Analysis

  • max time kernel
    47s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    10-11-2020 07:52

General

  • Target

    c4b4b072f43bd4eece79bf1db74b26a859dc1f873389a3828e39b1bc207f7f8b.exe

  • Size

    5.2MB

  • MD5

    00a7a0b8639276c3235e6cff2d89f0c9

  • SHA1

    7a90d70928681a626f89d27b08691e949f2d4631

  • SHA256

    c4b4b072f43bd4eece79bf1db74b26a859dc1f873389a3828e39b1bc207f7f8b

  • SHA512

    7190f244570295031f1640551a1ed6f2b43420a23a67a3e3c1776fc5b2adb683da85848191554389d1afd731ab2dd973ea44fce6600a58f599189cd8e2a04765

Malware Config

Extracted

Family

cobaltstrike

C2

http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

Attributes
  • access_type

    512

  • beacon_type

    256

  • create_remote_thread

    768

  • day

    0

  • dns_idle

    0

  • dns_sleep

    0

  • host

    ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

  • http_header1

    AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_header2

    AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==

  • http_method1

    GET

  • http_method2

    POST

  • injection_process

  • jitter

    0

  • maxdns

    255

  • month

    0

  • pipe_name

    \\%s\pipe\msagent_%x

  • polling_time

    5000

  • port_number

    443

  • proxy_password

  • proxy_server

  • proxy_username

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown3

    0

  • unknown4

    256

  • unknown5

    0

  • uri

    /N4215/adj/amzn.us.sr.aps

  • user_agent

    Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko

  • year

    0

Signatures

  • Cobalt Strike reflective loader 19 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Executes dropped EXE 9 IoCs
  • UPX packed file 19 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 10 IoCs
  • JavaScript code in executable 19 IoCs
  • Drops file in Windows directory 10 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c4b4b072f43bd4eece79bf1db74b26a859dc1f873389a3828e39b1bc207f7f8b.exe
    "C:\Users\Admin\AppData\Local\Temp\c4b4b072f43bd4eece79bf1db74b26a859dc1f873389a3828e39b1bc207f7f8b.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1320
    • C:\Windows\System\WkKdvsc.exe
      C:\Windows\System\WkKdvsc.exe
      2⤵
      • Executes dropped EXE
      PID:2008
    • C:\Windows\System\FHDCXPe.exe
      C:\Windows\System\FHDCXPe.exe
      2⤵
      • Executes dropped EXE
      PID:1364
    • C:\Windows\System\JPSKfTO.exe
      C:\Windows\System\JPSKfTO.exe
      2⤵
      • Executes dropped EXE
      PID:2036
    • C:\Windows\System\fyyUQIs.exe
      C:\Windows\System\fyyUQIs.exe
      2⤵
      • Executes dropped EXE
      PID:1988
    • C:\Windows\System\lDcuepA.exe
      C:\Windows\System\lDcuepA.exe
      2⤵
      • Executes dropped EXE
      PID:1984
    • C:\Windows\System\OpYwlsR.exe
      C:\Windows\System\OpYwlsR.exe
      2⤵
      • Executes dropped EXE
      PID:652
    • C:\Windows\System\oXgzGmu.exe
      C:\Windows\System\oXgzGmu.exe
      2⤵
      • Executes dropped EXE
      PID:528
    • C:\Windows\System\yWBqRlD.exe
      C:\Windows\System\yWBqRlD.exe
      2⤵
      • Executes dropped EXE
      PID:912
    • C:\Windows\System\XWPMQia.exe
      C:\Windows\System\XWPMQia.exe
      2⤵
      • Executes dropped EXE
      PID:556
    • C:\Windows\System\QxECfYt.exe
      C:\Windows\System\QxECfYt.exe
      2⤵
        PID:1104

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\system\FHDCXPe.exe
      MD5

      cb45ad24e0f0c1e37c81fb65cb3aaaa1

      SHA1

      4be058b4e2a742ed5fb90a5e109db9c889bfd385

      SHA256

      8624a1d3c427b19ac72befcf14239d3d00d40572dfff862de6bc4c6748b2878d

      SHA512

      d96b2977ef92d918119c15661bc85583686d10c799f260f3daf3b662b60843295a970372ce5328f7ef5a44b7c9a9952d1ad95226fd1b10ad71aa8f35728697c9

    • C:\Windows\system\JPSKfTO.exe
      MD5

      0f5b9987d2a112684a0ef75f4d6fc13f

      SHA1

      0101bd482da05e283bb214a06feb778a405b6a69

      SHA256

      dc3a2cd79a7c6f5552eaf423fbe1d45f67d83337a5c98bfb96c890f01736996b

      SHA512

      c28abca08ebc4639d370a6e6313254c01f77f48ccec25e68679b51a5e49d112140630a68b196de49b298fbf645519bf8819933a54ed190222dc78e299cddfefa

    • C:\Windows\system\OpYwlsR.exe
      MD5

      371a6a212ceb897e34568b1984392a1b

      SHA1

      7717b6376b5526443a6dfc184d4581330dbb7bb7

      SHA256

      342d2b65b1c9f85c5efd33b84b00cb41f5f96345704169150894611f3a83d406

      SHA512

      50e233b7c5a56fdd605f8fdd49614e8c02a163b8399a4936ad12dedb7f9fe47e61bac294332e7942bcfad4b125b8867fa93ad33f586a2de7815506626e449596

    • C:\Windows\system\WkKdvsc.exe
      MD5

      a032b6f35647f2099f7daedd15f0de69

      SHA1

      5eb27210c9e19168b6df9474453560de9ff96979

      SHA256

      02ca7cba601491954d50049d859e64fc7042411fbf2bc66e7cdd64e6bdeb17c4

      SHA512

      05a8e85e205c5e3117f6239303fbc4cb6fb2d96d631a8552546c72ec9a92894ad2c3de639f6a87c960f0510515e07d035386770c0503ff912a3d770f72a9fe2e

    • C:\Windows\system\XWPMQia.exe
      MD5

      c419d7a8acc2f2a00105e508ddc644b7

      SHA1

      044e73a7127d91c82b2fd18af41cc6fa3dc70d39

      SHA256

      2cdd84dbe4052a3c4d6dfb92f2f7e207a5fdd6199213f94c8419c883d9efe5f4

      SHA512

      3715cec3bf7c5eb717ab4d79a48bd37f18e36af00e206969683be773729f0cd85316b0cc5259fabc04aac82a3d12a454f286252e595ae0e2cf6fed0b30068088

    • C:\Windows\system\fyyUQIs.exe
      MD5

      e1ae3c67e2abaf5461dc3632e1dbaf94

      SHA1

      fe2ffb865f0aba7cbe66bfd40b73a6092b6f754a

      SHA256

      cc0416542f8b86fc7a89479438610f9d0d8829a0574022d98397f0249289e17b

      SHA512

      7e4984248dabc2e555ffa110ccd9ae492b8de2ca040c55b1ef014d2f8cb488ec8e2c5e95286e2634b1b34d2dcbf8c7b837466a164d9dcc37bc71c3a2ea2f7ee6

    • C:\Windows\system\lDcuepA.exe
      MD5

      fd70787f5829dc5a6f023b9e4650c66e

      SHA1

      282522260ddd2b4e25f2929d4e7b59d6ffb22f26

      SHA256

      e96172e7a0bdfeb7800d07048aabb2ab69c56661f9268ac7981ea986eff2c4eb

      SHA512

      5e8368ce12ccd453ede6eb894bd0aca78d5b5c38920614fcc388e5b6c74e95748be658fc799af29d3aeaacc8b589d5d1b10b84c741bf313bec8746ad9b261b57

    • C:\Windows\system\oXgzGmu.exe
      MD5

      1b3abea781a4aea79281dc8396df3b3d

      SHA1

      4ec2fc53c8fc76cc88aa602ebf0c68ac76f7df35

      SHA256

      df0b707bdf573e020242f764670f5bd200279af5ac0f2a42422d45e4f1a8dd33

      SHA512

      759b80e76cac1469fef0f300ec4876dc4aead42e67499a19f6fb51409b20e3d99f44d87ab9e5519d2bea33c0025ae9e8aee244d458cb2d34bc9ffa865019de92

    • C:\Windows\system\yWBqRlD.exe
      MD5

      c5ce965be62c1505fdbc7c994d7aada5

      SHA1

      f246f5d6b681642c7a63bdd958b7a9c530fa385f

      SHA256

      9d9a3c7e0ee2fcc9a0d65e2c9c4a2ffc838ab1645eec29605ebf4a1651eeb7a2

      SHA512

      fb40a9f050f3d3ca7d12d010e02a93edcef7ff0e37e39fb30a1bbd8bb9765c34709fe9e16efc574953e87ae5498d28ada78947608716675ca4e5b0c2a89c7bd4

    • \Windows\system\FHDCXPe.exe
      MD5

      cb45ad24e0f0c1e37c81fb65cb3aaaa1

      SHA1

      4be058b4e2a742ed5fb90a5e109db9c889bfd385

      SHA256

      8624a1d3c427b19ac72befcf14239d3d00d40572dfff862de6bc4c6748b2878d

      SHA512

      d96b2977ef92d918119c15661bc85583686d10c799f260f3daf3b662b60843295a970372ce5328f7ef5a44b7c9a9952d1ad95226fd1b10ad71aa8f35728697c9

    • \Windows\system\JPSKfTO.exe
      MD5

      0f5b9987d2a112684a0ef75f4d6fc13f

      SHA1

      0101bd482da05e283bb214a06feb778a405b6a69

      SHA256

      dc3a2cd79a7c6f5552eaf423fbe1d45f67d83337a5c98bfb96c890f01736996b

      SHA512

      c28abca08ebc4639d370a6e6313254c01f77f48ccec25e68679b51a5e49d112140630a68b196de49b298fbf645519bf8819933a54ed190222dc78e299cddfefa

    • \Windows\system\OpYwlsR.exe
      MD5

      371a6a212ceb897e34568b1984392a1b

      SHA1

      7717b6376b5526443a6dfc184d4581330dbb7bb7

      SHA256

      342d2b65b1c9f85c5efd33b84b00cb41f5f96345704169150894611f3a83d406

      SHA512

      50e233b7c5a56fdd605f8fdd49614e8c02a163b8399a4936ad12dedb7f9fe47e61bac294332e7942bcfad4b125b8867fa93ad33f586a2de7815506626e449596

    • \Windows\system\QxECfYt.exe
      MD5

      26fc7738804cc66b5342d2841829569f

      SHA1

      a1ece72b8aeb78bd59516ecbc9cd39d46d07c37f

      SHA256

      18e1799ba6690203d03966ae496375aa3e9b5ddf06cc02ce8bd963c27cc0f8eb

      SHA512

      e05ba56be6fd406d24b504efe570dcea5c60c37eb9de391ce5def4f49c1e3854b0aea9a6f844e5769edf94d6eb52fe02123997d2ffbe7bde9988847794f6fa56

    • \Windows\system\WkKdvsc.exe
      MD5

      a032b6f35647f2099f7daedd15f0de69

      SHA1

      5eb27210c9e19168b6df9474453560de9ff96979

      SHA256

      02ca7cba601491954d50049d859e64fc7042411fbf2bc66e7cdd64e6bdeb17c4

      SHA512

      05a8e85e205c5e3117f6239303fbc4cb6fb2d96d631a8552546c72ec9a92894ad2c3de639f6a87c960f0510515e07d035386770c0503ff912a3d770f72a9fe2e

    • \Windows\system\XWPMQia.exe
      MD5

      c419d7a8acc2f2a00105e508ddc644b7

      SHA1

      044e73a7127d91c82b2fd18af41cc6fa3dc70d39

      SHA256

      2cdd84dbe4052a3c4d6dfb92f2f7e207a5fdd6199213f94c8419c883d9efe5f4

      SHA512

      3715cec3bf7c5eb717ab4d79a48bd37f18e36af00e206969683be773729f0cd85316b0cc5259fabc04aac82a3d12a454f286252e595ae0e2cf6fed0b30068088

    • \Windows\system\fyyUQIs.exe
      MD5

      e1ae3c67e2abaf5461dc3632e1dbaf94

      SHA1

      fe2ffb865f0aba7cbe66bfd40b73a6092b6f754a

      SHA256

      cc0416542f8b86fc7a89479438610f9d0d8829a0574022d98397f0249289e17b

      SHA512

      7e4984248dabc2e555ffa110ccd9ae492b8de2ca040c55b1ef014d2f8cb488ec8e2c5e95286e2634b1b34d2dcbf8c7b837466a164d9dcc37bc71c3a2ea2f7ee6

    • \Windows\system\lDcuepA.exe
      MD5

      fd70787f5829dc5a6f023b9e4650c66e

      SHA1

      282522260ddd2b4e25f2929d4e7b59d6ffb22f26

      SHA256

      e96172e7a0bdfeb7800d07048aabb2ab69c56661f9268ac7981ea986eff2c4eb

      SHA512

      5e8368ce12ccd453ede6eb894bd0aca78d5b5c38920614fcc388e5b6c74e95748be658fc799af29d3aeaacc8b589d5d1b10b84c741bf313bec8746ad9b261b57

    • \Windows\system\oXgzGmu.exe
      MD5

      1b3abea781a4aea79281dc8396df3b3d

      SHA1

      4ec2fc53c8fc76cc88aa602ebf0c68ac76f7df35

      SHA256

      df0b707bdf573e020242f764670f5bd200279af5ac0f2a42422d45e4f1a8dd33

      SHA512

      759b80e76cac1469fef0f300ec4876dc4aead42e67499a19f6fb51409b20e3d99f44d87ab9e5519d2bea33c0025ae9e8aee244d458cb2d34bc9ffa865019de92

    • \Windows\system\yWBqRlD.exe
      MD5

      c5ce965be62c1505fdbc7c994d7aada5

      SHA1

      f246f5d6b681642c7a63bdd958b7a9c530fa385f

      SHA256

      9d9a3c7e0ee2fcc9a0d65e2c9c4a2ffc838ab1645eec29605ebf4a1651eeb7a2

      SHA512

      fb40a9f050f3d3ca7d12d010e02a93edcef7ff0e37e39fb30a1bbd8bb9765c34709fe9e16efc574953e87ae5498d28ada78947608716675ca4e5b0c2a89c7bd4

    • memory/528-19-0x0000000000000000-mapping.dmp
    • memory/556-24-0x0000000000000000-mapping.dmp
    • memory/652-16-0x0000000000000000-mapping.dmp
    • memory/912-22-0x0000000000000000-mapping.dmp
    • memory/1104-28-0x0000000000000000-mapping.dmp
    • memory/1364-4-0x0000000000000000-mapping.dmp
    • memory/1984-13-0x0000000000000000-mapping.dmp
    • memory/1988-10-0x0000000000000000-mapping.dmp
    • memory/2008-1-0x0000000000000000-mapping.dmp
    • memory/2036-7-0x0000000000000000-mapping.dmp