MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 5509ec26758c3c0dcf2bf1b0d7d8600da08cdcfb73cd6b90d46f84ea61c71094. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CobaltStrike


Vendor detections: 13


Maldoc score: 21


Intelligence 13 IOCs YARA 12 File information Comments

SHA256 hash: 5509ec26758c3c0dcf2bf1b0d7d8600da08cdcfb73cd6b90d46f84ea61c71094
SHA3-384 hash: 9cf1e2b92541f956c9500aae4877dba685b35e1f67e0413f99780c26b4d70421c23081a1d3279f9b58a55b3680d278f9
SHA1 hash: 527453a0f60ba6bd027bdd2d57a0a903270956e9
MD5 hash: 40dda1b39b42825b0877cefc8e849bf4
humanhash: hot-sink-foxtrot-winter
File name:prozorro3.doc
Download: download sample
Signature CobaltStrike
File size:274'432 bytes
First seen:2024-01-30 10:24:52 UTC
Last seen:Never
File type:Word file doc
MIME type:application/msword
ssdeep 6144:zmJqf7Qsa9L/tO8rqSA81Pr4Y0Oz7DtL1Z:VQjL/KSA4Eoz7PZ
TLSH T137445B327264AF13E41E4D3194EDD5A47F66FC1389A88A8F79C93F1E7C7A9106E03660
TrID 52.6% (.DOC) Microsoft Word document (30000/1/2)
33.3% (.DOC) Microsoft Word document (old ver.) (19000/1/2)
14.0% (.) Generic OLE2 / Multistream Compound (8000/1)
Reporter smica83
Tags:apt doc UKR

Office OLE Information


This malware samples appears to be an Office document. The following table provides more information about this document using oletools and oledump.

OLE id
Maldoc score: 21
OLE dump

MalwareBazaar was able to identify 18 sections in this file using oledump:

Section IDSection sizeSection name
1114 bytesCompObj
24096 bytesDocumentSummaryInformation
34096 bytesSummaryInformation
417226 bytes1Table
5166853 bytesData
6406 bytesMacros/PROJECT
771 bytesMacros/PROJECTwm
810708 bytesMacros/VBA/NewMacros
9946 bytesMacros/VBA/ThisDocument
103347 bytesMacros/VBA/_VBA_PROJECT
111998 bytesMacros/VBA/__SRP_0
12122 bytesMacros/VBA/__SRP_1
13768 bytesMacros/VBA/__SRP_2
14806 bytesMacros/VBA/__SRP_3
15574 bytesMacros/VBA/dir
16306 bytesMsoDataStore/2IOWDU5SFOQEKA==/Item
17341 bytesMsoDataStore/2IOWDU5SFOQEKA==/Properties
1853359 bytesWordDocument
OLE vba

MalwareBazaar was able to extract and deobfuscate VBA script(s) the following information from OLE objects embedded in this file using olevba:

TypeKeywordDescription
AutoExecAutoOpenRuns when the Word document is opened
AutoExecDocumentOpenRuns when the Word document is opened
AutoExecAutoCloseRuns when the Word document is closed
AutoExecDocument_CloseRuns when the Word document is closed
AutoExecDocument_OpenRuns when the Word or Publisher document is opened
AutoExecAuto_OpenRuns when the Excel Workbook is opened
AutoExecAuto_CloseRuns when the Excel Workbook is closed
SuspiciousEnvironMay read system environment variables
SuspiciousOpenMay open a file
SuspiciousWriteMay write to a file (if combined with Open)
SuspiciousSaveToFileMay create a text file
SuspiciousRunMay run an executable file or a system command
SuspiciousCreateObjectMay create an OLE object
SuspiciousChrMay attempt to obfuscate specific strings (use option --deobf to deobfuscate)

Intelligence


File Origin
# of uploads :
1
# of downloads :
436
Origin country :
HU HU
Vendor Threat Intelligence
Verdict:
Malicious
File type:
application/msword
Has a screenshot:
False
Contains macros:
True
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Sending a custom TCP request
Creating a window
Сreating synchronization primitives
DNS request
Creating a file in the %temp% directory
Launching a process
Sending an HTTP GET request
Running batch commands by exploiting the app vulnerability
Result
Verdict:
Malicious
File Type:
Legacy Word File with Macro
Behaviour
BlacklistAPI detected
Document image
Document image
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive language-uk lolbin macros macros-on-close macros-on-open packed powershell rundll32
Label:
Benign
Suspicious Score:
2.4/10
Score Malicious:
25%
Score Benign:
75%
Result
Verdict:
MALICIOUS
Details
Base64 Encoded URL
Detected an ANSI or UNICODE http:// or https:// base64 encoded URL prefix.
Macro with Startup Hook
Detected macro logic that will automatically execute on document open. Most malware contains some execution hook.
Document With Few Pages
Document contains between one and three pages of content. Most malicious documents are sparse in page count.
Macro with Multiple Startup Hooks
Detected a macro with multiple startup hooks. While not necessarily nefarious, a common malware tactic.
Macro Contains Suspicious String
Detected a macro with a suspicious string. Suspicious strings include privileged function calls, obfuscations, odd registry keys, etc...
InQuest Machine Learning
An InQuest machine-learning model classified this macro as potentially malicious.
Result
Threat name:
CobaltStrike
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Document contains an embedded VBA macro which may check the recent opened files (possible anti-VM)
Document contains an embedded VBA macro which may execute processes
Document contains an embedded VBA macro with suspicious strings
Document contains an embedded VBA with functions possibly related to ADO stream file operations
Document contains an embedded VBA with functions possibly related to HTTP operations
Document contains an embedded VBA with many string operations indicating source code obfuscation
Document exploit detected (drops PE files)
Document exploit detected (process start blacklist hit)
Found malware configuration
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Office process drops PE file
Sigma detected: Legitimate Application Dropped Archive
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Microsoft Office Child Process
Sigma detected: Suspicious Script Execution From Temp Folder
Snort IDS alert for network traffic
Suspicious execution chain found
Suspicious powershell command line found
System process connects to network (likely due to code injection or exploit)
Yara detected CobaltStrike
Behaviour
Behavior Graph:
Threat name:
Document-Word.Trojan.CobaltStrikeBeacon
Status:
Malicious
First seen:
2024-01-30 10:25:07 UTC
File Type:
Document
Extracted files:
32
AV detection:
16 of 24 (66.67%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  10/10
Tags:
macro macro_on_action
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Modifies registry class
Suspicious behavior: AddClipboardFormatListener
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Office loads VBA resources, possible macro or embedded object present
Drops file in Windows directory
Loads dropped DLL
Blocklisted process makes network request
Downloads MZ/PE file
Process spawned unexpected child process
Malware family:
CobaltStrike
Verdict:
Malicious
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:informational_win_ole_protected
Author:Jeff White (karttoon@gmail.com) @noottrak
Description:Identify OLE Project protection within documents.
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:maldoc_OLE_file_magic_number
Author:Didier Stevens (https://DidierStevens.com)
Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:Office_AutoOpen_Macro
Author:Florian Roth
Description:Detects an Microsoft Office file that contains the AutoOpen Macro function
Rule name:Office_AutoOpen_Macro
Author:Florian Roth (Nextron Systems)
Description:Detects an Microsoft Office file that contains the AutoOpen Macro function
Rule name:office_document_vba
Author:Jean-Philippe Teissier / @Jipe_
Description:Office document with embedded VBA
Reference:https://github.com/jipegit/
Rule name:TA505_Maldoc_21Nov_2
Author:Arkbird_SOLG
Description:invitation (1).xls
Reference:https://twitter.com/58_158_177_102/status/1197432303057637377

File information


The table below shows additional information about this malware sample such as delivery method and external references.

CobaltStrike

Word file doc 5509ec26758c3c0dcf2bf1b0d7d8600da08cdcfb73cd6b90d46f84ea61c71094

(this sample)

Comments