Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2022 15:29
Static task
static1
Behavioral task
behavioral1
Sample
confinalp.file.26.07.22.docm
Resource
win7-20220715-en
General
-
Target
confinalp.file.26.07.22.docm
-
Size
3.3MB
-
MD5
3e43e586ceb8faeb735fe86e8945cd92
-
SHA1
9e92bc926332cba7e7d00109b6edda386bab2f75
-
SHA256
ee9f450ad795bd9caf1ad830a3be0ca0c6f3926aa59d8e9fab80e1d48fac2e27
-
SHA512
dbfc2462f6e9ea197d0d3944dc3c55e8f4fd6a53d8b2dfbc8fd566f10857c2a0094c8bb1b603a268afdd12f2c82d2839e6c2bac558a782653fc234ca20d5bc74
Malware Config
Signatures
-
Detects SVCReady loader 1 IoCs
Processes:
resource yara_rule behavioral2/memory/576-143-0x0000000010000000-0x0000000010091000-memory.dmp family_svcready -
Executes dropped EXE 1 IoCs
Processes:
rDAD0.tmp.exepid process 576 rDAD0.tmp.exe -
Loads dropped DLL 1 IoCs
Processes:
rDAD0.tmp.exepid process 576 rDAD0.tmp.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4264 WINWORD.EXE 4264 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 4264 WINWORD.EXE 4264 WINWORD.EXE 4264 WINWORD.EXE 4264 WINWORD.EXE 4264 WINWORD.EXE 4264 WINWORD.EXE 4264 WINWORD.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
WINWORD.EXEdescription pid process target process PID 4264 wrote to memory of 576 4264 WINWORD.EXE rDAD0.tmp.exe PID 4264 wrote to memory of 576 4264 WINWORD.EXE rDAD0.tmp.exe PID 4264 wrote to memory of 576 4264 WINWORD.EXE rDAD0.tmp.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\confinalp.file.26.07.22.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\rDAD0.tmp.exe"C:\Users\Admin\AppData\Local\Temp\rDAD0.tmp.exe" "C:\Users\Admin\AppData\Local\Temp\yDACF.tmp.dll",DllRegisterServer2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:576
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
1.2MB
MD5a6e0f3c0133c2e7f1444be71562fba03
SHA1ef2b6f395b04e49184466f733c80c7b18225843b
SHA25692acbfa004abecacde2dfd7749bac59e39dfcdcf578ce6c5e3524ba2dfb429c6
SHA512346525aaa03848e3c59fcbb9bc2f5b7eaae1f4f5a5fca0301f12fc907f19e648ba1ae443a5c8993071b3de370aaa80534214006e210880a301ce6b5f6f0fa2c4
-
Filesize
1.2MB
MD5a6e0f3c0133c2e7f1444be71562fba03
SHA1ef2b6f395b04e49184466f733c80c7b18225843b
SHA25692acbfa004abecacde2dfd7749bac59e39dfcdcf578ce6c5e3524ba2dfb429c6
SHA512346525aaa03848e3c59fcbb9bc2f5b7eaae1f4f5a5fca0301f12fc907f19e648ba1ae443a5c8993071b3de370aaa80534214006e210880a301ce6b5f6f0fa2c4