Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
23/07/2023, 09:53
Static task
static1
Behavioral task
behavioral1
Sample
字节跳动-刘江民.docx.lnk
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
字节跳动-刘江民.docx.lnk
Resource
win10v2004-20230703-en
General
-
Target
字节跳动-刘江民.docx.lnk
-
Size
1KB
-
MD5
f31b8da15c974e13e3aedc901bd3216a
-
SHA1
25c23d35ee6f047e5da806dae20f6a0cbda50144
-
SHA256
68f6b54614242928db3b18d3c6e627f712a34c8c0d398ee987b5c87ec07702c8
-
SHA512
0e772a66ce676a0fd7298be5cf37826ed219ec9a1cf6ee349d15a0adb6d3607d20642bc5431eca2bb6045fb6e0d9d33ddedbbd76886b5ad2c943b520de9e284a
Malware Config
Extracted
cobaltstrike
100000
http://appfile.sit.sf-express.com:80/audiencemanager.js
-
access_type
512
-
host
appfile.sit.sf-express.com,/audiencemanager.js
-
http_header1
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
-
http_header2
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
-
http_method1
GET
-
http_method2
POST
-
jitter
9472
-
polling_time
10000
-
port_number
80
-
sc_process32
%windir%\syswow64\runonce.exe
-
sc_process64
%windir%\sysnative\runonce.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCs75W9nYYyQaEMbnVV5RhGkx2Snve9z+DgkR58zqkTHAMOlsp7F94jRud+ihp3a2VFW1V9BZpsV4bx/EcAOCP/oFO7qy52iWFm9Ygi8DRFpUVs+BUSYOpyPnON5fTPdiKdFpHC4+gYhgxPUa3hm8BoQU1ptzLuctRlBsROnquSdwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
1.435374848e+09
-
unknown2
AAAABAAAAAEAAAf+AAAAAgAAIUwAAAACAAAPtQAAAA0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/audiencemanager-v2.js
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4044.62 Safari/537.36
-
watermark
100000
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1228 wrote to memory of 2924 1228 cmd.exe 29 PID 1228 wrote to memory of 2924 1228 cmd.exe 29 PID 1228 wrote to memory of 2924 1228 cmd.exe 29 PID 2832 wrote to memory of 2796 2832 explorer.exe 31 PID 2832 wrote to memory of 2796 2832 explorer.exe 31 PID 2832 wrote to memory of 2796 2832 explorer.exe 31 PID 2796 wrote to memory of 2712 2796 o7X7p.exe 32 PID 2796 wrote to memory of 2712 2796 o7X7p.exe 32 PID 2796 wrote to memory of 2712 2796 o7X7p.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\字节跳动-刘江民.docx.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe" ".\其他资料\.__MACOS__\.__MACOS__\._MACOS_\o7X7p.exe"2⤵PID:2924
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\其他资料\.__MACOS__\.__MACOS__\._MACOS_\o7X7p.exe"C:\Users\Admin\AppData\Local\Temp\其他资料\.__MACOS__\.__MACOS__\._MACOS_\o7X7p.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\system32\cmd.execmd ver3⤵PID:2712
-
-