Analysis
-
max time kernel
6s -
max time network
11s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
15-11-2020 23:14
Static task
static1
Behavioral task
behavioral1
Sample
20cd8e26e41706c53fa0ffab1895da412a8d61d68d78640c1ed9595421ca0b03.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
20cd8e26e41706c53fa0ffab1895da412a8d61d68d78640c1ed9595421ca0b03.dll
Resource
win10v20201028
General
-
Target
20cd8e26e41706c53fa0ffab1895da412a8d61d68d78640c1ed9595421ca0b03.dll
-
Size
244KB
-
MD5
a1c09fa446adaf65195142a7191541ed
-
SHA1
6e0371850cf1bb2e60f4f053262d9d97abbac3fc
-
SHA256
20cd8e26e41706c53fa0ffab1895da412a8d61d68d78640c1ed9595421ca0b03
-
SHA512
d54cc22b82e27a7ead439f4b288d64516fd2267d2bd297cfbd031d35eb07205728897b705bf40c6a17d1f2b3a6f33c32952d77d59f5f9880bd0e4d127b9ae7e4
Malware Config
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1904 1932 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
WerFault.exepid process 1904 WerFault.exe 1904 WerFault.exe 1904 WerFault.exe 1904 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 1904 WerFault.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 748 wrote to memory of 1932 748 rundll32.exe rundll32.exe PID 748 wrote to memory of 1932 748 rundll32.exe rundll32.exe PID 748 wrote to memory of 1932 748 rundll32.exe rundll32.exe PID 748 wrote to memory of 1932 748 rundll32.exe rundll32.exe PID 748 wrote to memory of 1932 748 rundll32.exe rundll32.exe PID 748 wrote to memory of 1932 748 rundll32.exe rundll32.exe PID 748 wrote to memory of 1932 748 rundll32.exe rundll32.exe PID 1932 wrote to memory of 1904 1932 rundll32.exe WerFault.exe PID 1932 wrote to memory of 1904 1932 rundll32.exe WerFault.exe PID 1932 wrote to memory of 1904 1932 rundll32.exe WerFault.exe PID 1932 wrote to memory of 1904 1932 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\20cd8e26e41706c53fa0ffab1895da412a8d61d68d78640c1ed9595421ca0b03.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\20cd8e26e41706c53fa0ffab1895da412a8d61d68d78640c1ed9595421ca0b03.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1932 -s 1963⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-