Resubmissions

14-10-2021 07:01

211014-htblfsgch6 10

14-10-2021 05:37

211014-gbl4ssgbek 10

14-10-2021 05:29

211014-f6kzjsgcd4 1

14-10-2021 05:27

211014-f5j1vsgbdp 1

Analysis

  • max time kernel
    297s
  • max time network
    296s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    14-10-2021 05:37

General

  • Target

    TitanAgent.exe

  • Size

    311KB

  • MD5

    cdaecb1f71c7d668da3c038c4b7f6686

  • SHA1

    f14c7735bc0d15fe93a45c92c689aa19fa93cd02

  • SHA256

    783c2cb7e92a24e1696e5dfd1acc24a0f344b2fd3821e34601a0004fc76334af

  • SHA512

    1748133d4973511a290acac6b4de4d67075bab5d094c11371b4def989c5d304070c006a29d0dd627840bc2ae8442897eae280ba0b31df68028aa62c482eb34c0

Malware Config

Extracted

Family

cobaltstrike

C2

http://jquery.updataxml.ga:443/jquery-3.3.2.slim.min.js

Attributes
  • user_agent

    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Host: jquery.updataxml.ga Referer: https://jquery.code.com/ Accept-Encoding: gzip, deflate User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 Chrome/74 Safari/537.36

Extracted

Family

cobaltstrike

Botnet

1359593325

C2

http://jquery.updataxml.ga:443/jquery-3.3.1.min.js

Attributes
  • access_type

    512

  • beacon_type

    2048

  • host

    jquery.updataxml.ga,/jquery-3.3.1.min.js

  • http_header1

    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

  • http_header2

    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

  • http_method1

    GET

  • http_method2

    POST

  • jitter

    9472

  • polling_time

    45000

  • port_number

    443

  • sc_process32

    %windir%\syswow64\dllhost.exe

  • sc_process64

    %windir%\sysnative\dllhost.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC3nxxmYlEybvTcM3d2w/QKNy6os0L51P2BhpPYnK+k20wcQkbHChYrWciLBeBh+aLgbuSyXLE0IsoDKGLsQUZ+cWJQAr7EMK0DqpMv2EYJ8SU1n7uZWqLWyDnYqrXGJ/aQxfWyjVwaGWlsINFusMJdJmfQPxZFEa7vNh9ojyluRQIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4.234810624e+09

  • unknown2

    AAAABAAAAAEAAAXyAAAAAgAAAFQAAAACAAAPWwAAAA0AAAAPAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /jquery-3.3.2.min.js

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 Chrome/74 Safari/537.36

  • watermark

    1359593325

Signatures

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • suricata: ET MALWARE Cobalt Strike Malleable C2 JQuery Custom Profile Response

    suricata: ET MALWARE Cobalt Strike Malleable C2 JQuery Custom Profile Response

  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TitanAgent.exe
    "C:\Users\Admin\AppData\Local\Temp\TitanAgent.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2416
  • \??\c:\windows\system32\svchost.exe
    c:\windows\system32\svchost.exe -k localservice -s fdPHost
    1⤵
      PID:4036
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:2872
      • C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe
        "PowerShell.exe" -noexit -command Set-Location -literalPath 'C:\Users\Admin\AppData\Local\Temp'
        1⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2692
        • C:\Users\Admin\AppData\Local\Temp\TitanAgent.exe
          "C:\Users\Admin\AppData\Local\Temp\TitanAgent.exe" qaxnb
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1136

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1136-163-0x0000000000000000-mapping.dmp
      • memory/1136-167-0x00000173E0A20000-0x00000173E0E20000-memory.dmp
        Filesize

        4.0MB

      • memory/1136-166-0x00000173E0E20000-0x00000173E1292000-memory.dmp
        Filesize

        4.4MB

      • memory/1136-165-0x00000173E0E20000-0x00000173E1292000-memory.dmp
        Filesize

        4.4MB

      • memory/1136-164-0x00000173DEB30000-0x00000173DEB31000-memory.dmp
        Filesize

        4KB

      • memory/2692-136-0x000001E67ED30000-0x000001E67ED31000-memory.dmp
        Filesize

        4KB

      • memory/2692-121-0x000001E67CC80000-0x000001E67CC82000-memory.dmp
        Filesize

        8KB

      • memory/2692-122-0x000001E67CC80000-0x000001E67CC82000-memory.dmp
        Filesize

        8KB

      • memory/2692-115-0x000001E67CC80000-0x000001E67CC82000-memory.dmp
        Filesize

        8KB

      • memory/2692-137-0x000001E67EBE0000-0x000001E67EBE2000-memory.dmp
        Filesize

        8KB

      • memory/2692-138-0x000001E67EBE3000-0x000001E67EBE5000-memory.dmp
        Filesize

        8KB

      • memory/2692-149-0x000001E67F280000-0x000001E67F281000-memory.dmp
        Filesize

        4KB

      • memory/2692-158-0x000001E67ECF0000-0x000001E67ECF1000-memory.dmp
        Filesize

        4KB

      • memory/2692-120-0x000001E67CC80000-0x000001E67CC82000-memory.dmp
        Filesize

        8KB

      • memory/2692-119-0x000001E67EA40000-0x000001E67EA41000-memory.dmp
        Filesize

        4KB

      • memory/2692-118-0x000001E67CC80000-0x000001E67CC82000-memory.dmp
        Filesize

        8KB

      • memory/2692-117-0x000001E67CC80000-0x000001E67CC82000-memory.dmp
        Filesize

        8KB

      • memory/2692-116-0x000001E67CC80000-0x000001E67CC82000-memory.dmp
        Filesize

        8KB