Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
29-12-2021 21:26
Static task
static1
Behavioral task
behavioral1
Sample
fb8acf77891e1897c9dcab222d5a9424e1fd4eb0273e0def4e2872bd870c9901.exe
Resource
win10-en-20211208
General
-
Target
fb8acf77891e1897c9dcab222d5a9424e1fd4eb0273e0def4e2872bd870c9901.exe
-
Size
278KB
-
MD5
a1d9d2b9440b1a33370302895edbf43b
-
SHA1
fce98aa07b88962d4768679b6dcc229e9df42233
-
SHA256
fb8acf77891e1897c9dcab222d5a9424e1fd4eb0273e0def4e2872bd870c9901
-
SHA512
9821d377b0c57a46ead06b2c2e90c66f21fdf315146a57161bae8116208c9ace35d5651398950be32b6d8bf68d99be42c26cffda6e17a8710cd7e41948ca0b6b
Malware Config
Extracted
cobaltstrike
0
-
beacon_type
1024
-
host
0.0.0.0
-
http_header1
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
http_header2
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
polling_time
10000
-
port_number
443
-
sc_process32
%windir%\syswow64\rundll32.exe
-
sc_process64
%windir%\sysnative\rundll32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCnOM3nXx+7HBhkbDd+AwFrFisSunK999w2tM0uTpuuEiBalcJhcL+QgQWtf6S7zPp5hjImG+2YcPl18geU4f5JlSPXHwilbK4DFb/ePWyKFjhrA7emVRqhM21QMlo1ANsn14rY/RO2pzuft8P7TXoIjjI/B2GGVuzYNZX6X4I2EwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
4096
-
unknown2
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
watermark
0
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 800 3672 WerFault.exe fb8acf77891e1897c9dcab222d5a9424e1fd4eb0273e0def4e2872bd870c9901.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
WerFault.exepid process 800 WerFault.exe 800 WerFault.exe 800 WerFault.exe 800 WerFault.exe 800 WerFault.exe 800 WerFault.exe 800 WerFault.exe 800 WerFault.exe 800 WerFault.exe 800 WerFault.exe 800 WerFault.exe 800 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 800 WerFault.exe Token: SeBackupPrivilege 800 WerFault.exe Token: SeDebugPrivilege 800 WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb8acf77891e1897c9dcab222d5a9424e1fd4eb0273e0def4e2872bd870c9901.exe"C:\Users\Admin\AppData\Local\Temp\fb8acf77891e1897c9dcab222d5a9424e1fd4eb0273e0def4e2872bd870c9901.exe"1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 5642⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken