Analysis
-
max time kernel
148s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
15-08-2022 15:36
Static task
static1
Behavioral task
behavioral1
Sample
tagdesign,file,15.08.docm
Resource
win7-20220812-en
General
-
Target
tagdesign,file,15.08.docm
-
Size
3.2MB
-
MD5
91b066f33f508ab4d3ba9bada41b0f55
-
SHA1
000c8f4decf6cf18db53211420a7636bbbea6d5f
-
SHA256
d98270a5b134ece0839044be9d7779e43a1ba45a446a477106c2ab1261b3c04d
-
SHA512
f7c9d975124cf8b9326b6ef8e9bbe0b68dee4db1bb21fc4da40df4786adadadd4edc471ccccba1cb250deb66748ab2cb997701bc00a4fa48167f09f0f49f636f
Malware Config
Signatures
-
Detects SVCReady loader 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4636-145-0x0000000010000000-0x0000000010091000-memory.dmp family_svcready -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
rE10F.tmp.exepid process 4636 rE10F.tmp.exe -
Loads dropped DLL 1 IoCs
Processes:
rE10F.tmp.exepid process 4636 rE10F.tmp.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4520 WINWORD.EXE 4520 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 4520 WINWORD.EXE 4520 WINWORD.EXE 4520 WINWORD.EXE 4520 WINWORD.EXE 4520 WINWORD.EXE 4520 WINWORD.EXE 4520 WINWORD.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
WINWORD.EXEdescription pid process target process PID 4520 wrote to memory of 4636 4520 WINWORD.EXE rE10F.tmp.exe PID 4520 wrote to memory of 4636 4520 WINWORD.EXE rE10F.tmp.exe PID 4520 wrote to memory of 4636 4520 WINWORD.EXE rE10F.tmp.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\tagdesign,file,15.08.docm" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\rE10F.tmp.exe"C:\Users\Admin\AppData\Local\Temp\rE10F.tmp.exe" "C:\Users\Admin\AppData\Local\Temp\yDFB6.tmp.dll",DllRegisterServer2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4636
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641
-
Filesize
1.3MB
MD5b14416e5dc3d8268b6817297f442465f
SHA1d763781121359fb614804f874c373d6fa12b4a27
SHA256826103395ef4d9e9a5c3fd9d4acf0e92fc7b334b3529d227570909ca8ce2c150
SHA512fcea7c2bdaebca25dfcb8aa67d8ed35259d309a97e6f625278dd8bdb23a069b3d0c817da5ddff7d2a038d79dc98c50dfaf51719a138aafb61665f2e70d3aacf8
-
Filesize
1.3MB
MD5b14416e5dc3d8268b6817297f442465f
SHA1d763781121359fb614804f874c373d6fa12b4a27
SHA256826103395ef4d9e9a5c3fd9d4acf0e92fc7b334b3529d227570909ca8ce2c150
SHA512fcea7c2bdaebca25dfcb8aa67d8ed35259d309a97e6f625278dd8bdb23a069b3d0c817da5ddff7d2a038d79dc98c50dfaf51719a138aafb61665f2e70d3aacf8