Overview
overview
10Static
static
????-???/....??.exe
windows7_x64
1????-???/....??.exe
windows10-2004_x64
1????-???/....ip.exe
windows7_x64
1????-???/....ip.exe
windows10-2004_x64
1????-???/....og.exe
windows7_x64
10????-???/....og.exe
windows10-2004_x64
10????-???/?...cx.lnk
windows7_x64
10????-???/?...cx.lnk
windows10-2004_x64
10Analysis
-
max time kernel
133s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
04-07-2022 09:15
Static task
static1
Behavioral task
behavioral1
Sample
????-???/.__MACOS__/.__MACOS__/.__MACOS__/.__MACOS1__/360zip - ??.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
????-???/.__MACOS__/.__MACOS__/.__MACOS__/.__MACOS1__/360zip - ??.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
????-???/.__MACOS__/.__MACOS__/.__MACOS__/.__MACOS1__/360zip.exe
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
????-???/.__MACOS__/.__MACOS__/.__MACOS__/.__MACOS1__/360zip.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
????-???/.__MACOS__/.__MACOS__/.__MACOS__/.__MACOS1__/log.exe
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
????-???/.__MACOS__/.__MACOS__/.__MACOS__/.__MACOS1__/log.exe
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
????-???/????-???.docx.lnk
Resource
win7-20220414-en
Behavioral task
behavioral8
Sample
????-???/????-???.docx.lnk
Resource
win10v2004-20220414-en
General
-
Target
????-???/.__MACOS__/.__MACOS__/.__MACOS__/.__MACOS1__/log.exe
-
Size
505KB
-
MD5
436d65dee871c0f6dcf26838f765e294
-
SHA1
d0c6cc73ce53bbf0b4e7710eba3dd149848ce5df
-
SHA256
fc7410750834f8bc3fa62f244ff4af4ebf2dd4b365ec288e40289f4d2ea8aea0
-
SHA512
9199419db522e8e1d5ac4eeb9c59aa34e6d68edf11123689b0aae1bd330c5fc62a3d13d3c86ef8abaccdd0379fa52a7ed24886aecc239b273ad199077008d39f
Malware Config
Extracted
cobaltstrike
1234567890
http://iqiyiv101.gslb.c.cdnhwc2.com:80/audiencemanager.js
-
access_type
512
-
host
iqiyiv101.gslb.c.cdnhwc2.com,/audiencemanager.js
-
http_header1
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
-
http_header2
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
-
http_method1
GET
-
http_method2
POST
-
jitter
9472
-
polling_time
30000
-
port_number
80
-
sc_process32
%windir%\syswow64\runonce.exe
-
sc_process64
%windir%\sysnative\runonce.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCpqQ7Mn7l+ao5tHedYx56Hknzc/ning7Hw8Hyyx5LFalgrfQ7/aTC2oBLeXtXXjtFXB/TSxg2r/eQH7NgRv3Uzt6Uyw/DA9kdZgeQAWi3AxWYi45PpNCX0BavPZmCa9kO9F9Iev5bkRvtj2QcOGGhTZy3JkHToQA2EUQIHMO4QFwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
1.435374848e+09
-
unknown2
AAAABAAAAAEAAAf+AAAAAgAAIUwAAAACAAAPtQAAAA0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/audiencemanager-v2.js
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4044.62 Safari/537.36
-
watermark
1234567890
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3508-130-0x0000023DDA630000-0x0000023DDA671000-memory.dmpFilesize
260KB