Malware Analysis Report

2024-08-06 07:58

Sample ID 230906-kebn1sec62
Target Note.zip
SHA256 09233ec1998287e1addfde586c10fe3493ac90fa51d2bb0ed95a5bf685f258fe
Tags
cobaltstrike 1359593325 backdoor persistence trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

09233ec1998287e1addfde586c10fe3493ac90fa51d2bb0ed95a5bf685f258fe

Threat Level: Known bad

The file Note.zip was found to be: Known bad.

Malicious Activity Summary

cobaltstrike 1359593325 backdoor persistence trojan

Cobaltstrike

Adds Run key to start application

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious use of UnmapMainImage

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2023-09-06 08:30

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral4

Detonation Overview

Submitted

2023-09-06 08:30

Reported

2023-09-06 08:33

Platform

win10-20230831-en

Max time kernel

107s

Max time network

112s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\mschost.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\mschost.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 0.0.1.0.0.0.0.0.0.0.0.0.0.3.f.2.0.0.1.0.0.0.8.1.8.0.8.0.8.0.8.0.ip6.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 9.57.101.20.in-addr.arpa udp
US 8.8.8.8:53 104.193.132.51.in-addr.arpa udp

Files

N/A

Analysis: behavioral5

Detonation Overview

Submitted

2023-09-06 08:30

Reported

2023-09-06 08:33

Platform

win10-20230831-en

Max time kernel

126s

Max time network

132s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\msword.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\msword.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 9.57.101.20.in-addr.arpa udp
US 8.8.8.8:53 224.162.46.104.in-addr.arpa udp

Files

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-09-06 08:30

Reported

2023-09-06 08:33

Platform

win10-20230831-en

Max time kernel

140s

Max time network

131s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\AppvIsvSubsystems64.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\AppvIsvSubsystems64.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.0.8.0.8.0.8.0.ip6.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 9.57.101.20.in-addr.arpa udp
US 8.8.8.8:53 168.117.168.52.in-addr.arpa udp

Files

memory/2552-0-0x00007FFBAB950000-0x00007FFBABB2B000-memory.dmp

memory/2552-2-0x00007FFBA9BC0000-0x00007FFBA9C6E000-memory.dmp

memory/2552-3-0x00007FFB8FCE0000-0x00007FFB9000E000-memory.dmp

memory/2552-5-0x00007FFBA8C60000-0x00007FFBA8EA9000-memory.dmp

memory/2552-6-0x00007FFBA9480000-0x00007FFBA9779000-memory.dmp

memory/2552-7-0x00007FFBA7E70000-0x00007FFBA7F66000-memory.dmp

memory/2552-8-0x00007FFBAB410000-0x00007FFBAB535000-memory.dmp

memory/2552-9-0x00007FFBA8EB0000-0x00007FFBA8F5A000-memory.dmp

memory/2552-10-0x00007FFBA9140000-0x00007FFBA915D000-memory.dmp

memory/2552-11-0x00007FFBA8F60000-0x00007FFBA90AA000-memory.dmp

memory/2552-12-0x00007FFBA80E0000-0x00007FFBA80FE000-memory.dmp

memory/2552-13-0x00007FFBA9220000-0x00007FFBA9247000-memory.dmp

memory/2552-14-0x00007FFBA8A20000-0x00007FFBA8BA9000-memory.dmp

memory/2552-15-0x00007FFBAB8A0000-0x00007FFBAB8CD000-memory.dmp

memory/2552-16-0x00007FFBAB2C0000-0x00007FFBAB361000-memory.dmp

memory/2552-17-0x00007FFBA9C70000-0x00007FFBAB0A7000-memory.dmp

memory/2552-18-0x00007FFBA91C0000-0x00007FFBA9211000-memory.dmp

memory/2552-19-0x00007FFBAB370000-0x00007FFBAB40D000-memory.dmp

memory/2552-20-0x00007FFBA7F70000-0x00007FFBA7FDA000-memory.dmp

memory/2552-21-0x00007FFBA7FE0000-0x00007FFBA807A000-memory.dmp

memory/2552-22-0x00007FFBA6560000-0x00007FFBA65F5000-memory.dmp

memory/2552-23-0x00007FFBA7DC0000-0x00007FFBA7DD5000-memory.dmp

memory/2552-24-0x00007FFBA7DE0000-0x00007FFBA7E2C000-memory.dmp

memory/2552-25-0x00007FFBA3CA0000-0x00007FFBA3CBB000-memory.dmp

memory/2552-26-0x00007FFBAB540000-0x00007FFBAB599000-memory.dmp

memory/2552-27-0x00007FFBA8100000-0x00007FFBA87F2000-memory.dmp

memory/2552-28-0x00007FFBAB950000-0x00007FFBABB2B000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-09-06 08:30

Reported

2023-09-06 08:31

Platform

win10-20230831-en

Max time kernel

22s

Max time network

25s

Command Line

C:\Windows\system32\ApplicationFrameHost.exe -Embedding

Signatures

Cobaltstrike

trojan backdoor cobaltstrike

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3618012334-189558363-1282585034-1000\Software\Microsoft\Windows\CurrentVersion\Run\MsWordHostService = "C:\\Users\\Admin\\AppData\\Local\\MsWordHostService\\Note .exe" c:\windows\system32\svchost.exe N/A

Suspicious use of UnmapMainImage

Description Indicator Process Target
N/A N/A c:\windows\system32\svchost.exe N/A
N/A N/A c:\windows\system32\taskhostw.exe N/A
N/A N/A C:\Windows\system32\ApplicationFrameHost.exe N/A

Processes

C:\Windows\system32\ApplicationFrameHost.exe

C:\Windows\system32\ApplicationFrameHost.exe -Embedding

C:\Windows\System32\RuntimeBroker.exe

C:\Windows\System32\RuntimeBroker.exe -Embedding

c:\windows\system32\taskhostw.exe

taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc

C:\Users\Admin\AppData\Local\Temp\Note .exe

"C:\Users\Admin\AppData\Local\Temp\Note .exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 communitypowersports.com udp
IT 179.43.162.63:443 communitypowersports.com tcp
IT 179.43.162.63:443 communitypowersports.com tcp

Files

memory/4864-1-0x00007FF913170000-0x00007FF91334B000-memory.dmp

memory/4864-3-0x00007FF9121D0000-0x00007FF91227E000-memory.dmp

memory/4864-4-0x00007FF8F8B70000-0x00007FF8F8E9E000-memory.dmp

memory/4864-5-0x00007FF910380000-0x00007FF9105C9000-memory.dmp

memory/4864-6-0x00007FF912280000-0x00007FF912579000-memory.dmp

memory/4864-7-0x00007FF90F8C0000-0x00007FF90F9B6000-memory.dmp

memory/4864-9-0x00007FF912810000-0x00007FF9128BA000-memory.dmp

memory/4864-8-0x00007FF913040000-0x00007FF913165000-memory.dmp

memory/4864-10-0x00007FF912B20000-0x00007FF912C6A000-memory.dmp

memory/4864-11-0x00007FF9102F0000-0x00007FF91030E000-memory.dmp

memory/4864-12-0x00007FF912E10000-0x00007FF912E37000-memory.dmp

memory/4864-13-0x00007FF90F690000-0x00007FF90F819000-memory.dmp

memory/4864-14-0x00007FF912C70000-0x00007FF912C9D000-memory.dmp

memory/4864-15-0x00007FF910CE0000-0x00007FF910D81000-memory.dmp

memory/4864-16-0x00007FF910D90000-0x00007FF9121C7000-memory.dmp

memory/4864-17-0x00007FF90F4B0000-0x00007FF90F4D5000-memory.dmp

memory/4864-18-0x00007FF9106D0000-0x00007FF910721000-memory.dmp

memory/4864-19-0x00007FF912770000-0x00007FF91280D000-memory.dmp

memory/4864-20-0x00007FF910310000-0x00007FF91037A000-memory.dmp

memory/4864-21-0x00007FF90F820000-0x00007FF90F8BA000-memory.dmp

memory/4864-22-0x00007FF90F600000-0x00007FF90F615000-memory.dmp

memory/4864-23-0x00007FF90F640000-0x00007FF90F68C000-memory.dmp

memory/4864-25-0x00007FF912FE0000-0x00007FF913039000-memory.dmp

memory/4864-24-0x00007FF90A500000-0x00007FF90A51B000-memory.dmp

memory/4864-26-0x00007FF90F9C0000-0x00007FF9100B2000-memory.dmp

memory/4864-28-0x00007FF913170000-0x00007FF91334B000-memory.dmp

memory/4864-33-0x00007FF90F8C0000-0x00007FF90F9B6000-memory.dmp

memory/4864-45-0x00007FF912770000-0x00007FF91280D000-memory.dmp

memory/2684-53-0x00007FF8F8B70000-0x00007FF8F8E9E000-memory.dmp

memory/2684-54-0x00007FF913171000-0x00007FF91327F000-memory.dmp

memory/2684-55-0x00007FF9121D1000-0x00007FF912244000-memory.dmp

memory/2684-56-0x00007FF910381000-0x00007FF910464000-memory.dmp

memory/2684-57-0x00007FF910D90000-0x00007FF9121C7000-memory.dmp

memory/2684-58-0x00007FF9106D0000-0x00007FF910721000-memory.dmp

memory/2684-59-0x00007FF90F600000-0x00007FF90F615000-memory.dmp

memory/2684-60-0x00007FF90A500000-0x00007FF90A51B000-memory.dmp

memory/2684-61-0x00007FF90F9C0000-0x00007FF9100B2000-memory.dmp

memory/2684-70-0x00000217C3A70000-0x00000217C3B1A000-memory.dmp

memory/2684-72-0x00000217C3A70000-0x00000217C3BBA000-memory.dmp

memory/2684-77-0x00000217C3A70000-0x00000217C3B2F000-memory.dmp

memory/2684-79-0x00000217C3A70000-0x00000217C3B11000-memory.dmp

memory/2684-81-0x00000217C3A70000-0x00000217C3B47000-memory.dmp

memory/4864-108-0x00007FF913170000-0x00007FF91334B000-memory.dmp

memory/2888-130-0x000002B8D5C20000-0x000002B8D5C60000-memory.dmp

Analysis: behavioral3

Detonation Overview

Submitted

2023-09-06 08:30

Reported

2023-09-06 08:33

Platform

win10-20230831-en

Max time kernel

126s

Max time network

132s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\envsrv.dll,#1

Signatures

N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\envsrv.dll,#1

Network

Country Destination Domain Proto
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 9.57.101.20.in-addr.arpa udp
US 8.8.8.8:53 4.173.189.20.in-addr.arpa udp

Files

N/A