Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2022 10:55
Static task
static1
Behavioral task
behavioral1
Sample
[redacted]-doc-26.07.docm
Resource
win7-20220718-en
General
-
Target
[redacted]-doc-26.07.docm
-
Size
3.4MB
-
MD5
68e8afb2d86bbbb577387d87290b406c
-
SHA1
ce2257fa3a3dd898c87db315d272f82fd985f13d
-
SHA256
5956a0a7da895b9207e8efc98d7d6cc54123b2a0d66e1f5c6b73e9dcb5755b94
-
SHA512
ec1feb1697f57d3d36a4be569157d785a7c208a0dd0e0a4d78b86fda4c8955b13fa64b87562c429fa6a83c617ead9bd29cd1626681629ab412f116f3d3c5b19b
Malware Config
Signatures
-
Detects SVCReady loader 1 IoCs
resource yara_rule behavioral2/memory/4692-142-0x0000000010000000-0x0000000010091000-memory.dmp family_svcready -
Executes dropped EXE 1 IoCs
pid Process 4692 rE5B2.tmp.exe -
Loads dropped DLL 1 IoCs
pid Process 4692 rE5B2.tmp.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4636 WINWORD.EXE 4636 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4636 WINWORD.EXE 4636 WINWORD.EXE 4636 WINWORD.EXE 4636 WINWORD.EXE 4636 WINWORD.EXE 4636 WINWORD.EXE 4636 WINWORD.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4636 wrote to memory of 4692 4636 WINWORD.EXE 82 PID 4636 wrote to memory of 4692 4636 WINWORD.EXE 82 PID 4636 wrote to memory of 4692 4636 WINWORD.EXE 82
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\[redacted]-doc-26.07.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\rE5B2.tmp.exe"C:\Users\Admin\AppData\Local\Temp\rE5B2.tmp.exe" "C:\Users\Admin\AppData\Local\Temp\yE5B1.tmp.dll",DllRegisterServer2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4692
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
1.3MB
MD5f2b499f84ad9ebf8a399a44e28238523
SHA117ac7422766b613a649aecfe3c9da7cdbb941df9
SHA256615519a5865324398662b7a1d9cab1ac5ffbca4de78713d9a8813135d5c117f1
SHA5128bf2eee21938bebcd858a3b2a9f28e073b8a340426dc6bff4fd3fd2ef19a27a96d3918baa198d340ad516e5e56133c817dc93baab9aa2d543c628048dffc18bc
-
Filesize
1.3MB
MD5f2b499f84ad9ebf8a399a44e28238523
SHA117ac7422766b613a649aecfe3c9da7cdbb941df9
SHA256615519a5865324398662b7a1d9cab1ac5ffbca4de78713d9a8813135d5c117f1
SHA5128bf2eee21938bebcd858a3b2a9f28e073b8a340426dc6bff4fd3fd2ef19a27a96d3918baa198d340ad516e5e56133c817dc93baab9aa2d543c628048dffc18bc