Analysis

  • max time kernel
    100s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    16-08-2022 13:55

General

  • Target

    svcready.docm

  • Size

    3.3MB

  • MD5

    a550d7286479cfc2d854fe3b492247de

  • SHA1

    92e06a90d80d80541b8c21ed6bb8a1f3963632b3

  • SHA256

    5803d6dfc18dc228177617921d05fbbc116e83d039f8df75eff3e571dc400424

  • SHA512

    3ea0dfc761b7b3c4d9ee3764f5e7f8da7b2cbbdbfc5e89058a5b39927116c5e0ec2c2b280c6bf375f7687ba975ad5f1eed7549adefe93a72af1ed709c5783a87

Score
10/10

Malware Config

Signatures

  • Detects SVCReady loader 1 IoCs
  • SVCReady

    SVCReady is a malware loader first seen in April 2022.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\svcready.docm"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1528
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1396
      • C:\Users\Admin\AppData\Local\Temp\r61C.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\r61C.tmp.exe" "C:\Users\Admin\AppData\Local\Temp\y61B.tmp.dll",DllRegisterServer
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1700

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\r61C.tmp.exe

      Filesize

      43KB

      MD5

      51138beea3e2c21ec44d0932c71762a8

      SHA1

      8939cf35447b22dd2c6e6f443446acc1bf986d58

      SHA256

      5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

      SHA512

      794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

    • C:\Users\Admin\AppData\Local\Temp\r61C.tmp.exe

      Filesize

      43KB

      MD5

      51138beea3e2c21ec44d0932c71762a8

      SHA1

      8939cf35447b22dd2c6e6f443446acc1bf986d58

      SHA256

      5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

      SHA512

      794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

    • C:\Users\Admin\AppData\Local\Temp\y61B.tmp.dll

      Filesize

      1.2MB

      MD5

      33498d2cb7b65cfbd61c5362f0c705d1

      SHA1

      849d5769814e284cca3c05f1ccc9eb6dcd144fa2

      SHA256

      41c5bb0c47c87b9c172a1a478c2854584e03766f09b93fcd1d6049cc17523ed8

      SHA512

      64f0b151fd83fc2281dc1d1a14c17d25f9d8ee23ced359881520a068f7319c250fd956aa0e16a7313641b4a75dfd8e9495605359d2e15cadc72c570536ef1460

    • \Users\Admin\AppData\Local\Temp\r61C.tmp.exe

      Filesize

      43KB

      MD5

      51138beea3e2c21ec44d0932c71762a8

      SHA1

      8939cf35447b22dd2c6e6f443446acc1bf986d58

      SHA256

      5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

      SHA512

      794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

    • \Users\Admin\AppData\Local\Temp\y61B.tmp.dll

      Filesize

      1.2MB

      MD5

      33498d2cb7b65cfbd61c5362f0c705d1

      SHA1

      849d5769814e284cca3c05f1ccc9eb6dcd144fa2

      SHA256

      41c5bb0c47c87b9c172a1a478c2854584e03766f09b93fcd1d6049cc17523ed8

      SHA512

      64f0b151fd83fc2281dc1d1a14c17d25f9d8ee23ced359881520a068f7319c250fd956aa0e16a7313641b4a75dfd8e9495605359d2e15cadc72c570536ef1460

    • \Users\Admin\AppData\Local\Temp\y61B.tmp.dll

      Filesize

      1.2MB

      MD5

      33498d2cb7b65cfbd61c5362f0c705d1

      SHA1

      849d5769814e284cca3c05f1ccc9eb6dcd144fa2

      SHA256

      41c5bb0c47c87b9c172a1a478c2854584e03766f09b93fcd1d6049cc17523ed8

      SHA512

      64f0b151fd83fc2281dc1d1a14c17d25f9d8ee23ced359881520a068f7319c250fd956aa0e16a7313641b4a75dfd8e9495605359d2e15cadc72c570536ef1460

    • \Users\Admin\AppData\Local\Temp\y61B.tmp.dll

      Filesize

      1.2MB

      MD5

      33498d2cb7b65cfbd61c5362f0c705d1

      SHA1

      849d5769814e284cca3c05f1ccc9eb6dcd144fa2

      SHA256

      41c5bb0c47c87b9c172a1a478c2854584e03766f09b93fcd1d6049cc17523ed8

      SHA512

      64f0b151fd83fc2281dc1d1a14c17d25f9d8ee23ced359881520a068f7319c250fd956aa0e16a7313641b4a75dfd8e9495605359d2e15cadc72c570536ef1460

    • \Users\Admin\AppData\Local\Temp\y61B.tmp.dll

      Filesize

      1.2MB

      MD5

      33498d2cb7b65cfbd61c5362f0c705d1

      SHA1

      849d5769814e284cca3c05f1ccc9eb6dcd144fa2

      SHA256

      41c5bb0c47c87b9c172a1a478c2854584e03766f09b93fcd1d6049cc17523ed8

      SHA512

      64f0b151fd83fc2281dc1d1a14c17d25f9d8ee23ced359881520a068f7319c250fd956aa0e16a7313641b4a75dfd8e9495605359d2e15cadc72c570536ef1460

    • memory/1528-126-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-62-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-60-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-61-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-128-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-123-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-64-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-65-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-67-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-66-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-68-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-69-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-70-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-88-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-89-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-90-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-91-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-92-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-93-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-94-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-96-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-95-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-99-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-98-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-97-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-119-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-120-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-117-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-122-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-121-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-125-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-58-0x000000007119D000-0x00000000711A8000-memory.dmp

      Filesize

      44KB

    • memory/1528-124-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-127-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-129-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-59-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-63-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-130-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-131-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-154-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-155-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-160-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-159-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-158-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-156-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-179-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-187-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-185-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-186-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-184-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-183-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-182-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-181-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-180-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-178-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-157-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-153-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-152-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-151-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-57-0x0000000075021000-0x0000000075023000-memory.dmp

      Filesize

      8KB

    • memory/1528-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1528-55-0x00000000701B1000-0x00000000701B3000-memory.dmp

      Filesize

      8KB

    • memory/1528-54-0x0000000072731000-0x0000000072734000-memory.dmp

      Filesize

      12KB

    • memory/1528-150-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-149-0x00000000005E3000-0x0000000000647000-memory.dmp

      Filesize

      400KB

    • memory/1528-891-0x00000000065B0000-0x00000000071FA000-memory.dmp

      Filesize

      12.3MB

    • memory/1528-892-0x0000000002220000-0x00000000022D3000-memory.dmp

      Filesize

      716KB

    • memory/1528-893-0x0000000007E80000-0x0000000007FBB000-memory.dmp

      Filesize

      1.2MB

    • memory/1528-894-0x000000007119D000-0x00000000711A8000-memory.dmp

      Filesize

      44KB

    • memory/1528-895-0x00000000065B0000-0x00000000071FA000-memory.dmp

      Filesize

      12.3MB

    • memory/1528-897-0x000000007119D000-0x00000000711A8000-memory.dmp

      Filesize

      44KB