Overview
overview
10Static
static
7infected20...1).chm
windows7-x64
1infected20...1).chm
windows10-2004-x64
7infected20...df.exe
windows7-x64
7infected20...df.exe
windows10-2004-x64
7infected20...�1.exe
windows7-x64
1infected20...�1.exe
windows10-2004-x64
1infected20...ls.exe
windows7-x64
7infected20...ls.exe
windows10-2004-x64
7infected20...fo.exe
windows7-x64
7infected20...fo.exe
windows10-2004-x64
7infected20...od.exe
windows7-x64
7infected20...od.exe
windows10-2004-x64
7infected20...25.exe
windows7-x64
7infected20...25.exe
windows10-2004-x64
7infected20...��.exe
windows7-x64
1infected20...��.exe
windows10-2004-x64
1infected20...nd.exe
windows7-x64
1infected20...nd.exe
windows10-2004-x64
1infected20...eg.exe
windows7-x64
10infected20...eg.exe
windows10-2004-x64
10infected20...#r.exe
windows7-x64
7infected20...#r.exe
windows10-2004-x64
7Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
25/04/2023, 15:30
Behavioral task
behavioral1
Sample
infected2023042501/Downloads/-252871022_150(1).chm
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
infected2023042501/Downloads/-252871022_150(1).chm
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
infected2023042501/Downloads/2021-2022年度民航青年文明号拟命名集体名单.pdf.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
infected2023042501/Downloads/2021-2022年度民航青年文明号拟命名集体名单.pdf.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
infected2023042501/Downloads/2023企业个人最新版所得税缴纳标准1.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
infected2023042501/Downloads/2023企业个人最新版所得税缴纳标准1.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral7
Sample
infected2023042501/Downloads/Quotation_copy_xls.exe
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
infected2023042501/Downloads/Quotation_copy_xls.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
infected2023042501/Downloads/getsysteminfo.exe
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
infected2023042501/Downloads/getsysteminfo.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
infected2023042501/Downloads/中航信移动科技有限公司〔2023〕7号.xcod.exe
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
infected2023042501/Downloads/中航信移动科技有限公司〔2023〕7号.xcod.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral13
Sample
infected2023042501/Downloads/公积金信息_20230425.exe
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
infected2023042501/Downloads/公积金信息_20230425.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
infected2023042501/Downloads/工号:YC01198-工作邮箱:[email protected]使用工位网口异常反馈.exe
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
infected2023042501/Downloads/工号:YC01198-工作邮箱:[email protected]使用工位网口异常反馈.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
infected2023042501/Downloads/永赢基金管理有限公司客户相关的投诉信件内容_maxwealthfund.exe
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
infected2023042501/Downloads/永赢基金管理有限公司客户相关的投诉信件内容_maxwealthfund.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
infected2023042501/Downloads/深圳智园总部饭堂吃出小蟑螂食品安全事件图片证据jpeg.exe
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
infected2023042501/Downloads/深圳智园总部饭堂吃出小蟑螂食品安全事件图片证据jpeg.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
infected2023042501/Downloads/资金账户对账单导出#r.exe
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
infected2023042501/Downloads/资金账户对账单导出#r.exe
Resource
win10v2004-20230221-en
General
-
Target
infected2023042501/Downloads/深圳智园总部饭堂吃出小蟑螂食品安全事件图片证据jpeg.exe
-
Size
32KB
-
MD5
f17e58072430527e007ba8aabe74796f
-
SHA1
e89edcdcc56796636261e3016be4a4ce4b6b2626
-
SHA256
1af4c64c986d0bf5bd447614e312be9c2f802879f13a09f6b95f5a7d675d8231
-
SHA512
f2ca0153d330d93ff4e1c1efaeee55c680bfffb562e0f38df318ba99043b515d8d4114bc311e588dcd3cf854b984cda816b87997eab639d0360bfd8ac67c8776
-
SSDEEP
768:zsiqOLGC30C0FHMKV+WeY4FFYMWOX8eW:bG7sKMWiF/wx
Malware Config
Extracted
cobaltstrike
http://vip.oppo.cn.cdn.dnsv1.com.cn:443/js/jquery-3.4.1.slim.min.js
-
user_agent
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.102 Safari/537.36 Host: vip.oppo.cn
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1280 深圳智园总部饭堂吃出小蟑螂食品安全事件图片证据jpeg.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1280 wrote to memory of 1216 1280 深圳智园总部饭堂吃出小蟑螂食品安全事件图片证据jpeg.exe 28 PID 1280 wrote to memory of 1216 1280 深圳智园总部饭堂吃出小蟑螂食品安全事件图片证据jpeg.exe 28 PID 1280 wrote to memory of 1216 1280 深圳智园总部饭堂吃出小蟑螂食品安全事件图片证据jpeg.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\infected2023042501\Downloads\深圳智园总部饭堂吃出小蟑螂食品安全事件图片证据jpeg.exe"C:\Users\Admin\AppData\Local\Temp\infected2023042501\Downloads\深圳智园总部饭堂吃出小蟑螂食品安全事件图片证据jpeg.exe"1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\System32\resmon.exe"C:\Windows\System32\resmon.exe"2⤵PID:1216
-