Analysis

  • max time kernel
    137s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 12:07

General

  • Target

    InvoiceTemplate.dotm

  • Size

    22KB

  • MD5

    0168356fc946b274d1af458129a6430d

  • SHA1

    039bb381689e171e7763404f61e659875e68f374

  • SHA256

    4db472065546e2e7cf4b550b62bf15704a12b30286c07ad8de0901aeb885674e

  • SHA512

    cf48b0734c89480f2839ceca552ca4d918ce067bc4298d02cb9542102bf04bc82103676cd19aa8fcc99b04e9710db505e0ce403f18484625a978336d567b8d04

  • SSDEEP

    384:t2OAtyoDHhoY7o3fQbZgpGo2Npq6vfNxt/ZtNNY76cLXCaMoF69BUbvo:UbXQfIgpeNpq6dxllNMLX1FsBUbQ

Malware Config

Signatures

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\InvoiceTemplate.dotm"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1104
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\\SysWOW64\\rundll32.exe
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      PID:556
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1764

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/556-105-0x0000000000090000-0x0000000000091000-memory.dmp
      Filesize

      4KB

    • memory/556-103-0x0000000000090000-0x0000000000091000-memory.dmp
      Filesize

      4KB

    • memory/556-85-0x0000000000090000-0x0000000000091000-memory.dmp
      Filesize

      4KB

    • memory/556-87-0x0000000000090000-0x0000000000091000-memory.dmp
      Filesize

      4KB

    • memory/556-1667-0x0000000000440000-0x0000000000475000-memory.dmp
      Filesize

      212KB

    • memory/556-1666-0x00000000028D0000-0x0000000002A94000-memory.dmp
      Filesize

      1.8MB

    • memory/556-1663-0x0000000000000000-mapping.dmp
    • memory/556-117-0x0000000000090000-0x0000000000091000-memory.dmp
      Filesize

      4KB

    • memory/556-115-0x0000000000090000-0x0000000000091000-memory.dmp
      Filesize

      4KB

    • memory/556-113-0x0000000000090000-0x0000000000091000-memory.dmp
      Filesize

      4KB

    • memory/556-111-0x0000000000090000-0x0000000000091000-memory.dmp
      Filesize

      4KB

    • memory/556-109-0x0000000000090000-0x0000000000091000-memory.dmp
      Filesize

      4KB

    • memory/556-107-0x0000000000090000-0x0000000000091000-memory.dmp
      Filesize

      4KB

    • memory/556-95-0x0000000000090000-0x0000000000091000-memory.dmp
      Filesize

      4KB

    • memory/556-101-0x0000000000090000-0x0000000000091000-memory.dmp
      Filesize

      4KB

    • memory/556-89-0x0000000000090000-0x0000000000091000-memory.dmp
      Filesize

      4KB

    • memory/556-71-0x0000000000090000-0x0000000000091000-memory.dmp
      Filesize

      4KB

    • memory/556-73-0x0000000000090000-0x0000000000091000-memory.dmp
      Filesize

      4KB

    • memory/556-81-0x0000000000090000-0x0000000000091000-memory.dmp
      Filesize

      4KB

    • memory/556-83-0x0000000000090000-0x0000000000091000-memory.dmp
      Filesize

      4KB

    • memory/556-99-0x0000000000090000-0x0000000000091000-memory.dmp
      Filesize

      4KB

    • memory/556-97-0x0000000000090000-0x0000000000091000-memory.dmp
      Filesize

      4KB

    • memory/556-69-0x0000000000090000-0x0000000000091000-memory.dmp
      Filesize

      4KB

    • memory/556-91-0x0000000000090000-0x0000000000091000-memory.dmp
      Filesize

      4KB

    • memory/556-93-0x0000000000090000-0x0000000000091000-memory.dmp
      Filesize

      4KB

    • memory/1104-65-0x000000000089B000-0x00000000008A0000-memory.dmp
      Filesize

      20KB

    • memory/1104-63-0x000000000089B000-0x00000000008A0000-memory.dmp
      Filesize

      20KB

    • memory/1104-1668-0x000000007130D000-0x0000000071318000-memory.dmp
      Filesize

      44KB

    • memory/1104-68-0x000000000089B000-0x00000000008A0000-memory.dmp
      Filesize

      20KB

    • memory/1104-67-0x000000000089B000-0x00000000008A0000-memory.dmp
      Filesize

      20KB

    • memory/1104-54-0x00000000728A1000-0x00000000728A4000-memory.dmp
      Filesize

      12KB

    • memory/1104-66-0x000000000089B000-0x00000000008A0000-memory.dmp
      Filesize

      20KB

    • memory/1104-55-0x0000000070321000-0x0000000070323000-memory.dmp
      Filesize

      8KB

    • memory/1104-62-0x000000000089B000-0x00000000008A0000-memory.dmp
      Filesize

      20KB

    • memory/1104-57-0x0000000075BB1000-0x0000000075BB3000-memory.dmp
      Filesize

      8KB

    • memory/1104-64-0x000000000089B000-0x00000000008A0000-memory.dmp
      Filesize

      20KB

    • memory/1104-60-0x000000000089B000-0x00000000008A0000-memory.dmp
      Filesize

      20KB

    • memory/1104-61-0x000000000089B000-0x00000000008A0000-memory.dmp
      Filesize

      20KB

    • memory/1104-1670-0x000000007130D000-0x0000000071318000-memory.dmp
      Filesize

      44KB

    • memory/1104-59-0x000000000089B000-0x00000000008A0000-memory.dmp
      Filesize

      20KB

    • memory/1104-58-0x000000007130D000-0x0000000071318000-memory.dmp
      Filesize

      44KB

    • memory/1104-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1764-1664-0x0000000000000000-mapping.dmp