Analysis

  • max time kernel
    105s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    26-07-2022 12:02

General

  • Target

    technographsri invoice 26.07.2022.docm

  • Size

    3.4MB

  • MD5

    330b1f2f4183479441f25530c993fc41

  • SHA1

    c35987c7062aefada74ae4dfd89c0e8798026299

  • SHA256

    038167147ac824ac2ebbaee81b7c442694149368c2a40c99d7fbf630e3fda7a2

  • SHA512

    1b8ac0f8fd9aff670f684b57526089625099813c07327bd5dbd680929dbe92e4a2f77e7a93afa172c72957894566f522ed441b2f73d4fca2b04d9f879dcd18de

Score
10/10

Malware Config

Signatures

  • Detects SVCReady loader 1 IoCs
  • SVCReady

    SVCReady is a malware loader first seen in April 2022.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\technographsri invoice 26.07.2022.docm"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1204
      • C:\Users\Admin\AppData\Local\Temp\r282C.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\r282C.tmp.exe" "C:\Users\Admin\AppData\Local\Temp\y282B.tmp.dll",DllRegisterServer
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1316

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\r282C.tmp.exe

      Filesize

      43KB

      MD5

      51138beea3e2c21ec44d0932c71762a8

      SHA1

      8939cf35447b22dd2c6e6f443446acc1bf986d58

      SHA256

      5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

      SHA512

      794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

    • C:\Users\Admin\AppData\Local\Temp\r282C.tmp.exe

      Filesize

      43KB

      MD5

      51138beea3e2c21ec44d0932c71762a8

      SHA1

      8939cf35447b22dd2c6e6f443446acc1bf986d58

      SHA256

      5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

      SHA512

      794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

    • C:\Users\Admin\AppData\Local\Temp\y282B.tmp.dll

      Filesize

      1.3MB

      MD5

      a484630dcbd57dfd48ab5fa0dc6a5268

      SHA1

      707b2a7abb4572bbbee0d479834bc3e910bba3e2

      SHA256

      f343fba9c1a8b5f43e74f9ed3ca9d495f431aefcc0ff2bbaa5c97efce34f82d8

      SHA512

      bee23e2dea9def226667727e03a5f2055efc9bac09a6da536e449487efbcd6d533efca59c3bfc6eeb33cd2a3f1e6221b9f5f6c3ec75160a311367327b5b6ef3b

    • \Users\Admin\AppData\Local\Temp\r282C.tmp.exe

      Filesize

      43KB

      MD5

      51138beea3e2c21ec44d0932c71762a8

      SHA1

      8939cf35447b22dd2c6e6f443446acc1bf986d58

      SHA256

      5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

      SHA512

      794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

    • \Users\Admin\AppData\Local\Temp\y282B.tmp.dll

      Filesize

      1.3MB

      MD5

      a484630dcbd57dfd48ab5fa0dc6a5268

      SHA1

      707b2a7abb4572bbbee0d479834bc3e910bba3e2

      SHA256

      f343fba9c1a8b5f43e74f9ed3ca9d495f431aefcc0ff2bbaa5c97efce34f82d8

      SHA512

      bee23e2dea9def226667727e03a5f2055efc9bac09a6da536e449487efbcd6d533efca59c3bfc6eeb33cd2a3f1e6221b9f5f6c3ec75160a311367327b5b6ef3b

    • \Users\Admin\AppData\Local\Temp\y282B.tmp.dll

      Filesize

      1.3MB

      MD5

      a484630dcbd57dfd48ab5fa0dc6a5268

      SHA1

      707b2a7abb4572bbbee0d479834bc3e910bba3e2

      SHA256

      f343fba9c1a8b5f43e74f9ed3ca9d495f431aefcc0ff2bbaa5c97efce34f82d8

      SHA512

      bee23e2dea9def226667727e03a5f2055efc9bac09a6da536e449487efbcd6d533efca59c3bfc6eeb33cd2a3f1e6221b9f5f6c3ec75160a311367327b5b6ef3b

    • \Users\Admin\AppData\Local\Temp\y282B.tmp.dll

      Filesize

      1.3MB

      MD5

      a484630dcbd57dfd48ab5fa0dc6a5268

      SHA1

      707b2a7abb4572bbbee0d479834bc3e910bba3e2

      SHA256

      f343fba9c1a8b5f43e74f9ed3ca9d495f431aefcc0ff2bbaa5c97efce34f82d8

      SHA512

      bee23e2dea9def226667727e03a5f2055efc9bac09a6da536e449487efbcd6d533efca59c3bfc6eeb33cd2a3f1e6221b9f5f6c3ec75160a311367327b5b6ef3b

    • \Users\Admin\AppData\Local\Temp\y282B.tmp.dll

      Filesize

      1.3MB

      MD5

      a484630dcbd57dfd48ab5fa0dc6a5268

      SHA1

      707b2a7abb4572bbbee0d479834bc3e910bba3e2

      SHA256

      f343fba9c1a8b5f43e74f9ed3ca9d495f431aefcc0ff2bbaa5c97efce34f82d8

      SHA512

      bee23e2dea9def226667727e03a5f2055efc9bac09a6da536e449487efbcd6d533efca59c3bfc6eeb33cd2a3f1e6221b9f5f6c3ec75160a311367327b5b6ef3b

    • memory/1204-876-0x000007FEFBA31000-0x000007FEFBA33000-memory.dmp

      Filesize

      8KB

    • memory/1204-875-0x0000000000000000-mapping.dmp

    • memory/1316-887-0x0000000010000000-0x0000000010091000-memory.dmp

      Filesize

      580KB

    • memory/1316-878-0x0000000000000000-mapping.dmp

    • memory/1672-889-0x0000000002230000-0x00000000022E3000-memory.dmp

      Filesize

      716KB

    • memory/1672-57-0x00000000762B1000-0x00000000762B3000-memory.dmp

      Filesize

      8KB

    • memory/1672-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1672-55-0x000000006FE01000-0x000000006FE03000-memory.dmp

      Filesize

      8KB

    • memory/1672-58-0x0000000070DED000-0x0000000070DF8000-memory.dmp

      Filesize

      44KB

    • memory/1672-54-0x0000000072381000-0x0000000072384000-memory.dmp

      Filesize

      12KB

    • memory/1672-886-0x0000000006990000-0x00000000075DA000-memory.dmp

      Filesize

      12.3MB

    • memory/1672-891-0x0000000008030000-0x0000000008175000-memory.dmp

      Filesize

      1.3MB

    • memory/1672-894-0x0000000070DED000-0x0000000070DF8000-memory.dmp

      Filesize

      44KB

    • memory/1672-895-0x0000000006990000-0x00000000075DA000-memory.dmp

      Filesize

      12.3MB

    • memory/1672-896-0x0000000002230000-0x00000000022E3000-memory.dmp

      Filesize

      716KB

    • memory/1672-897-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1672-898-0x0000000070DED000-0x0000000070DF8000-memory.dmp

      Filesize

      44KB