Analysis

  • max time kernel
    132s
  • max time network
    168s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    22-07-2021 11:52

General

  • Target

    87766b03bd60f023941fc02d8dc5c292136bc5e6e0805cac765929f45e61b90d.exe

  • Size

    2.1MB

  • MD5

    8d92d0894c3af0058365264f87117f93

  • SHA1

    7461ee6f37a82d477fed0b2ccf422b40b931d81f

  • SHA256

    87766b03bd60f023941fc02d8dc5c292136bc5e6e0805cac765929f45e61b90d

  • SHA512

    419b0942409a3b9188587659ab4d43513c60fcb4f8ff14d977ae44f3b84fd680dcaf86a1a629c1784f6661240c0bbca51e84393773d75572941b77b496079065

Malware Config

Extracted

Family

cobaltstrike

Botnet

305419776

C2

http://juniper-firmware.com:757/Forums

Attributes
  • access_type

    512

  • beacon_type

    2048

  • host

    juniper-firmware.com,/Forums

  • http_header1

    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

  • http_header2

    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

  • http_method1

    GET

  • http_method2

    POST

  • jitter

    10496

  • polling_time

    62865

  • port_number

    757

  • sc_process32

    %windir%\syswow64\WUAUCLT.exe

  • sc_process64

    %windir%\sysnative\WUAUCLT.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC5FZ8YTALyQMSGZc5Vfxil5f/Ku7QINtaLISbnqjNzojjsQA7WYlRTv2Y7z9QNHHq0iZPFsJo8rdvq7YRwJwlasO0+6Spc/K0QrF4jehlulPhlayBJAQJaAkmIVJt9U2yYlXF2goMxgACErQSCoQI2yRumYtKOPWEIpzYbM0WshwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    5.44480256e+08

  • unknown2

    AAAABAAAAAIAAAJYAAAAAwAAAA0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /lv

  • user_agent

    Mozilla/5.0 (Windows Phone 10.0; Android 6.0.1; Microsoft; RM-1152) AppleWebKit/537.36 (KHTML, like Gecko)

  • watermark

    305419776

Signatures

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • Modifies system certificate store 2 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\87766b03bd60f023941fc02d8dc5c292136bc5e6e0805cac765929f45e61b90d.exe
    "C:\Users\Admin\AppData\Local\Temp\87766b03bd60f023941fc02d8dc5c292136bc5e6e0805cac765929f45e61b90d.exe"
    1⤵
    • Modifies system certificate store
    PID:1832

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1832-59-0x0000000000400000-0x000000000044B000-memory.dmp
    Filesize

    300KB

  • memory/1832-60-0x00000000003C0000-0x00000000003C2000-memory.dmp
    Filesize

    8KB

  • memory/1832-61-0x0000000000850000-0x0000000000883000-memory.dmp
    Filesize

    204KB

  • memory/1832-62-0x00000000022E0000-0x0000000002368000-memory.dmp
    Filesize

    544KB

  • memory/1832-63-0x00000000762C1000-0x00000000762C3000-memory.dmp
    Filesize

    8KB

  • memory/1832-64-0x00000000022E0000-0x0000000002368000-memory.dmp
    Filesize

    544KB