Analysis

  • max time kernel
    102s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    25-08-2021 14:58

General

  • Target

    Invoice_Due-IN-244701726_20210823.xlsb

  • Size

    173KB

  • MD5

    7616efd9d10fd2c8d2b9f313410dc8e1

  • SHA1

    9211184df686b4f870d1e615c98a1e0629273b3f

  • SHA256

    068eb2b690144b1a9aef6a1f93c41d1b7c7f804d172124199e20952fe0b6d5be

  • SHA512

    98978d380d766b5291619f2bfe0523348371bce619b1599fd0a31b7fb790c44bdb5bbdac695f296ad4b7f5ea37a52ff6f9a5cfacd5726140611cac1edca0efa5

Malware Config

Extracted

Family

cobaltstrike

Botnet

1359593325

C2

http://37.120.206.118:80/push

Attributes
  • access_type

    512

  • host

    37.120.206.118,/push

  • http_header1

    AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_header2

    AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_method1

    GET

  • http_method2

    POST

  • polling_time

    60000

  • port_number

    80

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCHFcV/jTWIWbMLGsg/xD3cCk0yHN+dWUBeSAZEdvXFEiawkFkWyJWyGyT0NbgSrwHmz+krYJY6l6YOoUNPWMNc6YpuQUYrBiilMX6rDkmmqUqem2tP6G4E6nBva8DOwNu671c8iFZeK4M8s6PPnUDuEuSHchHBLc5wV6Ew7BLO5QIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /submit.php

  • user_agent

    Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; InfoPath.2; .NET4.0C; .NET4.0E)

  • watermark

    1359593325

Signatures

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 11 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\Invoice_Due-IN-244701726_20210823.xlsb
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1816
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic process call create 'mshta C:\ProgramData\Amzwu.sct'
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of AdjustPrivilegeToken
      PID:1388
  • C:\Windows\system32\mshta.exe
    mshta C:\ProgramData\Amzwu.sct
    1⤵
    • Process spawned unexpected child process
    • Blocklisted process makes network request
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:968
    • C:\Windows\system32\mshta.exe
      mshta C:\\ProgramData\SPInf.sct
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:324
      • C:\Windows\System32\Wbem\wmic.exe
        wmic process call create "C:\\ProgramData\SPInf.exe"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1584
  • C:\ProgramData\SPInf.exe
    C:\\ProgramData\SPInf.exe
    1⤵
    • Executes dropped EXE
    PID:1388

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Amzwu.sct
    MD5

    b654b5c15cdc20afaa5c424b704bcfaf

    SHA1

    4ba1fb25be4fcfd2ab8448da449b28dff17d813a

    SHA256

    cb1a5d21d5577a633f2687ecec0e7cf841747f720fe0d1c3c2311a0de039382d

    SHA512

    d15f98d026a26d24a019bf2958a346feb77705ee2c6f80d3b971899a135436437850a48e3daff7903c117ec14350a3ce20e631d4ff7ad457b2e7e326f33d7d92

  • C:\ProgramData\SPInf.exe
    MD5

    f22083e11a7c34c3ddd3726f65fb3939

    SHA1

    1d529d5f0e330f5fc485699f3bc67c918619da67

    SHA256

    316f938abb63266eb410087f7f4b20e987cb9a8be1e385e95c420d96c9ac6f76

    SHA512

    c27c2f82f574d0db400ca26ce7663d77c8d21a14a52ea7a35e37842d36e9f176fcf17357106a5050cb2d11de930ddddc8e6f2c09d9b3f63932e0b5ca3359102a

  • C:\ProgramData\SPInf.sct
    MD5

    d6f3ca63c2312ba35dd40622d484841e

    SHA1

    63c60d6b04c85c48b3a0099611de8573baf541ec

    SHA256

    7a983eb19550a1e88eb2342f8c44bc63f08f3e0f8c2b6cd05f050704ba0a5879

    SHA512

    f9cd044cbcc705963470c8ed22793593b7b18afd388418e2a925dd14cd6f0070449e46cb35141e74287256a09b16fcc3c988eaac8dd05002ae593f1252a08f7d

  • memory/324-65-0x0000000000000000-mapping.dmp
  • memory/1388-63-0x0000000000000000-mapping.dmp
  • memory/1388-69-0x0000000000400000-0x000000000045C000-memory.dmp
    Filesize

    368KB

  • memory/1388-70-0x0000000000290000-0x0000000000297000-memory.dmp
    Filesize

    28KB

  • memory/1388-71-0x00000000002F0000-0x0000000000323000-memory.dmp
    Filesize

    204KB

  • memory/1388-72-0x00000000752B1000-0x00000000752B3000-memory.dmp
    Filesize

    8KB

  • memory/1388-73-0x0000000000880000-0x00000000008BD000-memory.dmp
    Filesize

    244KB

  • memory/1584-67-0x0000000000000000-mapping.dmp
  • memory/1816-60-0x000000002FAB1000-0x000000002FAB4000-memory.dmp
    Filesize

    12KB

  • memory/1816-62-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/1816-61-0x0000000070E41000-0x0000000070E43000-memory.dmp
    Filesize

    8KB

  • memory/1816-74-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB