Analysis
-
max time kernel
130s -
max time network
131s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
10-11-2020 07:01
Static task
static1
Behavioral task
behavioral1
Sample
56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe
Resource
win10v20201028
General
-
Target
56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe
-
Size
5.9MB
-
MD5
19db0c6047d107e85fbeb4fcdee08dc2
-
SHA1
d15a1f4bd002c5f509fc03c88ddbbc7da5569f6c
-
SHA256
56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca
-
SHA512
26fbcd8d11e22ce98f6dba97c6b7191b8d3da46d6984906aecc88c29bb8ff188cf2eadb01e1a6ea3073bb0f60dd852e06e96cffa3b9d726c0dffafade8ec5da3
Malware Config
Signatures
-
Cobalt Strike reflective loader 13 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule \Windows\system\OKgQuwl.exe cobalt_reflective_dll C:\Windows\system\OKgQuwl.exe cobalt_reflective_dll \Windows\system\wrAusat.exe cobalt_reflective_dll \Windows\system\DmQePES.exe cobalt_reflective_dll C:\Windows\system\DmQePES.exe cobalt_reflective_dll C:\Windows\system\wrAusat.exe cobalt_reflective_dll \Windows\system\uhtemgG.exe cobalt_reflective_dll C:\Windows\system\uhtemgG.exe cobalt_reflective_dll \Windows\system\FUyAsVw.exe cobalt_reflective_dll C:\Windows\system\FUyAsVw.exe cobalt_reflective_dll \Windows\system\JiyiOeq.exe cobalt_reflective_dll C:\Windows\system\JiyiOeq.exe cobalt_reflective_dll \Windows\system\aZkfPQR.exe cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Executes dropped EXE 6 IoCs
Processes:
OKgQuwl.exeDmQePES.exewrAusat.exeuhtemgG.exeFUyAsVw.exeJiyiOeq.exepid process 1320 OKgQuwl.exe 1472 DmQePES.exe 1176 wrAusat.exe 836 uhtemgG.exe 2012 FUyAsVw.exe 1972 JiyiOeq.exe -
Processes:
resource yara_rule \Windows\system\OKgQuwl.exe upx C:\Windows\system\OKgQuwl.exe upx \Windows\system\wrAusat.exe upx \Windows\system\DmQePES.exe upx C:\Windows\system\DmQePES.exe upx C:\Windows\system\wrAusat.exe upx \Windows\system\uhtemgG.exe upx C:\Windows\system\uhtemgG.exe upx \Windows\system\FUyAsVw.exe upx C:\Windows\system\FUyAsVw.exe upx \Windows\system\JiyiOeq.exe upx C:\Windows\system\JiyiOeq.exe upx \Windows\system\aZkfPQR.exe upx -
Loads dropped DLL 7 IoCs
Processes:
56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exepid process 1880 56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe 1880 56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe 1880 56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe 1880 56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe 1880 56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe 1880 56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe 1880 56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe -
JavaScript code in executable 13 IoCs
Processes:
resource yara_rule \Windows\system\OKgQuwl.exe js C:\Windows\system\OKgQuwl.exe js \Windows\system\wrAusat.exe js \Windows\system\DmQePES.exe js C:\Windows\system\DmQePES.exe js C:\Windows\system\wrAusat.exe js \Windows\system\uhtemgG.exe js C:\Windows\system\uhtemgG.exe js \Windows\system\FUyAsVw.exe js C:\Windows\system\FUyAsVw.exe js \Windows\system\JiyiOeq.exe js C:\Windows\system\JiyiOeq.exe js \Windows\system\aZkfPQR.exe js -
Drops file in Windows directory 7 IoCs
Processes:
56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exedescription ioc process File created C:\Windows\System\uhtemgG.exe 56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe File created C:\Windows\System\FUyAsVw.exe 56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe File created C:\Windows\System\JiyiOeq.exe 56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe File created C:\Windows\System\aZkfPQR.exe 56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe File created C:\Windows\System\OKgQuwl.exe 56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe File created C:\Windows\System\wrAusat.exe 56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe File created C:\Windows\System\DmQePES.exe 56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exedescription pid process target process PID 1880 wrote to memory of 1320 1880 56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe OKgQuwl.exe PID 1880 wrote to memory of 1320 1880 56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe OKgQuwl.exe PID 1880 wrote to memory of 1320 1880 56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe OKgQuwl.exe PID 1880 wrote to memory of 1176 1880 56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe wrAusat.exe PID 1880 wrote to memory of 1176 1880 56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe wrAusat.exe PID 1880 wrote to memory of 1176 1880 56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe wrAusat.exe PID 1880 wrote to memory of 1472 1880 56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe DmQePES.exe PID 1880 wrote to memory of 1472 1880 56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe DmQePES.exe PID 1880 wrote to memory of 1472 1880 56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe DmQePES.exe PID 1880 wrote to memory of 836 1880 56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe uhtemgG.exe PID 1880 wrote to memory of 836 1880 56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe uhtemgG.exe PID 1880 wrote to memory of 836 1880 56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe uhtemgG.exe PID 1880 wrote to memory of 2012 1880 56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe FUyAsVw.exe PID 1880 wrote to memory of 2012 1880 56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe FUyAsVw.exe PID 1880 wrote to memory of 2012 1880 56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe FUyAsVw.exe PID 1880 wrote to memory of 1972 1880 56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe JiyiOeq.exe PID 1880 wrote to memory of 1972 1880 56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe JiyiOeq.exe PID 1880 wrote to memory of 1972 1880 56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe JiyiOeq.exe PID 1880 wrote to memory of 1640 1880 56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe aZkfPQR.exe PID 1880 wrote to memory of 1640 1880 56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe aZkfPQR.exe PID 1880 wrote to memory of 1640 1880 56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe aZkfPQR.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe"C:\Users\Admin\AppData\Local\Temp\56e2f454fdf5fcecf5011e7a67d712c2040dbbe51524ce986c563e3aaf3c6eca.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\System\OKgQuwl.exeC:\Windows\System\OKgQuwl.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\wrAusat.exeC:\Windows\System\wrAusat.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\DmQePES.exeC:\Windows\System\DmQePES.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\uhtemgG.exeC:\Windows\System\uhtemgG.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\FUyAsVw.exeC:\Windows\System\FUyAsVw.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\JiyiOeq.exeC:\Windows\System\JiyiOeq.exe2⤵
- Executes dropped EXE
-
C:\Windows\System\aZkfPQR.exeC:\Windows\System\aZkfPQR.exe2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\system\DmQePES.exeMD5
fdaa602ac1db8d9a1b4de80751218bad
SHA133eccb4956abed996b023f81ff15e1ecfc75a544
SHA256486814c5b1381e0af2db893f9ef62f20ddada5b54ead42740bd8b7eb8aa25b47
SHA5122f43d19e09a1fc7a6b94469723ac2374c8b0cc8b481c2d8b2c5f4c8925115418d6525e72b273aaed820f6dc753898cefa67d6f91c8f9361f2c6fd056c7307bd7
-
C:\Windows\system\FUyAsVw.exeMD5
67142a27713cb9a9999401809d53a2e6
SHA1a4b9f5f336c3d7742a73b869baf38bc45e3fe80c
SHA25683894c2909a30a3aa4498e5c8b1fe6fd926b3be22c5fb6abd34061e2d8d193f6
SHA51273ece62b00dff4f4a6cd8ebb259ea8bffef0ce8eebbeb2d75af3fbf79e4c0bf50ea25059ad771e388e84e8b3f8f0819f5de86712561750ed11e94a387c60db91
-
C:\Windows\system\JiyiOeq.exeMD5
161d908e2f4b6eee292ad6e5482a9da6
SHA1c51c539b2b5dd828e1d241af6a3f27932e635a83
SHA256f3d4062e69c50b75f1b1ec8f752405306421638d2fb25bdb500df4679313f37b
SHA512e807972cd8d5b088d55c9f8a5fcd432cab581d9562190082fd5a795a38265ece676cf397e43ed2e775937716762f64e5b251b54f3fe796a48cd75bb4104fe290
-
C:\Windows\system\OKgQuwl.exeMD5
7bc10286b8c6f3a7c568f763b45278ac
SHA1db5fa070ae7d8274cad39a2e3a0f5f5964e57e49
SHA25636d6b8aff9e958abd555e5b6fac2c3084ca2a0a84a7c5ddcba4c1415f1b6734c
SHA512a1d266578d42be36181f30a17a32d08f0f1a83d86576d8b94896d5e881c1958e359b9ee51d18e4f97214a22bf8865fe8bb0992535dce2c57e5b1bbd91d567ebe
-
C:\Windows\system\uhtemgG.exeMD5
7b35f6bd4cfcd9be2b5b3ecc5dd7d085
SHA194e301ea6430ff8987007b36cfd273ee08029b8d
SHA256ab70199e285165dd2b2ae3dc89e0fe45dcfac7895bda35958a16a89e70374791
SHA512b5f7b4acca71a9c7ad4e9c087f4416d386ae04a53787e634b85ac5dd34061bd388fc6f0a1b337f53c616a8b06d15f6a890a6a653e2931a79a2dfaea56c05c53b
-
C:\Windows\system\wrAusat.exeMD5
7338c44bbce204e0a70a7b50c83fd42a
SHA116465f05e43e448f2d5182699612d58fee1d315c
SHA256e48da339f570132bff09733ee37bf7a38a58bee0cd98bd8598cbcd40f25b003a
SHA512e4347427778adb4745bbff11da509b7d2d7bd9edc0d503e1e1b5d5fa33127b12ac5141a14de3aa35d13893a439db1b2cc4380b10b6bd1c9d634002ba58d6a3d6
-
\Windows\system\DmQePES.exeMD5
fdaa602ac1db8d9a1b4de80751218bad
SHA133eccb4956abed996b023f81ff15e1ecfc75a544
SHA256486814c5b1381e0af2db893f9ef62f20ddada5b54ead42740bd8b7eb8aa25b47
SHA5122f43d19e09a1fc7a6b94469723ac2374c8b0cc8b481c2d8b2c5f4c8925115418d6525e72b273aaed820f6dc753898cefa67d6f91c8f9361f2c6fd056c7307bd7
-
\Windows\system\FUyAsVw.exeMD5
67142a27713cb9a9999401809d53a2e6
SHA1a4b9f5f336c3d7742a73b869baf38bc45e3fe80c
SHA25683894c2909a30a3aa4498e5c8b1fe6fd926b3be22c5fb6abd34061e2d8d193f6
SHA51273ece62b00dff4f4a6cd8ebb259ea8bffef0ce8eebbeb2d75af3fbf79e4c0bf50ea25059ad771e388e84e8b3f8f0819f5de86712561750ed11e94a387c60db91
-
\Windows\system\JiyiOeq.exeMD5
161d908e2f4b6eee292ad6e5482a9da6
SHA1c51c539b2b5dd828e1d241af6a3f27932e635a83
SHA256f3d4062e69c50b75f1b1ec8f752405306421638d2fb25bdb500df4679313f37b
SHA512e807972cd8d5b088d55c9f8a5fcd432cab581d9562190082fd5a795a38265ece676cf397e43ed2e775937716762f64e5b251b54f3fe796a48cd75bb4104fe290
-
\Windows\system\OKgQuwl.exeMD5
7bc10286b8c6f3a7c568f763b45278ac
SHA1db5fa070ae7d8274cad39a2e3a0f5f5964e57e49
SHA25636d6b8aff9e958abd555e5b6fac2c3084ca2a0a84a7c5ddcba4c1415f1b6734c
SHA512a1d266578d42be36181f30a17a32d08f0f1a83d86576d8b94896d5e881c1958e359b9ee51d18e4f97214a22bf8865fe8bb0992535dce2c57e5b1bbd91d567ebe
-
\Windows\system\aZkfPQR.exeMD5
6b11125e23f814975150224f404a5ebf
SHA16b7a02ff9727ad6319ec7135beff822e1506ce53
SHA2561af5db427169d9401c98915acd97f6cd9dd80730cacfe3b650cb4f73afd68a3c
SHA512f4a30bdf06ee908139093981e6463c8525ebe809902d8d0851c5ca8a18926a5cb3cd49a000c11c057cdd84b9f1120b72da3a42fc47175dfe9904138fef21a0d1
-
\Windows\system\uhtemgG.exeMD5
7b35f6bd4cfcd9be2b5b3ecc5dd7d085
SHA194e301ea6430ff8987007b36cfd273ee08029b8d
SHA256ab70199e285165dd2b2ae3dc89e0fe45dcfac7895bda35958a16a89e70374791
SHA512b5f7b4acca71a9c7ad4e9c087f4416d386ae04a53787e634b85ac5dd34061bd388fc6f0a1b337f53c616a8b06d15f6a890a6a653e2931a79a2dfaea56c05c53b
-
\Windows\system\wrAusat.exeMD5
7338c44bbce204e0a70a7b50c83fd42a
SHA116465f05e43e448f2d5182699612d58fee1d315c
SHA256e48da339f570132bff09733ee37bf7a38a58bee0cd98bd8598cbcd40f25b003a
SHA512e4347427778adb4745bbff11da509b7d2d7bd9edc0d503e1e1b5d5fa33127b12ac5141a14de3aa35d13893a439db1b2cc4380b10b6bd1c9d634002ba58d6a3d6
-
memory/836-8-0x0000000000000000-mapping.dmp
-
memory/1176-4-0x0000000000000000-mapping.dmp
-
memory/1320-1-0x0000000000000000-mapping.dmp
-
memory/1472-6-0x0000000000000000-mapping.dmp
-
memory/1640-19-0x0000000000000000-mapping.dmp
-
memory/1972-16-0x0000000000000000-mapping.dmp
-
memory/2012-13-0x0000000000000000-mapping.dmp