Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-04-2024 21:33
Static task
static1
Behavioral task
behavioral1
Sample
58f40f4f8f24b7bc27fef06b056f8f6b653208118c2cf0326e94648132fa1430.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
58f40f4f8f24b7bc27fef06b056f8f6b653208118c2cf0326e94648132fa1430.exe
Resource
win10v2004-20240226-en
General
-
Target
58f40f4f8f24b7bc27fef06b056f8f6b653208118c2cf0326e94648132fa1430.exe
-
Size
1.5MB
-
MD5
ea63c0e69c4a9c30d9af4afe2bdf5cfd
-
SHA1
97ee05ba4442d3a5372ffaa372b327d0f6f9e655
-
SHA256
58f40f4f8f24b7bc27fef06b056f8f6b653208118c2cf0326e94648132fa1430
-
SHA512
0ba32bef9b92b10079eb621e8ac32fd27987d45f00a0b1704ae29210f2906e4344d77801e5d120a9d02ce5e0e8742468dc0ab2c9d869d9027f5390299589cc0c
-
SSDEEP
24576:EVAtAQfLY08PFDyKfPVXL5u+gyQQ/hffpLAeMcUg9sB26wn6fbQhPZ:E4dkV54UAkZ
Malware Config
Extracted
cobaltstrike
http://69.235.177.76:17777/jquery-3.3.2.slim.min.js
-
user_agent
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Referer: http://code.jquery.com/ Accept-Encoding: gzip, deflate User-Agent: Mozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like Gecko
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
artifact.exepid process 2400 artifact.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 1 IoCs
Processes:
cmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 212 EXCEL.EXE -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
58f40f4f8f24b7bc27fef06b056f8f6b653208118c2cf0326e94648132fa1430.exepid process 1436 58f40f4f8f24b7bc27fef06b056f8f6b653208118c2cf0326e94648132fa1430.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
EXCEL.EXEpid process 212 EXCEL.EXE 212 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
EXCEL.EXEpid process 212 EXCEL.EXE 212 EXCEL.EXE 212 EXCEL.EXE 212 EXCEL.EXE 212 EXCEL.EXE 212 EXCEL.EXE 212 EXCEL.EXE 212 EXCEL.EXE 212 EXCEL.EXE 212 EXCEL.EXE 212 EXCEL.EXE 212 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
58f40f4f8f24b7bc27fef06b056f8f6b653208118c2cf0326e94648132fa1430.execmd.exedescription pid process target process PID 1436 wrote to memory of 5008 1436 58f40f4f8f24b7bc27fef06b056f8f6b653208118c2cf0326e94648132fa1430.exe cmd.exe PID 1436 wrote to memory of 5008 1436 58f40f4f8f24b7bc27fef06b056f8f6b653208118c2cf0326e94648132fa1430.exe cmd.exe PID 1436 wrote to memory of 5008 1436 58f40f4f8f24b7bc27fef06b056f8f6b653208118c2cf0326e94648132fa1430.exe cmd.exe PID 1436 wrote to memory of 2400 1436 58f40f4f8f24b7bc27fef06b056f8f6b653208118c2cf0326e94648132fa1430.exe artifact.exe PID 1436 wrote to memory of 2400 1436 58f40f4f8f24b7bc27fef06b056f8f6b653208118c2cf0326e94648132fa1430.exe artifact.exe PID 5008 wrote to memory of 212 5008 cmd.exe EXCEL.EXE PID 5008 wrote to memory of 212 5008 cmd.exe EXCEL.EXE PID 5008 wrote to memory of 212 5008 cmd.exe EXCEL.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\58f40f4f8f24b7bc27fef06b056f8f6b653208118c2cf0326e94648132fa1430.exe"C:\Users\Admin\AppData\Local\Temp\58f40f4f8f24b7bc27fef06b056f8f6b653208118c2cf0326e94648132fa1430.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd " /c " C:\Users\Admin\AppData\Local\Temp\员工3月出勤统计.xlsx2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\员工3月出勤统计.xlsx"3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Users\Public\artifact.exeC:\Users\Public\artifact.exe2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3840 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:81⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\员工3月出勤统计.xlsxFilesize
29KB
MD5fbc1a1e6ccd56012b942256f5ed8af21
SHA14891fa654f8ee6daaa3ba19caffa45f2f6c2b48e
SHA256a64ee5735b54b41d3f2475d7f900651feef6ccdd32319a1b728d28c668682a16
SHA512f8a25f0e351e3d2a30523b1ce99d655499e2fda1c669fb499ff98e7f6cbee37c95fec99c3e7e5c57de12ce4fbc3f1813b4778acd672ea35b641c64c113452f51
-
C:\Users\Public\artifact.exeFilesize
17KB
MD5e92422cff5b187ecce930534a3f7a14d
SHA111e07c604e687b47f541acfa8cd1ce814f76c557
SHA256fce27761efbc65259b601c1457bf08314e4cf07cca7a59f3216bf32206484032
SHA512d12ed7d0278af2f909d04517eeef04aad68ca6e4c87a6e1d49cddfca783d0ac1e592f998bb49211c4ea49478d0b09ab16f3ab320ce114b8537f0895ebe07e780
-
memory/212-21-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmpFilesize
2.0MB
-
memory/212-13-0x00007FFEB60F0000-0x00007FFEB6100000-memory.dmpFilesize
64KB
-
memory/212-9-0x00007FFEB60F0000-0x00007FFEB6100000-memory.dmpFilesize
64KB
-
memory/212-23-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmpFilesize
2.0MB
-
memory/212-10-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmpFilesize
2.0MB
-
memory/212-12-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmpFilesize
2.0MB
-
memory/212-14-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmpFilesize
2.0MB
-
memory/212-24-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmpFilesize
2.0MB
-
memory/212-15-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmpFilesize
2.0MB
-
memory/212-16-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmpFilesize
2.0MB
-
memory/212-17-0x00007FFEB60F0000-0x00007FFEB6100000-memory.dmpFilesize
64KB
-
memory/212-18-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmpFilesize
2.0MB
-
memory/212-20-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmpFilesize
2.0MB
-
memory/212-25-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmpFilesize
2.0MB
-
memory/212-75-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmpFilesize
2.0MB
-
memory/212-22-0x00007FFEB3C20000-0x00007FFEB3C30000-memory.dmpFilesize
64KB
-
memory/212-11-0x00007FFEB60F0000-0x00007FFEB6100000-memory.dmpFilesize
64KB
-
memory/212-8-0x00007FFEB60F0000-0x00007FFEB6100000-memory.dmpFilesize
64KB
-
memory/212-19-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmpFilesize
2.0MB
-
memory/212-26-0x00007FFEB3C20000-0x00007FFEB3C30000-memory.dmpFilesize
64KB
-
memory/212-74-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmpFilesize
2.0MB
-
memory/212-40-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmpFilesize
2.0MB
-
memory/212-41-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmpFilesize
2.0MB
-
memory/212-66-0x00007FFEB60F0000-0x00007FFEB6100000-memory.dmpFilesize
64KB
-
memory/212-67-0x00007FFEB60F0000-0x00007FFEB6100000-memory.dmpFilesize
64KB
-
memory/212-68-0x00007FFEB60F0000-0x00007FFEB6100000-memory.dmpFilesize
64KB
-
memory/212-69-0x00007FFEB60F0000-0x00007FFEB6100000-memory.dmpFilesize
64KB
-
memory/212-70-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmpFilesize
2.0MB
-
memory/212-71-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmpFilesize
2.0MB
-
memory/212-72-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmpFilesize
2.0MB
-
memory/212-73-0x00007FFEF6070000-0x00007FFEF6265000-memory.dmpFilesize
2.0MB
-
memory/2400-33-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/2400-6-0x0000000000020000-0x0000000000021000-memory.dmpFilesize
4KB