Analysis
-
max time kernel
255s -
max time network
344s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
30-11-2022 22:33
Behavioral task
behavioral1
Sample
bb10b6fa2c0ea28096e9c2a9cbd95e393514faa9d743dd908d801336fad6dbb6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bb10b6fa2c0ea28096e9c2a9cbd95e393514faa9d743dd908d801336fad6dbb6.exe
Resource
win10v2004-20220812-en
General
-
Target
bb10b6fa2c0ea28096e9c2a9cbd95e393514faa9d743dd908d801336fad6dbb6.exe
-
Size
307KB
-
MD5
47d8ca10e1cc66584cbf1763c05ddf56
-
SHA1
0dbecf4a2eb2db2924c5ca0bac68d8bd62571d9e
-
SHA256
bb10b6fa2c0ea28096e9c2a9cbd95e393514faa9d743dd908d801336fad6dbb6
-
SHA512
9c63b7d624572e1595a805e62d32c7439c006679394012e712709f47ebc855b04c730d98b168cb0e501e8939368f137ad470c2a82df889704a1321c7afaf54de
-
SSDEEP
6144:mTfzqT72Y0SkzinYKTY1SQshfRPVQe1MZkIYSccr7wbstOhwPECYeixlYGicYl:mTre7SS3YsY1UMqMZJYSN7wbstOq8fv2
Malware Config
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Executes dropped EXE 1 IoCs
Processes:
ishauk.exepid process 904 ishauk.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 772 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
bb10b6fa2c0ea28096e9c2a9cbd95e393514faa9d743dd908d801336fad6dbb6.exepid process 1476 bb10b6fa2c0ea28096e9c2a9cbd95e393514faa9d743dd908d801336fad6dbb6.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ishauk.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\Currentversion\Run ishauk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\{E8A35E48-3774-AD4D-52EE-D422474DF73F} = "C:\\Users\\Admin\\AppData\\Roaming\\Bofe\\ishauk.exe" ishauk.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
bb10b6fa2c0ea28096e9c2a9cbd95e393514faa9d743dd908d801336fad6dbb6.exedescription pid process target process PID 1476 set thread context of 772 1476 bb10b6fa2c0ea28096e9c2a9cbd95e393514faa9d743dd908d801336fad6dbb6.exe cmd.exe -
Processes:
bb10b6fa2c0ea28096e9c2a9cbd95e393514faa9d743dd908d801336fad6dbb6.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Privacy bb10b6fa2c0ea28096e9c2a9cbd95e393514faa9d743dd908d801336fad6dbb6.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" bb10b6fa2c0ea28096e9c2a9cbd95e393514faa9d743dd908d801336fad6dbb6.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
ishauk.exepid process 904 ishauk.exe 904 ishauk.exe 904 ishauk.exe 904 ishauk.exe 904 ishauk.exe 904 ishauk.exe 904 ishauk.exe 904 ishauk.exe 904 ishauk.exe 904 ishauk.exe 904 ishauk.exe 904 ishauk.exe 904 ishauk.exe 904 ishauk.exe 904 ishauk.exe 904 ishauk.exe 904 ishauk.exe 904 ishauk.exe 904 ishauk.exe 904 ishauk.exe 904 ishauk.exe 904 ishauk.exe 904 ishauk.exe 904 ishauk.exe 904 ishauk.exe 904 ishauk.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
bb10b6fa2c0ea28096e9c2a9cbd95e393514faa9d743dd908d801336fad6dbb6.exeishauk.exedescription pid process target process PID 1476 wrote to memory of 904 1476 bb10b6fa2c0ea28096e9c2a9cbd95e393514faa9d743dd908d801336fad6dbb6.exe ishauk.exe PID 1476 wrote to memory of 904 1476 bb10b6fa2c0ea28096e9c2a9cbd95e393514faa9d743dd908d801336fad6dbb6.exe ishauk.exe PID 1476 wrote to memory of 904 1476 bb10b6fa2c0ea28096e9c2a9cbd95e393514faa9d743dd908d801336fad6dbb6.exe ishauk.exe PID 1476 wrote to memory of 904 1476 bb10b6fa2c0ea28096e9c2a9cbd95e393514faa9d743dd908d801336fad6dbb6.exe ishauk.exe PID 904 wrote to memory of 1132 904 ishauk.exe taskhost.exe PID 904 wrote to memory of 1132 904 ishauk.exe taskhost.exe PID 904 wrote to memory of 1132 904 ishauk.exe taskhost.exe PID 904 wrote to memory of 1132 904 ishauk.exe taskhost.exe PID 904 wrote to memory of 1132 904 ishauk.exe taskhost.exe PID 904 wrote to memory of 1192 904 ishauk.exe Dwm.exe PID 904 wrote to memory of 1192 904 ishauk.exe Dwm.exe PID 904 wrote to memory of 1192 904 ishauk.exe Dwm.exe PID 904 wrote to memory of 1192 904 ishauk.exe Dwm.exe PID 904 wrote to memory of 1192 904 ishauk.exe Dwm.exe PID 904 wrote to memory of 1260 904 ishauk.exe Explorer.EXE PID 904 wrote to memory of 1260 904 ishauk.exe Explorer.EXE PID 904 wrote to memory of 1260 904 ishauk.exe Explorer.EXE PID 904 wrote to memory of 1260 904 ishauk.exe Explorer.EXE PID 904 wrote to memory of 1260 904 ishauk.exe Explorer.EXE PID 904 wrote to memory of 1476 904 ishauk.exe bb10b6fa2c0ea28096e9c2a9cbd95e393514faa9d743dd908d801336fad6dbb6.exe PID 904 wrote to memory of 1476 904 ishauk.exe bb10b6fa2c0ea28096e9c2a9cbd95e393514faa9d743dd908d801336fad6dbb6.exe PID 904 wrote to memory of 1476 904 ishauk.exe bb10b6fa2c0ea28096e9c2a9cbd95e393514faa9d743dd908d801336fad6dbb6.exe PID 904 wrote to memory of 1476 904 ishauk.exe bb10b6fa2c0ea28096e9c2a9cbd95e393514faa9d743dd908d801336fad6dbb6.exe PID 904 wrote to memory of 1476 904 ishauk.exe bb10b6fa2c0ea28096e9c2a9cbd95e393514faa9d743dd908d801336fad6dbb6.exe PID 1476 wrote to memory of 772 1476 bb10b6fa2c0ea28096e9c2a9cbd95e393514faa9d743dd908d801336fad6dbb6.exe cmd.exe PID 1476 wrote to memory of 772 1476 bb10b6fa2c0ea28096e9c2a9cbd95e393514faa9d743dd908d801336fad6dbb6.exe cmd.exe PID 1476 wrote to memory of 772 1476 bb10b6fa2c0ea28096e9c2a9cbd95e393514faa9d743dd908d801336fad6dbb6.exe cmd.exe PID 1476 wrote to memory of 772 1476 bb10b6fa2c0ea28096e9c2a9cbd95e393514faa9d743dd908d801336fad6dbb6.exe cmd.exe PID 1476 wrote to memory of 772 1476 bb10b6fa2c0ea28096e9c2a9cbd95e393514faa9d743dd908d801336fad6dbb6.exe cmd.exe PID 1476 wrote to memory of 772 1476 bb10b6fa2c0ea28096e9c2a9cbd95e393514faa9d743dd908d801336fad6dbb6.exe cmd.exe PID 1476 wrote to memory of 772 1476 bb10b6fa2c0ea28096e9c2a9cbd95e393514faa9d743dd908d801336fad6dbb6.exe cmd.exe PID 1476 wrote to memory of 772 1476 bb10b6fa2c0ea28096e9c2a9cbd95e393514faa9d743dd908d801336fad6dbb6.exe cmd.exe PID 1476 wrote to memory of 772 1476 bb10b6fa2c0ea28096e9c2a9cbd95e393514faa9d743dd908d801336fad6dbb6.exe cmd.exe PID 904 wrote to memory of 1952 904 ishauk.exe conhost.exe PID 904 wrote to memory of 1952 904 ishauk.exe conhost.exe PID 904 wrote to memory of 1952 904 ishauk.exe conhost.exe PID 904 wrote to memory of 1952 904 ishauk.exe conhost.exe PID 904 wrote to memory of 1952 904 ishauk.exe conhost.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\bb10b6fa2c0ea28096e9c2a9cbd95e393514faa9d743dd908d801336fad6dbb6.exe"C:\Users\Admin\AppData\Local\Temp\bb10b6fa2c0ea28096e9c2a9cbd95e393514faa9d743dd908d801336fad6dbb6.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Bofe\ishauk.exe"C:\Users\Admin\AppData\Roaming\Bofe\ishauk.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp9ef09ff8.bat"3⤵
- Deletes itself
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "18384591207301281711714364056707320209-470974169-638785921831421913-903701249"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\kyevu.liyFilesize
466B
MD55bc64b4ed16ab6425c1cd36e75e1589c
SHA17213eae36dacd605da817c1b8139962468a38b0c
SHA256891341ea058a6054b96640df9d253187160490844803c20e20d95b83a7819b3c
SHA512d898d2f28338ebb191be110a0dde61296b05a284007dee7df55074f47cce9cd846f9c8c77cfbbd6ff68acef708ec14a1f72cc8524cd2137027644ded0248f4f6
-
C:\Users\Admin\AppData\Local\Temp\tmp9ef09ff8.batFilesize
307B
MD5d572ed2d0717f6a418ee06ffa092b446
SHA1ec5cb1b5c2ba35d977e7af546cff4bbaa027834f
SHA2568ba23a0cd525d1bd6df9edf4c6e39da0dc8be140bae5f5c62775c3dc4ac621a9
SHA512c752d8480d177e0cc124f5c04e2e52cd0660908575aa9d0dd0b1b554bd7e4b9595ff2118bf24df0230f33802ba3de9356149157f1b8cdc9ef26319874f0ddd23
-
C:\Users\Admin\AppData\Roaming\Bofe\ishauk.exeFilesize
307KB
MD555d4bd34bc1df6cb528be542e461baba
SHA1c2c77130c37f26fa71851aa743084d02773d00e3
SHA256220fd0c25130b342108ce7d5a74fbefd13ebe65d3a18f4f659e5014260ceab9a
SHA51253da9c358d7d944d9829cfaf88b693e6b729aa8bfd561777fdcefabd7b8f36a12b8e568c57a67ae0497b89fc14d9c18737faa3b427a918a95b8e2e4c7d7177a3
-
C:\Users\Admin\AppData\Roaming\Bofe\ishauk.exeFilesize
307KB
MD555d4bd34bc1df6cb528be542e461baba
SHA1c2c77130c37f26fa71851aa743084d02773d00e3
SHA256220fd0c25130b342108ce7d5a74fbefd13ebe65d3a18f4f659e5014260ceab9a
SHA51253da9c358d7d944d9829cfaf88b693e6b729aa8bfd561777fdcefabd7b8f36a12b8e568c57a67ae0497b89fc14d9c18737faa3b427a918a95b8e2e4c7d7177a3
-
\Users\Admin\AppData\Roaming\Bofe\ishauk.exeFilesize
307KB
MD555d4bd34bc1df6cb528be542e461baba
SHA1c2c77130c37f26fa71851aa743084d02773d00e3
SHA256220fd0c25130b342108ce7d5a74fbefd13ebe65d3a18f4f659e5014260ceab9a
SHA51253da9c358d7d944d9829cfaf88b693e6b729aa8bfd561777fdcefabd7b8f36a12b8e568c57a67ae0497b89fc14d9c18737faa3b427a918a95b8e2e4c7d7177a3
-
memory/772-113-0x0000000000050000-0x0000000000094000-memory.dmpFilesize
272KB
-
memory/772-115-0x0000000000050000-0x0000000000094000-memory.dmpFilesize
272KB
-
memory/772-102-0x00000000000671E6-mapping.dmp
-
memory/772-101-0x0000000000050000-0x0000000000094000-memory.dmpFilesize
272KB
-
memory/772-100-0x0000000000050000-0x0000000000094000-memory.dmpFilesize
272KB
-
memory/772-99-0x0000000000050000-0x0000000000094000-memory.dmpFilesize
272KB
-
memory/772-97-0x0000000000050000-0x0000000000094000-memory.dmpFilesize
272KB
-
memory/904-60-0x0000000000000000-mapping.dmp
-
memory/904-90-0x000000007EF60000-0x000000007EFA4000-memory.dmpFilesize
272KB
-
memory/904-63-0x0000000000A50000-0x0000000000AA0000-memory.dmpFilesize
320KB
-
memory/904-116-0x0000000000A50000-0x0000000000AA0000-memory.dmpFilesize
320KB
-
memory/904-93-0x000000007EF60000-0x000000007EFA4000-memory.dmpFilesize
272KB
-
memory/1132-68-0x0000000001FF0000-0x0000000002034000-memory.dmpFilesize
272KB
-
memory/1132-66-0x0000000001FF0000-0x0000000002034000-memory.dmpFilesize
272KB
-
memory/1132-69-0x0000000001FF0000-0x0000000002034000-memory.dmpFilesize
272KB
-
memory/1132-70-0x0000000001FF0000-0x0000000002034000-memory.dmpFilesize
272KB
-
memory/1132-71-0x0000000001FF0000-0x0000000002034000-memory.dmpFilesize
272KB
-
memory/1192-74-0x0000000001AC0000-0x0000000001B04000-memory.dmpFilesize
272KB
-
memory/1192-77-0x0000000001AC0000-0x0000000001B04000-memory.dmpFilesize
272KB
-
memory/1192-76-0x0000000001AC0000-0x0000000001B04000-memory.dmpFilesize
272KB
-
memory/1192-75-0x0000000001AC0000-0x0000000001B04000-memory.dmpFilesize
272KB
-
memory/1260-80-0x00000000029F0000-0x0000000002A34000-memory.dmpFilesize
272KB
-
memory/1260-81-0x00000000029F0000-0x0000000002A34000-memory.dmpFilesize
272KB
-
memory/1260-82-0x00000000029F0000-0x0000000002A34000-memory.dmpFilesize
272KB
-
memory/1260-83-0x00000000029F0000-0x0000000002A34000-memory.dmpFilesize
272KB
-
memory/1476-87-0x0000000000560000-0x00000000005A4000-memory.dmpFilesize
272KB
-
memory/1476-86-0x0000000000560000-0x00000000005A4000-memory.dmpFilesize
272KB
-
memory/1476-94-0x0000000000560000-0x00000000005B0000-memory.dmpFilesize
320KB
-
memory/1476-91-0x0000000000560000-0x00000000005B0000-memory.dmpFilesize
320KB
-
memory/1476-89-0x0000000000560000-0x00000000005A4000-memory.dmpFilesize
272KB
-
memory/1476-88-0x0000000000560000-0x00000000005A4000-memory.dmpFilesize
272KB
-
memory/1476-54-0x0000000000970000-0x00000000009C0000-memory.dmpFilesize
320KB
-
memory/1476-103-0x0000000000970000-0x00000000009C0000-memory.dmpFilesize
320KB
-
memory/1476-104-0x0000000000560000-0x00000000005A4000-memory.dmpFilesize
272KB
-
memory/1476-92-0x000000007EF60000-0x000000007EFA4000-memory.dmpFilesize
272KB
-
memory/1476-55-0x0000000075491000-0x0000000075493000-memory.dmpFilesize
8KB
-
memory/1476-57-0x000000007EF60000-0x000000007EFA4000-memory.dmpFilesize
272KB
-
memory/1476-56-0x000000007EF60000-0x000000007EFA4000-memory.dmpFilesize
272KB
-
memory/1476-59-0x000000007EF60000-0x000000007EFA4000-memory.dmpFilesize
272KB
-
memory/1476-62-0x0000000000560000-0x00000000005B0000-memory.dmpFilesize
320KB
-
memory/1952-110-0x00000000001A0000-0x00000000001E4000-memory.dmpFilesize
272KB
-
memory/1952-109-0x00000000001A0000-0x00000000001E4000-memory.dmpFilesize
272KB
-
memory/1952-108-0x00000000001A0000-0x00000000001E4000-memory.dmpFilesize
272KB
-
memory/1952-107-0x00000000001A0000-0x00000000001E4000-memory.dmpFilesize
272KB