Analysis
-
max time kernel
121s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
12-11-2020 10:45
Static task
static1
Behavioral task
behavioral1
Sample
40e85653abe687ddfd95b67a5f5dd452.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
40e85653abe687ddfd95b67a5f5dd452.exe
Resource
win10v20201028
General
-
Target
40e85653abe687ddfd95b67a5f5dd452.exe
-
Size
403KB
-
MD5
40e85653abe687ddfd95b67a5f5dd452
-
SHA1
76eccc09ca37441e3f2b85e1bdeedaf33d434f1e
-
SHA256
5d788fe9005c1db5c67e38ec338c023856c8d71f20e137020fbc292e216d3997
-
SHA512
78641bfcf5d56f657a4d758807077563b8a80ed1fa6bdbfac65454b2a721474ef3813e189ac1c2a0091cc79bf3ed44252e31f8216598db4cb2c0503171b4be57
Malware Config
Extracted
cobaltstrike
http://Uw0soheevahjahsaifae.glowtrow.fun:443/image/
http://bah1tuquaizia9eu3Ume.glowtrow.site:443/created/
http://seudaize6io3Go0quahC.cleans.space:443/static/
-
access_type
0
-
beacon_type
0
-
create_remote_thread
0
-
day
0
-
dns_idle
0
-
dns_sleep
0
- host
- http_header1
- http_header2
- http_method1
- http_method2
- injection_process
-
jitter
0
-
maxdns
0
-
month
0
- pipe_name
-
polling_time
0
-
port_number
0
- proxy_password
- proxy_server
- proxy_username
- sc_process32
- sc_process64
- state_machine
-
unknown1
0
- unknown2
-
unknown3
0
-
unknown4
0
-
unknown5
0
- uri
- user_agent
-
year
0
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
40e85653abe687ddfd95b67a5f5dd452.exedescription pid process target process PID 656 set thread context of 1840 656 40e85653abe687ddfd95b67a5f5dd452.exe mstsc.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3120 timeout.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
40e85653abe687ddfd95b67a5f5dd452.execmd.exedescription pid process target process PID 656 wrote to memory of 1840 656 40e85653abe687ddfd95b67a5f5dd452.exe mstsc.exe PID 656 wrote to memory of 1840 656 40e85653abe687ddfd95b67a5f5dd452.exe mstsc.exe PID 656 wrote to memory of 1840 656 40e85653abe687ddfd95b67a5f5dd452.exe mstsc.exe PID 656 wrote to memory of 2360 656 40e85653abe687ddfd95b67a5f5dd452.exe cmd.exe PID 656 wrote to memory of 2360 656 40e85653abe687ddfd95b67a5f5dd452.exe cmd.exe PID 2360 wrote to memory of 3120 2360 cmd.exe timeout.exe PID 2360 wrote to memory of 3120 2360 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\40e85653abe687ddfd95b67a5f5dd452.exe"C:\Users\Admin\AppData\Local\Temp\40e85653abe687ddfd95b67a5f5dd452.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\system32\mstsc.exeC:\Windows\system32\mstsc.exe2⤵PID:1840
-
C:\Windows\SYSTEM32\cmd.execmd.exe /C timeout 120 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\40e85653abe687ddfd95b67a5f5dd452.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\system32\timeout.exetimeout 1203⤵
- Delays execution with timeout.exe
PID:3120