Analysis

  • max time kernel
    136s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    03-07-2022 02:34

General

  • Target

    1.exe

  • Size

    545KB

  • MD5

    30d90a6fdb0f3f470579cc0e3e1d36fa

  • SHA1

    fa4c52785712d11db6eb7a45ab2bd4eed2c12c3d

  • SHA256

    4f5c8b187e20ed826c9e16ace0333b554d8345f97cd57cb4778d10915c059443

  • SHA512

    bd50b9a087b528c16c4d753f1c0dd54c1ecd42ff191f3e055a05fc9b8be685ff98cdc2fdfd8c6e3dc707709cf71b103e9894faf3e274de137528d98800877039

Malware Config

Signatures

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • suricata: ET MALWARE Cobalt Strike Malleable C2 JQuery Custom Profile Response

    suricata: ET MALWARE Cobalt Strike Malleable C2 JQuery Custom Profile Response

  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1.exe
    "C:\Users\Admin\AppData\Local\Temp\1.exe"
    1⤵
    • Modifies system certificate store
    PID:1156

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1156-54-0x0000000000330000-0x0000000000371000-memory.dmp
    Filesize

    260KB

  • memory/1156-55-0x0000000001BD0000-0x0000000001C1F000-memory.dmp
    Filesize

    316KB

  • memory/1156-56-0x000007FEFBCB1000-0x000007FEFBCB3000-memory.dmp
    Filesize

    8KB

  • memory/1156-57-0x0000000001BD0000-0x0000000001C1F000-memory.dmp
    Filesize

    316KB