Resubmissions
14-10-2021 07:01
211014-htblfsgch6 1014-10-2021 05:37
211014-gbl4ssgbek 1014-10-2021 05:29
211014-f6kzjsgcd4 114-10-2021 05:27
211014-f5j1vsgbdp 1Analysis
-
max time kernel
297s -
max time network
296s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
14-10-2021 05:37
Static task
static1
Behavioral task
behavioral1
Sample
TitanAgent.exe
Resource
win10-en-20210920
General
-
Target
TitanAgent.exe
-
Size
311KB
-
MD5
cdaecb1f71c7d668da3c038c4b7f6686
-
SHA1
f14c7735bc0d15fe93a45c92c689aa19fa93cd02
-
SHA256
783c2cb7e92a24e1696e5dfd1acc24a0f344b2fd3821e34601a0004fc76334af
-
SHA512
1748133d4973511a290acac6b4de4d67075bab5d094c11371b4def989c5d304070c006a29d0dd627840bc2ae8442897eae280ba0b31df68028aa62c482eb34c0
Malware Config
Extracted
cobaltstrike
http://jquery.updataxml.ga:443/jquery-3.3.2.slim.min.js
-
user_agent
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Host: jquery.updataxml.ga Referer: https://jquery.code.com/ Accept-Encoding: gzip, deflate User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 Chrome/74 Safari/537.36
Extracted
cobaltstrike
1359593325
http://jquery.updataxml.ga:443/jquery-3.3.1.min.js
-
access_type
512
-
beacon_type
2048
-
host
jquery.updataxml.ga,/jquery-3.3.1.min.js
-
http_header1
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
-
http_header2
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
-
http_method1
GET
-
http_method2
POST
-
jitter
9472
-
polling_time
45000
-
port_number
443
-
sc_process32
%windir%\syswow64\dllhost.exe
-
sc_process64
%windir%\sysnative\dllhost.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC3nxxmYlEybvTcM3d2w/QKNy6os0L51P2BhpPYnK+k20wcQkbHChYrWciLBeBh+aLgbuSyXLE0IsoDKGLsQUZ+cWJQAr7EMK0DqpMv2EYJ8SU1n7uZWqLWyDnYqrXGJ/aQxfWyjVwaGWlsINFusMJdJmfQPxZFEa7vNh9ojyluRQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4.234810624e+09
-
unknown2
AAAABAAAAAEAAAXyAAAAAgAAAFQAAAACAAAPWwAAAA0AAAAPAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/jquery-3.3.2.min.js
-
user_agent
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 Chrome/74 Safari/537.36
-
watermark
1359593325
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
suricata: ET MALWARE Cobalt Strike Malleable C2 JQuery Custom Profile Response
suricata: ET MALWARE Cobalt Strike Malleable C2 JQuery Custom Profile Response
-
Drops file in System32 directory 1 IoCs
Processes:
PowerShell.exedescription ioc process File opened for modification C:\Windows\System32\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk PowerShell.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
TitanAgent.exePowerShell.exeTitanAgent.exepid process 2416 TitanAgent.exe 2416 TitanAgent.exe 2692 PowerShell.exe 2692 PowerShell.exe 2692 PowerShell.exe 1136 TitanAgent.exe 1136 TitanAgent.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
PowerShell.exedescription pid process Token: SeDebugPrivilege 2692 PowerShell.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
PowerShell.exedescription pid process target process PID 2692 wrote to memory of 1136 2692 PowerShell.exe TitanAgent.exe PID 2692 wrote to memory of 1136 2692 PowerShell.exe TitanAgent.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\TitanAgent.exe"C:\Users\Admin\AppData\Local\Temp\TitanAgent.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s fdPHost1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe"PowerShell.exe" -noexit -command Set-Location -literalPath 'C:\Users\Admin\AppData\Local\Temp'1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\TitanAgent.exe"C:\Users\Admin\AppData\Local\Temp\TitanAgent.exe" qaxnb2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1136-163-0x0000000000000000-mapping.dmp
-
memory/1136-167-0x00000173E0A20000-0x00000173E0E20000-memory.dmpFilesize
4.0MB
-
memory/1136-166-0x00000173E0E20000-0x00000173E1292000-memory.dmpFilesize
4.4MB
-
memory/1136-165-0x00000173E0E20000-0x00000173E1292000-memory.dmpFilesize
4.4MB
-
memory/1136-164-0x00000173DEB30000-0x00000173DEB31000-memory.dmpFilesize
4KB
-
memory/2692-136-0x000001E67ED30000-0x000001E67ED31000-memory.dmpFilesize
4KB
-
memory/2692-121-0x000001E67CC80000-0x000001E67CC82000-memory.dmpFilesize
8KB
-
memory/2692-122-0x000001E67CC80000-0x000001E67CC82000-memory.dmpFilesize
8KB
-
memory/2692-115-0x000001E67CC80000-0x000001E67CC82000-memory.dmpFilesize
8KB
-
memory/2692-137-0x000001E67EBE0000-0x000001E67EBE2000-memory.dmpFilesize
8KB
-
memory/2692-138-0x000001E67EBE3000-0x000001E67EBE5000-memory.dmpFilesize
8KB
-
memory/2692-149-0x000001E67F280000-0x000001E67F281000-memory.dmpFilesize
4KB
-
memory/2692-158-0x000001E67ECF0000-0x000001E67ECF1000-memory.dmpFilesize
4KB
-
memory/2692-120-0x000001E67CC80000-0x000001E67CC82000-memory.dmpFilesize
8KB
-
memory/2692-119-0x000001E67EA40000-0x000001E67EA41000-memory.dmpFilesize
4KB
-
memory/2692-118-0x000001E67CC80000-0x000001E67CC82000-memory.dmpFilesize
8KB
-
memory/2692-117-0x000001E67CC80000-0x000001E67CC82000-memory.dmpFilesize
8KB
-
memory/2692-116-0x000001E67CC80000-0x000001E67CC82000-memory.dmpFilesize
8KB