Overview
overview
10Static
static
12023年11�...cx.lnk
windows7-x64
102023年11�...cx.lnk
windows10-2004-x64
102023年11�...1.docx
windows7-x64
12023年11�...1.docx
windows10-2004-x64
12023年11�...io.dll
windows7-x64
32023年11�...io.dll
windows10-2004-x64
32023年11�...z2.dll
windows7-x64
32023年11�...z2.dll
windows10-2004-x64
32023年11�...es.dll
windows7-x64
32023年11�...es.dll
windows10-2004-x64
32023年11�...al.dll
windows7-x64
32023年11�...al.dll
windows10-2004-x64
32023年11�...ee.dll
windows7-x64
32023年11�...ee.dll
windows10-2004-x64
32023年11�...ib.dll
windows7-x64
32023年11�...ib.dll
windows10-2004-x64
32023年11�...ma.dll
windows7-x64
32023年11�...ma.dll
windows10-2004-x64
32023年11�...si.dll
windows7-x64
32023年11�...si.dll
windows10-2004-x64
32023年11�...ng.dll
windows7-x64
32023年11�...ng.dll
windows10-2004-x64
32023年11�...ed.dll
windows7-x64
32023年11�...ed.dll
windows10-2004-x64
32023年11�...ue.dll
windows7-x64
32023年11�...ue.dll
windows10-2004-x64
32023年11�...e3.dll
windows7-x64
32023年11�...e3.dll
windows10-2004-x64
32023年11�...sl.dll
windows7-x64
12023年11�...sl.dll
windows10-2004-x64
12023年11�.../a.dll
windows7-x64
12023年11�.../a.dll
windows10-2004-x64
1Analysis
-
max time kernel
151s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
16-11-2023 09:52
Static task
static1
Behavioral task
behavioral1
Sample
2023年11月份工资单/2023年11月份工资单.docx.lnk
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
2023年11月份工资单/2023年11月份工资单.docx.lnk
Resource
win10v2004-20231020-en
Behavioral task
behavioral3
Sample
2023年11月份工资单/__init__/11.docx
Resource
win7-20231020-en
Behavioral task
behavioral4
Sample
2023年11月份工资单/__init__/11.docx
Resource
win10v2004-20231020-en
Behavioral task
behavioral5
Sample
2023年11月份工资单/__init__/_asyncio.dll
Resource
win7-20231023-en
Behavioral task
behavioral6
Sample
2023年11月份工资单/__init__/_asyncio.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral7
Sample
2023年11月份工资单/__init__/_bz2.dll
Resource
win7-20231025-en
Behavioral task
behavioral8
Sample
2023年11月份工资单/__init__/_bz2.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral9
Sample
2023年11月份工资单/__init__/_ctypes.dll
Resource
win7-20231020-en
Behavioral task
behavioral10
Sample
2023年11月份工资单/__init__/_ctypes.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral11
Sample
2023年11月份工资单/__init__/_decimal.dll
Resource
win7-20231020-en
Behavioral task
behavioral12
Sample
2023年11月份工资单/__init__/_decimal.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral13
Sample
2023年11月份工资单/__init__/_elementtree.dll
Resource
win7-20231020-en
Behavioral task
behavioral14
Sample
2023年11月份工资单/__init__/_elementtree.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral15
Sample
2023年11月份工资单/__init__/_hashlib.dll
Resource
win7-20231023-en
Behavioral task
behavioral16
Sample
2023年11月份工资单/__init__/_hashlib.dll
Resource
win10v2004-20231025-en
Behavioral task
behavioral17
Sample
2023年11月份工资单/__init__/_lzma.dll
Resource
win7-20231023-en
Behavioral task
behavioral18
Sample
2023年11月份工资单/__init__/_lzma.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral19
Sample
2023年11月份工资单/__init__/_msi.dll
Resource
win7-20231020-en
Behavioral task
behavioral20
Sample
2023年11月份工资单/__init__/_msi.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral21
Sample
2023年11月份工资单/__init__/_multiprocessing.dll
Resource
win7-20231025-en
Behavioral task
behavioral22
Sample
2023年11月份工资单/__init__/_multiprocessing.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral23
Sample
2023年11月份工资单/__init__/_overlapped.dll
Resource
win7-20231020-en
Behavioral task
behavioral24
Sample
2023年11月份工资单/__init__/_overlapped.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral25
Sample
2023年11月份工资单/__init__/_queue.dll
Resource
win7-20231023-en
Behavioral task
behavioral26
Sample
2023年11月份工资单/__init__/_queue.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral27
Sample
2023年11月份工资单/__init__/_sqlite3.dll
Resource
win7-20231025-en
Behavioral task
behavioral28
Sample
2023年11月份工资单/__init__/_sqlite3.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral29
Sample
2023年11月份工资单/__init__/_ssl.dll
Resource
win7-20231020-en
Behavioral task
behavioral30
Sample
2023年11月份工资单/__init__/_ssl.dll
Resource
win10v2004-20231020-en
Behavioral task
behavioral31
Sample
2023年11月份工资单/__init__/a.dll
Resource
win7-20231023-en
Behavioral task
behavioral32
Sample
2023年11月份工资单/__init__/a.dll
Resource
win10v2004-20231023-en
General
-
Target
2023年11月份工资单/2023年11月份工资单.docx.lnk
-
Size
1KB
-
MD5
b269bc566dd1be6e488ebfa6460a5a00
-
SHA1
fd6022f6f4ff0486c05e45c4b7bdb1cbed6bfff3
-
SHA256
168e93ce546815a5210234961d028945d6f8092764885810391ecbcb1337fde2
-
SHA512
3efcdf84ff60085eaab641687a31059483f8c4410f565e05f164615b5217507ef19a7218840f90b5c4c34d8b98d970d8d4b7228efd277659830dc4dad6de49a2
Malware Config
Extracted
cobaltstrike
100000000
http://119.84.129.224:443/jquery-3.3.1.min.js
-
access_type
512
-
beacon_type
2048
-
host
119.84.129.224,/jquery-3.3.1.min.js
-
http_header1
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
-
http_header2
AAAACgAAAEdBY2NlcHQ6IHRleHQvaHRtbCxhcHBsaWNhdGlvbi94aHRtbCt4bWwsYXBwbGljYXRpb24veG1sO3E9MC45LCovKjtxPTAuOAAAAAoAAAAgUmVmZXJlcjogaHR0cDovL2NvZGUuanF1ZXJ5LmNvbS8AAAAKAAAAHkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQAAAAcAAAAAAAAADwAAAA0AAAAFAAAACF9fY2ZkdWlkAAAABwAAAAEAAAAPAAAADQAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
POST
-
jitter
9472
-
polling_time
12000
-
port_number
443
-
sc_process32
%windir%\syswow64\dllhost.exe
-
sc_process64
%windir%\sysnative\dllhost.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCrTYWiJ/5CMst9xKN4Qp1M/umCsyBwdCK1jZz+GjtvwrwHGXYIO7orYhmjKeuV3RHc06dqlylaJgqr9pelZ123yWcyV4nDO1DUCfJsmGCZeVGhHZ5nopo4URuQd9z6Qq1YraNH86vrdl37BrYYhRGDkZTQXpCUSclajI8qIfBwLQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4.234810624e+09
-
unknown2
AAAABAAAAAEAAAXyAAAAAgAAAFQAAAACAAAPWwAAAA0AAAAPAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/jquery-3.3.2.min.js
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/186.911.0.53 Safari/537.36
-
watermark
100000000
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2136 WINWORD.EXE 2136 WINWORD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: 35 3864 pythonw.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2136 WINWORD.EXE 2136 WINWORD.EXE 2136 WINWORD.EXE 2136 WINWORD.EXE 2136 WINWORD.EXE 2136 WINWORD.EXE 2136 WINWORD.EXE 2136 WINWORD.EXE 2136 WINWORD.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4592 wrote to memory of 4984 4592 cmd.exe 88 PID 4592 wrote to memory of 4984 4592 cmd.exe 88 PID 4984 wrote to memory of 2204 4984 ftp.exe 89 PID 4984 wrote to memory of 2204 4984 ftp.exe 89 PID 2204 wrote to memory of 3864 2204 cmd.exe 90 PID 2204 wrote to memory of 3864 2204 cmd.exe 90 PID 2204 wrote to memory of 3864 2204 cmd.exe 90 PID 4984 wrote to memory of 2288 4984 ftp.exe 91 PID 4984 wrote to memory of 2288 4984 ftp.exe 91 PID 2288 wrote to memory of 2136 2288 cmd.exe 92 PID 2288 wrote to memory of 2136 2288 cmd.exe 92 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\2023年11月份工资单\2023年11月份工资单.docx.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\System32\ftp.exe"C:\Windows\System32\ftp.exe" -""s:__init__\a.dll2⤵
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C start /b __init__\pythonw.exe __init__\main.pyw3⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\2023年11月份工资单\__init__\pythonw.exe__init__\pythonw.exe __init__\main.pyw4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3864
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C start /b __init__\11.docx3⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2023年11月份工资单\__init__\11.docx" /o ""4⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2136
-
-
-