SHA1

      d80dd1166686af12c2804dbfc2a00531c194e564

      SHA256

      54c17bf81b24bec5074b67d47a3a8988267b9ead4df1b9b8ff7e3c6441c569c3

      SHA512

      c369807c0225e6c0eadfda6d8d58d023f435c60e3db877ed40e8f3b0fba5ba7570c1f81ddc600df6c9c2a790e415e54fc81f74ff0db1a1ec9b83b6d5bf465b5a

    • \Users\Admin\AppData\Local\Temp\r61F1.tmp.exe

      Filesize

      43KB

      MD5

      51138beea3e2c21ec44d0932c71762a8

      SHA1

      8939cf35447b22dd2c6e6f443446acc1bf986d58

      SHA256

      5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

      SHA512

      794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

    • \Users\Admin\AppData\Local\Temp\y61F0.tmp.dll

      Filesize

      1.2MB

      MD5

      3e01366b212a0014db7d6fa886cebab1

      SHA1

      d80dd1166686af12c2804dbfc2a00531c194e564

      SHA256

      54c17bf81b24bec5074b67d47a3a8988267b9ead4df1b9b8ff7e3c6441c569c3

      SHA512

      c369807c0225e6c0eadfda6d8d58d023f435c60e3db877ed40e8f3b0fba5ba7570c1f81ddc600df6c9c2a790e415e54fc81f74ff0db1a1ec9b83b6d5bf465b5a

    • \Users\Admin\AppData\Local\Temp\y61F0.tmp.dll

      Filesize

      1.2MB

      MD5

      3e01366b212a0014db7d6fa886cebab1

      SHA1

      d80dd1166686af12c2804dbfc2a00531c194e564

      SHA256

      54c17bf81b24bec5074b67d47a3a8988267b9ead4df1b9b8ff7e3c6441c569c3

      SHA512

      c369807c0225e6c0eadfda6d8d58d023f435c60e3db877ed40e8f3b0fba5ba7570c1f81ddc600df6c9c2a790e415e54fc81f74ff0db1a1ec9b83b6d5bf465b5a

    • \Users\Admin\AppData\Local\Temp\y61F0.tmp.dll

      Filesize

      1.2MB

      MD5

      3e01366b212a0014db7d6fa886cebab1

      SHA1

      d80dd1166686af12c2804dbfc2a00531c194e564

      SHA256

      54c17bf81b24bec5074b67d47a3a8988267b9ead4df1b9b8ff7e3c6441c569c3

      SHA512

      c369807c0225e6c0eadfda6d8d58d023f435c60e3db877ed40e8f3b0fba5ba7570c1f81ddc600df6c9c2a790e415e54fc81f74ff0db1a1ec9b83b6d5bf465b5a

    • \Users\Admin\AppData\Local\Temp\y61F0.tmp.dll

      Filesize

      1.2MB

      MD5

      3e01366b212a0014db7d6fa886cebab1

      SHA1

      d80dd1166686af12c2804dbfc2a00531c194e564

      SHA256

      54c17bf81b24bec5074b67d47a3a8988267b9ead4df1b9b8ff7e3c6441c569c3

      SHA512

      c369807c0225e6c0eadfda6d8d58d023f435c60e3db877ed40e8f3b0fba5ba7570c1f81ddc600df6c9c2a790e415e54fc81f74ff0db1a1ec9b83b6d5bf465b5a

    • memory/1064-846-0x000007FEFC2C1000-0x000007FEFC2C3000-memory.dmp

      Filesize

      8KB

    • memory/1064-845-0x0000000000000000-mapping.dmp

    • memory/1884-849-0x0000000000000000-mapping.dmp

    • memory/1884-856-0x0000000010000000-0x0000000010091000-memory.dmp

      Filesize

      580KB

    • memory/1908-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1908-58-0x000000007181D000-0x0000000071828000-memory.dmp

      Filesize

      44KB

    • memory/1908-57-0x0000000076321000-0x0000000076323000-memory.dmp

      Filesize

      8KB

    • memory/1908-847-0x000000007181D000-0x0000000071828000-memory.dmp

      Filesize

      44KB

    • memory/1908-54-0x0000000072DB1000-0x0000000072DB4000-memory.dmp

      Filesize

      12KB

    • memory/1908-55-0x0000000070831000-0x0000000070833000-memory.dmp

      Filesize

      8KB

    • memory/1908-862-0x00000000059E0000-0x0000000005B40000-memory.dmp

      Filesize

      1.4MB

    • memory/1908-863-0x0000000002200000-0x00000000022B3000-memory.dmp

      Filesize

      716KB

    • memory/1908-864-0x0000000007E10000-0x0000000007F48000-memory.dmp

      Filesize

      1.2MB

    • memory/1908-865-0x00000000059E0000-0x0000000005B40000-memory.dmp

      Filesize

      1.4MB

    • memory/1908-866-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1908-867-0x000000007181D000-0x0000000071828000-memory.dmp

      Filesize

      44KB