Analysis
-
max time kernel
139s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 11:05
Behavioral task
behavioral1
Sample
42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe
Resource
win10v2004-20220901-en
General
-
Target
42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe
-
Size
1.3MB
-
MD5
14aaa215e9b3c1e00fe200579b62096f
-
SHA1
ea7a115dbe99b2866dce2b4b528b42935b1ac0df
-
SHA256
42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547
-
SHA512
ae7ce435d31ead38001f3e990e3625955dfd9e6ed95e5d273fe22ddc3a92e582eea4432a78ffe1204e053ad04a1d0fa9c82480d37b0628afe627715c91ab5b6c
-
SSDEEP
24576:Uh5B4Gr+VacW7lICFGOuDv3bGEIzUfhIlyZxI:U7B7EzWP+3bSwXI
Malware Config
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Processes:
resource yara_rule behavioral1/memory/1140-54-0x0000000001140000-0x0000000001437000-memory.dmp upx behavioral1/memory/1140-55-0x0000000001140000-0x0000000001437000-memory.dmp upx behavioral1/memory/1140-61-0x0000000001140000-0x0000000001437000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exepid process 1140 42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe 1140 42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe 1140 42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe 1140 42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe 1140 42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe 1140 42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe 1140 42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe 1140 42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe 1140 42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe 1140 42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe 1140 42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe 1140 42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe 1140 42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe 1140 42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe 1140 42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe 1140 42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe 1140 42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe 1140 42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe 1140 42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe 1140 42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe 1140 42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe 1140 42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe 1140 42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe 1140 42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe 1140 42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe 1140 42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe 1140 42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exedescription pid process Token: SeDebugPrivilege 1140 42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exedescription pid process target process PID 1140 wrote to memory of 320 1140 42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe notepad.exe PID 1140 wrote to memory of 320 1140 42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe notepad.exe PID 1140 wrote to memory of 320 1140 42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe notepad.exe PID 1140 wrote to memory of 320 1140 42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe notepad.exe PID 1140 wrote to memory of 320 1140 42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe"C:\Users\Admin\AppData\Local\Temp\42eeb032eed8b27965b7fc971b1fd490310fc85fb5be3138675200075824e547.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe"2⤵PID:320