Analysis

  • max time kernel
    47s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    10-11-2020 07:52

General

  • Target

    c4b4b072f43bd4eece79bf1db74b26a859dc1f873389a3828e39b1bc207f7f8b.exe

  • Size

    5.2MB

  • MD5

    00a7a0b8639276c3235e6cff2d89f0c9

  • SHA1

    7a90d70928681a626f89d27b08691e949f2d4631

  • SHA256

    c4b4b072f43bd4eece79bf1db74b26a859dc1f873389a3828e39b1bc207f7f8b

  • SHA512

    7190f244570295031f1640551a1ed6f2b43420a23a67a3e3c1776fc5b2adb683da85848191554389d1afd731ab2dd973ea44fce6600a58f599189cd8e2a04765

Malware Config

Extracted

Family

cobaltstrike

C2

http://ns7.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

http://ns8.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

http://ns9.softline.top:443/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

Attributes
  • access_type

    512

  • beacon_type

    256

  • create_remote_thread

    768

  • day

    0

  • dns_idle

    0

  • dns_sleep

    0

  • host

    ns7.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns8.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books,ns9.softline.top,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books

  • http_header1

    AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAUSG9zdDogd3d3LmFtYXpvbi5jb20AAAAHAAAAAAAAAAMAAAACAAAADnNlc3Npb24tdG9rZW49AAAAAgAAAAxza2luPW5vc2tpbjsAAAABAAAALGNzbS1oaXQ9cy0yNEtVMTFCQjgyUlpTWUdKM0JES3wxNDE5ODk5MDEyOTk2AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_header2

    AAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAAAWQ29udGVudC1UeXBlOiB0ZXh0L3htbAAAAAoAAAAgWC1SZXF1ZXN0ZWQtV2l0aDogWE1MSHR0cFJlcXVlc3QAAAAKAAAAFEhvc3Q6IHd3dy5hbWF6b24uY29tAAAACQAAAApzej0xNjB4NjAwAAAACQAAABFvZT1vZT1JU08tODg1OS0xOwAAAAcAAAAAAAAABQAAAAJzbgAAAAkAAAAGcz0zNzE3AAAACQAAACJkY19yZWY9aHR0cCUzQSUyRiUyRnd3dy5hbWF6b24uY29tAAAABwAAAAEAAAADAAAABAAAAAAAAA==

  • http_method1

    GET

  • http_method2

    POST

  • injection_process

  • jitter

    0

  • maxdns

    255

  • month

    0

  • pipe_name

    \\%s\pipe\msagent_%x

  • polling_time

    5000

  • port_number

    443

  • proxy_password

  • proxy_server

  • proxy_username

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDI579oVVII0cYncGonU6vTWyFhqmq8w5QwvI8qsoWeV68Ngy+MjNPX2crcSVVWKQ3j09FII28KTmoE1XFVjEXF3WytRSlDe1OKfOAHX3XYkS9LcUAy0eRl2h4a73hrg1ir/rpisNT6hHtYaK3tmH8DgW/n1XfTfbWk1MZ7cXQHWQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown3

    0

  • unknown4

    256

  • unknown5

    0

  • uri

    /N4215/adj/amzn.us.sr.aps

  • user_agent

    Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko

  • year

    0

Signatures

  • Cobalt Strike reflective loader 19 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Executes dropped EXE 9 IoCs
  • UPX packed file 19 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 10 IoCs
  • JavaScript code in executable 19 IoCs
  • Drops file in Windows directory 10 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c4b4b072f43bd4eece79bf1db74b26a859dc1f873389a3828e39b1bc207f7f8b.exe
    "C:\Users\Admin\AppData\Local\Temp\c4b4b072f43bd4eece79bf1db74b26a859dc1f873389a3828e39b1bc207f7f8b.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1320
    • C:\Windows\System\WkKdvsc.exe
      C:\Windows\System\WkKdvsc.exe
      2⤵
      • Executes dropped EXE
      PID:2008
    • C:\Windows\System\FHDCXPe.exe
      C:\Windows\System\FHDCXPe.exe
      2⤵
      • Executes dropped EXE
      PID:1364
    • C:\Windows\System\JPSKfTO.exe
      C:\Windows\System\JPSKfTO.exe
      2⤵
      • Executes dropped EXE
      PID:2036
    • C:\Windows\System\fyyUQIs.exe
      C:\Windows\System\fyyUQIs.exe
      2⤵
      • Executes dropped EXE
      PID:1988
    • C:\Windows\System\lDcuepA.exe
      C:\Windows\System\lDcuepA.exe
      2⤵
      • Executes dropped EXE
      PID:1984
    • C:\Windows\System\OpYwlsR.exe
      C:\Windows\System\OpYwlsR.exe
      2⤵
      • Executes dropped EXE
      PID:652
    • C:\Windows\System\oXgzGmu.exe
      C:\Windows\System\oXgzGmu.exe
      2⤵
      • Executes dropped EXE
      PID:528
    • C:\Windows\System\yWBqRlD.exe
      C:\Windows\System\yWBqRlD.exe
      2⤵
      • Executes dropped EXE
      PID:912
    • C:\Windows\System\XWPMQia.exe
      C:\Windows\System\XWPMQia.exe
      2⤵
      • Executes dropped EXE
      PID:556
    • C:\Windows\System\QxECfYt.exe
      C:\Windows\System\QxECfYt.exe
      2⤵
        PID:1104

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads