Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2022 16:45

General

  • Target

    bcd8ede3bfabede8366d700d8cdf53662ff62e845cf25a64cac177ebd44343f4.docm

  • Size

    44KB

  • MD5

    9b4718b8b43236b948a614f28243cceb

  • SHA1

    65f0114bebdc8dd717dcf6f65d1b5394fc92b838

  • SHA256

    bcd8ede3bfabede8366d700d8cdf53662ff62e845cf25a64cac177ebd44343f4

  • SHA512

    2cc398acb08ea068793ad6ef72971527273ab7a172912a0bba8347df8242bd54629c516ff5a77aa1c9f4b2930758ce119d660b5cb69edcbfe9de2686bc233f98

  • SSDEEP

    768:a9pArINirfqKqjeJWIga14H0c4eea+3FxllNx6fHkQfOQQWB+2N23R:SiePSJ3lmH6F5FBHOOQvVN2h

Malware Config

Extracted

Family

cobaltstrike

Botnet

0

C2

http://185.81.68.44:443/RELEASE.html

Attributes
  • access_type

    512

  • beacon_type

    2048

  • host

    185.81.68.44,/RELEASE.html

  • http_header1

    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

  • http_header2

    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

  • http_method1

    GET

  • http_method2

    POST

  • jitter

    9984

  • polling_time

    60618

  • port_number

    443

  • sc_process32

    %windir%\syswow64\regsvr32.exe

  • sc_process64

    %windir%\sysnative\regsvr32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCnOM3nXx+7HBhkbDd+AwFrFisSunK999w2tM0uTpuuEiBalcJhcL+QgQWtf6S7zPp5hjImG+2YcPl18geU4f5JlSPXHwilbK4DFb/ePWyKFjhrA7emVRqhM21QMlo1ANsn14rY/RO2pzuft8P7TXoIjjI/B2GGVuzYNZX6X4I2EwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    3.025605888e+09

  • unknown2

    AAAABAAAAAIAAAJYAAAAAwAAAA8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /cs

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.246

  • watermark

    0

Signatures

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\bcd8ede3bfabede8366d700d8cdf53662ff62e845cf25a64cac177ebd44343f4.docm"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Users\Admin\Documents\VBAMsgBox.exe
      C:\Users\Admin\Documents\VBAMsgBox.exe
      2⤵
      • Executes dropped EXE
      PID:1268
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1848

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Documents\VBAMsgBox.exe
      Filesize

      17KB

      MD5

      769d36979fde90ed71ba6e9a0e0436d8

      SHA1

      c8acef0c121b751db7f0e824416e31dba4cb8f38

      SHA256

      c29faa1c6e5676fe4ec0c93e5e28deded819dc3d96f1067be74fefc919a8f0dc

      SHA512

      2da69989c1301f53e5cd68a7ce02cb41ec387826c6565c1382067dbd582554cc8361f4cacc7c2df972f6cfc5e390cd0217f16f8f64b1a0435ce78272c21af9c5

    • \Users\Admin\Documents\VBAMsgBox.exe
      Filesize

      17KB

      MD5

      769d36979fde90ed71ba6e9a0e0436d8

      SHA1

      c8acef0c121b751db7f0e824416e31dba4cb8f38

      SHA256

      c29faa1c6e5676fe4ec0c93e5e28deded819dc3d96f1067be74fefc919a8f0dc

      SHA512

      2da69989c1301f53e5cd68a7ce02cb41ec387826c6565c1382067dbd582554cc8361f4cacc7c2df972f6cfc5e390cd0217f16f8f64b1a0435ce78272c21af9c5

    • \Users\Admin\Documents\VBAMsgBox.exe
      Filesize

      17KB

      MD5

      769d36979fde90ed71ba6e9a0e0436d8

      SHA1

      c8acef0c121b751db7f0e824416e31dba4cb8f38

      SHA256

      c29faa1c6e5676fe4ec0c93e5e28deded819dc3d96f1067be74fefc919a8f0dc

      SHA512

      2da69989c1301f53e5cd68a7ce02cb41ec387826c6565c1382067dbd582554cc8361f4cacc7c2df972f6cfc5e390cd0217f16f8f64b1a0435ce78272c21af9c5

    • memory/1268-87-0x0000000003F50000-0x0000000004350000-memory.dmp
      Filesize

      4.0MB

    • memory/1268-86-0x0000000003140000-0x00000000031CB000-memory.dmp
      Filesize

      556KB

    • memory/1268-85-0x0000000003140000-0x00000000031CB000-memory.dmp
      Filesize

      556KB

    • memory/1268-80-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB

    • memory/1268-75-0x0000000000000000-mapping.dmp
    • memory/1848-81-0x000007FEFBE81000-0x000007FEFBE83000-memory.dmp
      Filesize

      8KB

    • memory/1848-77-0x0000000000000000-mapping.dmp
    • memory/1944-70-0x000000000047C000-0x0000000000480000-memory.dmp
      Filesize

      16KB

    • memory/1944-62-0x000000000047C000-0x0000000000480000-memory.dmp
      Filesize

      16KB

    • memory/1944-66-0x000000000047C000-0x0000000000480000-memory.dmp
      Filesize

      16KB

    • memory/1944-67-0x000000000047C000-0x0000000000480000-memory.dmp
      Filesize

      16KB

    • memory/1944-68-0x000000000047C000-0x0000000000480000-memory.dmp
      Filesize

      16KB

    • memory/1944-69-0x000000000047C000-0x0000000000480000-memory.dmp
      Filesize

      16KB

    • memory/1944-54-0x0000000072A21000-0x0000000072A24000-memory.dmp
      Filesize

      12KB

    • memory/1944-71-0x000000000047C000-0x0000000000480000-memory.dmp
      Filesize

      16KB

    • memory/1944-72-0x000000000047C000-0x0000000000480000-memory.dmp
      Filesize

      16KB

    • memory/1944-63-0x000000000047C000-0x0000000000480000-memory.dmp
      Filesize

      16KB

    • memory/1944-64-0x000000000047C000-0x0000000000480000-memory.dmp
      Filesize

      16KB

    • memory/1944-65-0x000000000047C000-0x0000000000480000-memory.dmp
      Filesize

      16KB

    • memory/1944-61-0x000000000047C000-0x0000000000480000-memory.dmp
      Filesize

      16KB

    • memory/1944-60-0x000000000047C000-0x0000000000480000-memory.dmp
      Filesize

      16KB

    • memory/1944-78-0x0000000001D50000-0x0000000001D5A000-memory.dmp
      Filesize

      40KB

    • memory/1944-79-0x0000000001D50000-0x0000000001D5A000-memory.dmp
      Filesize

      40KB

    • memory/1944-59-0x000000007148D000-0x0000000071498000-memory.dmp
      Filesize

      44KB

    • memory/1944-58-0x0000000076141000-0x0000000076143000-memory.dmp
      Filesize

      8KB

    • memory/1944-83-0x0000000001D50000-0x0000000001D5A000-memory.dmp
      Filesize

      40KB

    • memory/1944-84-0x0000000001D50000-0x0000000001D5A000-memory.dmp
      Filesize

      40KB

    • memory/1944-57-0x000000007148D000-0x0000000071498000-memory.dmp
      Filesize

      44KB

    • memory/1944-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1944-55-0x00000000704A1000-0x00000000704A3000-memory.dmp
      Filesize

      8KB