Analysis
-
max time kernel
44s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
resource tags
arch:x64arch:x86image:win7-20220414-enlocale:en-usos:windows7-x64system -
submitted
16-07-2022 10:03
Behavioral task
behavioral1
Sample
cobalt2.ps1
Resource
win7-20220414-en
windows7-x64
4 signatures
60 seconds
Behavioral task
behavioral2
Sample
cobalt2.ps1
Resource
win10v2004-20220414-en
windows10-2004-x64
4 signatures
60 seconds
General
-
Target
cobalt2.ps1
-
Size
3KB
-
MD5
5816bf8947b292fd5837d340fae832d0
-
SHA1
030b8d8abf08be5d099d8a522d3011963fd84246
-
SHA256
b9dc6cb759631733b4911dff24e61a73d56e47e01d218c7f219b2811cb93e249
-
SHA512
3968e37b2156ffa1f02681d117719670084bf1444dd09e65d2da62ae8740b1c3d040cbbf0c05c6596e281d564ebb0d392e64b644482ef49764abd7b85fd87370
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 4 1004 powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepowershell.exepid process 1452 powershell.exe 1004 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1452 powershell.exe Token: SeDebugPrivilege 1004 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
powershell.exedescription pid process target process PID 1452 wrote to memory of 1004 1452 powershell.exe powershell.exe PID 1452 wrote to memory of 1004 1452 powershell.exe powershell.exe PID 1452 wrote to memory of 1004 1452 powershell.exe powershell.exe PID 1452 wrote to memory of 1004 1452 powershell.exe powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\cobalt2.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1452 -
\??\c:\windows\syswow64\windowspowershell\v1.0\powershell.exe"c:\windows\syswow64\windowspowershell\v1.0\powershell.exe" -s -NoLogo -NoProfile2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1004