Analysis

  • max time kernel
    17s
  • max time network
    102s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    11-11-2020 10:51

General

  • Target

    39f710e9b910828fc0297e75e542e295e9421a5133d6f663c930cef9d1024a85.dll

  • Size

    206KB

  • MD5

    dd46c5fd32f4576d9575b79797c64c45

  • SHA1

    3b6b6ce3118fc4db4815d0c6b8c4f66d46ea2e25

  • SHA256

    39f710e9b910828fc0297e75e542e295e9421a5133d6f663c930cef9d1024a85

  • SHA512

    dec68404f985337d8d2f77c871beb2afb6239f521d91af1681cd5453ee9e9cc72fe8c7b63ff2b812abd5666801ccb0c98bea0384344e85646a4020515621aaf6

Malware Config

Signatures

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\39f710e9b910828fc0297e75e542e295e9421a5133d6f663c930cef9d1024a85.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4756
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\39f710e9b910828fc0297e75e542e295e9421a5133d6f663c930cef9d1024a85.dll,#1
      2⤵
        PID:4816
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4816 -s 660
          3⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3080

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3080-1-0x0000000004370000-0x0000000004371000-memory.dmp

      Filesize

      4KB

    • memory/3080-6-0x0000000004A00000-0x0000000004A01000-memory.dmp

      Filesize

      4KB

    • memory/4816-0-0x0000000000000000-mapping.dmp

    • memory/4816-2-0x0000000000000000-mapping.dmp

    • memory/4816-3-0x0000000000000000-mapping.dmp

    • memory/4816-4-0x0000000000000000-mapping.dmp

    • memory/4816-5-0x0000000000000000-mapping.dmp