Analysis
-
max time kernel
1802s -
max time network
1799s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
07-12-2021 18:30
Static task
static1
Behavioral task
behavioral1
Sample
wegfkfffeovy.exe
Resource
win10-en-20211104
General
-
Target
wegfkfffeovy.exe
-
Size
922KB
-
MD5
63ab5d17585a8734d643324e2a8fa90e
-
SHA1
a02e0dbcfb20c3f5f2e8965f6b4dbe31928bee7b
-
SHA256
5b5fa30bf12f13f881708222824517d662f410b212a0f7f7ce5c611fd809f809
-
SHA512
cfff2a8f4fa6eb0f775c266c0ef3bc1b7b85f9b905e01a997c092264665b1fd576250c6aa94b77278a26e15c29a039d4f0d2885b280383be77d77b8a4e2717f2
Malware Config
Extracted
cobaltstrike
0
http://lartmana.com:443/jquery-3.3.1.min.js
-
access_type
512
-
beacon_type
2048
-
host
lartmana.com,/jquery-3.3.1.min.js
-
http_header1
AAAACgAAAEdBY2NlcHQ6IHRleHQvaHRtbCxhcHBsaWNhdGlvbi94aHRtbCt4bWwsYXBwbGljYXRpb24veG1sO3E9MC45LCovKjtxPTAuOAAAAAoAAAAgUmVmZXJlcjogaHR0cDovL2NvZGUuanF1ZXJ5LmNvbS8AAAAKAAAAHkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQAAAAcAAAAAAAAADQAAAAIAAAAJX19jZmR1aWQ9AAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
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
-
http_method1
GET
-
http_method2
POST
-
jitter
2560
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\dllhost.exe
-
sc_process64
%windir%\sysnative\dllhost.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCbcI0B4jpE0I6Ioj0qYRjoDYlN52X78HX2BZ1bBLV60oOeXcvOGi7Rxcz/n0luXqmSpsw9M4x0dnUWFYPL2HUxzufEfchGPyxEnH6ASasVbS0OWqIkUsuri/5vJUvisrcKT9Ebodon8Z2AUqOaZZ8s37VUxJhSm4IxsLJ6WRgFkwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4.234810624e+09
-
unknown2
AAAABAAAAAEAAAXyAAAAAgAAAFQAAAACAAAPWwAAAA0AAAAPAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/jquery-3.3.2.min.js
-
user_agent
Mozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like Gecko
-
watermark
0
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Drops file in Windows directory 2 IoCs
Processes:
taskmgr.exedescription ioc process File created C:\Windows\rescache\_merged\4183903823\1195458082.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\3068621934.pri taskmgr.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskmgr.exepid process 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskmgr.exepid process 2376 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
taskmgr.exedescription pid process Token: SeDebugPrivilege 2376 taskmgr.exe Token: SeSystemProfilePrivilege 2376 taskmgr.exe Token: SeCreateGlobalPrivilege 2376 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exepid process 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid process 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe 2376 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\wegfkfffeovy.exe"C:\Users\Admin\AppData\Local\Temp\wegfkfffeovy.exe"1⤵PID:3720
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2376