Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2022 23:30
Static task
static1
Behavioral task
behavioral1
Sample
fbbff9ab15b2fb7b5e2e5cfaf35810edd492df9448ca0d55a74b830724201543.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fbbff9ab15b2fb7b5e2e5cfaf35810edd492df9448ca0d55a74b830724201543.exe
Resource
win10v2004-20220812-en
General
-
Target
fbbff9ab15b2fb7b5e2e5cfaf35810edd492df9448ca0d55a74b830724201543.exe
-
Size
156KB
-
MD5
467941e3cb0b3e1c379eb8ee10f57947
-
SHA1
9a9a7a9bde0ca1f9f3cab121369d2473e817a03e
-
SHA256
fbbff9ab15b2fb7b5e2e5cfaf35810edd492df9448ca0d55a74b830724201543
-
SHA512
437cac30faf4dbbc98d72d804c11ef6289fb3145aefd91f393aa7a41579e1f5be2c87b3b43d142c140561d9af8ce1983ffa6979f84e56fae56d2a376c37efb24
-
SSDEEP
3072:0s3yXdU7kClJgOEA6YbnVfyE1UirnmcOlq98VGScKtA1Jmtw3ff:0jeVEA6YhfRUq9SGScKsJV3
Malware Config
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Executes dropped EXE 1 IoCs
pid Process 220 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\svchost.exe" cvtres.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4624 set thread context of 4780 4624 fbbff9ab15b2fb7b5e2e5cfaf35810edd492df9448ca0d55a74b830724201543.exe 82 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4780 cvtres.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4624 wrote to memory of 4780 4624 fbbff9ab15b2fb7b5e2e5cfaf35810edd492df9448ca0d55a74b830724201543.exe 82 PID 4624 wrote to memory of 4780 4624 fbbff9ab15b2fb7b5e2e5cfaf35810edd492df9448ca0d55a74b830724201543.exe 82 PID 4624 wrote to memory of 4780 4624 fbbff9ab15b2fb7b5e2e5cfaf35810edd492df9448ca0d55a74b830724201543.exe 82 PID 4624 wrote to memory of 4780 4624 fbbff9ab15b2fb7b5e2e5cfaf35810edd492df9448ca0d55a74b830724201543.exe 82 PID 4624 wrote to memory of 4780 4624 fbbff9ab15b2fb7b5e2e5cfaf35810edd492df9448ca0d55a74b830724201543.exe 82 PID 4624 wrote to memory of 4780 4624 fbbff9ab15b2fb7b5e2e5cfaf35810edd492df9448ca0d55a74b830724201543.exe 82 PID 4624 wrote to memory of 4780 4624 fbbff9ab15b2fb7b5e2e5cfaf35810edd492df9448ca0d55a74b830724201543.exe 82 PID 4624 wrote to memory of 4780 4624 fbbff9ab15b2fb7b5e2e5cfaf35810edd492df9448ca0d55a74b830724201543.exe 82 PID 4624 wrote to memory of 4780 4624 fbbff9ab15b2fb7b5e2e5cfaf35810edd492df9448ca0d55a74b830724201543.exe 82 PID 4780 wrote to memory of 220 4780 cvtres.exe 90 PID 4780 wrote to memory of 220 4780 cvtres.exe 90 PID 4780 wrote to memory of 220 4780 cvtres.exe 90 PID 4780 wrote to memory of 348 4780 cvtres.exe 92 PID 4780 wrote to memory of 348 4780 cvtres.exe 92 PID 4780 wrote to memory of 348 4780 cvtres.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbbff9ab15b2fb7b5e2e5cfaf35810edd492df9448ca0d55a74b830724201543.exe"C:\Users\Admin\AppData\Local\Temp\fbbff9ab15b2fb7b5e2e5cfaf35810edd492df9448ca0d55a74b830724201543.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe2⤵
- Adds Run key to start application
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Roaming\WinHost\svchost.exe"C:\Users\Admin\AppData\Roaming\WinHost\svchost.exe"3⤵
- Executes dropped EXE
PID:220
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:348
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5e118330b4629b12368d91b9df6488be0
SHA1ce90218c7e3b90df2a3409ec253048bb6472c2fd
SHA2563a0f2936b8c45e8ba3458d69d7859a63844469e698652e15fb56639d32f40cc9
SHA512ac91c04cb20223dbaaf594440cb778dff36e857921be427c8528ba4c6cdb3e8bf8e71e1ae8af7bde9c04ff5b97b379231625bc1a2b66aba2f98cd340cd8a94b0
-
Filesize
34KB
MD5e118330b4629b12368d91b9df6488be0
SHA1ce90218c7e3b90df2a3409ec253048bb6472c2fd
SHA2563a0f2936b8c45e8ba3458d69d7859a63844469e698652e15fb56639d32f40cc9
SHA512ac91c04cb20223dbaaf594440cb778dff36e857921be427c8528ba4c6cdb3e8bf8e71e1ae8af7bde9c04ff5b97b379231625bc1a2b66aba2f98cd340cd8a94b0