Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 06:01
Behavioral task
behavioral1
Sample
bf271c7f79b2cf0421293dddd7203731a777993836a33049be022442113949df.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bf271c7f79b2cf0421293dddd7203731a777993836a33049be022442113949df.exe
Resource
win10v2004-20221111-en
General
-
Target
bf271c7f79b2cf0421293dddd7203731a777993836a33049be022442113949df.exe
-
Size
307KB
-
MD5
a1e70a0976f138b0921423530aedf190
-
SHA1
c92178348e4afcf021b4e845d060e3a89f9bfc29
-
SHA256
bf271c7f79b2cf0421293dddd7203731a777993836a33049be022442113949df
-
SHA512
ed89183d1f504a931f46d115d5d33aa119e436a9ede5b8b317b07307c27f6feb4929b57b18911949c59d674d3e8a79e17c35a413f003abae786f85e19f30d5b8
-
SSDEEP
6144:K0vzRT72Y0SszinYKTY1SQshfRPVQe1MZkIYSccr7wbstOOPECYeixlYGicB:K0bt7SSPYsY1UMqMZJYSN7wbstOO8fvf
Malware Config
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Executes dropped EXE 1 IoCs
Processes:
azba.exepid process 1136 azba.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1116 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
bf271c7f79b2cf0421293dddd7203731a777993836a33049be022442113949df.exepid process 1248 bf271c7f79b2cf0421293dddd7203731a777993836a33049be022442113949df.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
azba.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\Currentversion\Run azba.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\{91C05068-4FEF-AD4D-7F1F-8FEC7D0BACF1} = "C:\\Users\\Admin\\AppData\\Roaming\\Yjtuus\\azba.exe" azba.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
bf271c7f79b2cf0421293dddd7203731a777993836a33049be022442113949df.exedescription pid process target process PID 1248 set thread context of 1116 1248 bf271c7f79b2cf0421293dddd7203731a777993836a33049be022442113949df.exe cmd.exe -
Processes:
bf271c7f79b2cf0421293dddd7203731a777993836a33049be022442113949df.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Privacy bf271c7f79b2cf0421293dddd7203731a777993836a33049be022442113949df.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" bf271c7f79b2cf0421293dddd7203731a777993836a33049be022442113949df.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
azba.exepid process 1136 azba.exe 1136 azba.exe 1136 azba.exe 1136 azba.exe 1136 azba.exe 1136 azba.exe 1136 azba.exe 1136 azba.exe 1136 azba.exe 1136 azba.exe 1136 azba.exe 1136 azba.exe 1136 azba.exe 1136 azba.exe 1136 azba.exe 1136 azba.exe 1136 azba.exe 1136 azba.exe 1136 azba.exe 1136 azba.exe 1136 azba.exe 1136 azba.exe 1136 azba.exe 1136 azba.exe 1136 azba.exe 1136 azba.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
bf271c7f79b2cf0421293dddd7203731a777993836a33049be022442113949df.exeazba.exedescription pid process target process PID 1248 wrote to memory of 1136 1248 bf271c7f79b2cf0421293dddd7203731a777993836a33049be022442113949df.exe azba.exe PID 1248 wrote to memory of 1136 1248 bf271c7f79b2cf0421293dddd7203731a777993836a33049be022442113949df.exe azba.exe PID 1248 wrote to memory of 1136 1248 bf271c7f79b2cf0421293dddd7203731a777993836a33049be022442113949df.exe azba.exe PID 1248 wrote to memory of 1136 1248 bf271c7f79b2cf0421293dddd7203731a777993836a33049be022442113949df.exe azba.exe PID 1136 wrote to memory of 1300 1136 azba.exe taskhost.exe PID 1136 wrote to memory of 1300 1136 azba.exe taskhost.exe PID 1136 wrote to memory of 1300 1136 azba.exe taskhost.exe PID 1136 wrote to memory of 1300 1136 azba.exe taskhost.exe PID 1136 wrote to memory of 1300 1136 azba.exe taskhost.exe PID 1136 wrote to memory of 1404 1136 azba.exe Dwm.exe PID 1136 wrote to memory of 1404 1136 azba.exe Dwm.exe PID 1136 wrote to memory of 1404 1136 azba.exe Dwm.exe PID 1136 wrote to memory of 1404 1136 azba.exe Dwm.exe PID 1136 wrote to memory of 1404 1136 azba.exe Dwm.exe PID 1136 wrote to memory of 1444 1136 azba.exe Explorer.EXE PID 1136 wrote to memory of 1444 1136 azba.exe Explorer.EXE PID 1136 wrote to memory of 1444 1136 azba.exe Explorer.EXE PID 1136 wrote to memory of 1444 1136 azba.exe Explorer.EXE PID 1136 wrote to memory of 1444 1136 azba.exe Explorer.EXE PID 1136 wrote to memory of 1248 1136 azba.exe bf271c7f79b2cf0421293dddd7203731a777993836a33049be022442113949df.exe PID 1136 wrote to memory of 1248 1136 azba.exe bf271c7f79b2cf0421293dddd7203731a777993836a33049be022442113949df.exe PID 1136 wrote to memory of 1248 1136 azba.exe bf271c7f79b2cf0421293dddd7203731a777993836a33049be022442113949df.exe PID 1136 wrote to memory of 1248 1136 azba.exe bf271c7f79b2cf0421293dddd7203731a777993836a33049be022442113949df.exe PID 1136 wrote to memory of 1248 1136 azba.exe bf271c7f79b2cf0421293dddd7203731a777993836a33049be022442113949df.exe PID 1248 wrote to memory of 1116 1248 bf271c7f79b2cf0421293dddd7203731a777993836a33049be022442113949df.exe cmd.exe PID 1248 wrote to memory of 1116 1248 bf271c7f79b2cf0421293dddd7203731a777993836a33049be022442113949df.exe cmd.exe PID 1248 wrote to memory of 1116 1248 bf271c7f79b2cf0421293dddd7203731a777993836a33049be022442113949df.exe cmd.exe PID 1248 wrote to memory of 1116 1248 bf271c7f79b2cf0421293dddd7203731a777993836a33049be022442113949df.exe cmd.exe PID 1248 wrote to memory of 1116 1248 bf271c7f79b2cf0421293dddd7203731a777993836a33049be022442113949df.exe cmd.exe PID 1248 wrote to memory of 1116 1248 bf271c7f79b2cf0421293dddd7203731a777993836a33049be022442113949df.exe cmd.exe PID 1248 wrote to memory of 1116 1248 bf271c7f79b2cf0421293dddd7203731a777993836a33049be022442113949df.exe cmd.exe PID 1248 wrote to memory of 1116 1248 bf271c7f79b2cf0421293dddd7203731a777993836a33049be022442113949df.exe cmd.exe PID 1248 wrote to memory of 1116 1248 bf271c7f79b2cf0421293dddd7203731a777993836a33049be022442113949df.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\bf271c7f79b2cf0421293dddd7203731a777993836a33049be022442113949df.exe"C:\Users\Admin\AppData\Local\Temp\bf271c7f79b2cf0421293dddd7203731a777993836a33049be022442113949df.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Yjtuus\azba.exe"C:\Users\Admin\AppData\Roaming\Yjtuus\azba.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpc550bc3b.bat"3⤵
- Deletes itself
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpc550bc3b.batFilesize
307B
MD547de72b0c793c1055e497b33e48f500e
SHA19c9a62476f2ab9b658734a96fafb3250f957ea70
SHA256561ed49cf5b65415de0960f872554a4e28f76a0fdd3f2da37421c60331a102a7
SHA512e11d64afcfd307d91783518f38142c73f678e6e87695e090eb3d9e2630ab40e0627aab7fe65a0c9a6118bc08b4b5aac61b63213a76b145972887edd970c0333b
-
C:\Users\Admin\AppData\Roaming\Yjtuus\azba.exeFilesize
307KB
MD5f6fdf0f59a6e5eb7f3b9dcbfeeebc59e
SHA136f75d02fd88b732b392b8a9baed71b7a99109de
SHA25619da945801e2f3c945bf46d4d2377961ad0c37ff756d26e8c1caa7c9e25e0bd5
SHA5127ee8e512bfef5613faf17e83a4bf71e00c7d1febdee38f27166b3d4408b07a9941d87e5e29a190a48404d4340c3be8db25392e83b436d8ae2014e969a3a7c34c
-
C:\Users\Admin\AppData\Roaming\Yjtuus\azba.exeFilesize
307KB
MD5f6fdf0f59a6e5eb7f3b9dcbfeeebc59e
SHA136f75d02fd88b732b392b8a9baed71b7a99109de
SHA25619da945801e2f3c945bf46d4d2377961ad0c37ff756d26e8c1caa7c9e25e0bd5
SHA5127ee8e512bfef5613faf17e83a4bf71e00c7d1febdee38f27166b3d4408b07a9941d87e5e29a190a48404d4340c3be8db25392e83b436d8ae2014e969a3a7c34c
-
\Users\Admin\AppData\Roaming\Yjtuus\azba.exeFilesize
307KB
MD5f6fdf0f59a6e5eb7f3b9dcbfeeebc59e
SHA136f75d02fd88b732b392b8a9baed71b7a99109de
SHA25619da945801e2f3c945bf46d4d2377961ad0c37ff756d26e8c1caa7c9e25e0bd5
SHA5127ee8e512bfef5613faf17e83a4bf71e00c7d1febdee38f27166b3d4408b07a9941d87e5e29a190a48404d4340c3be8db25392e83b436d8ae2014e969a3a7c34c
-
memory/1116-96-0x0000000000050000-0x0000000000094000-memory.dmpFilesize
272KB
-
memory/1116-93-0x0000000000050000-0x0000000000094000-memory.dmpFilesize
272KB
-
memory/1116-105-0x0000000000050000-0x0000000000094000-memory.dmpFilesize
272KB
-
memory/1116-99-0x00000000000671E6-mapping.dmp
-
memory/1116-97-0x0000000000050000-0x0000000000094000-memory.dmpFilesize
272KB
-
memory/1116-95-0x0000000000050000-0x0000000000094000-memory.dmpFilesize
272KB
-
memory/1136-106-0x000000007EF60000-0x000000007EFA4000-memory.dmpFilesize
272KB
-
memory/1136-90-0x000000007EF60000-0x000000007EFA4000-memory.dmpFilesize
272KB
-
memory/1136-107-0x00000000002D0000-0x0000000000320000-memory.dmpFilesize
320KB
-
memory/1136-59-0x0000000000000000-mapping.dmp
-
memory/1136-63-0x00000000002D0000-0x0000000000320000-memory.dmpFilesize
320KB
-
memory/1248-62-0x0000000000430000-0x0000000000480000-memory.dmpFilesize
320KB
-
memory/1248-98-0x0000000000430000-0x0000000000480000-memory.dmpFilesize
320KB
-
memory/1248-55-0x0000000075351000-0x0000000075353000-memory.dmpFilesize
8KB
-
memory/1248-102-0x0000000000430000-0x0000000000474000-memory.dmpFilesize
272KB
-
memory/1248-101-0x000000007EF60000-0x000000007EFA4000-memory.dmpFilesize
272KB
-
memory/1248-100-0x0000000001080000-0x00000000010D0000-memory.dmpFilesize
320KB
-
memory/1248-61-0x000000007EF60000-0x000000007EFA4000-memory.dmpFilesize
272KB
-
memory/1248-86-0x0000000000430000-0x0000000000474000-memory.dmpFilesize
272KB
-
memory/1248-57-0x000000007EF60000-0x000000007EFA4000-memory.dmpFilesize
272KB
-
memory/1248-56-0x000000007EF60000-0x000000007EFA4000-memory.dmpFilesize
272KB
-
memory/1248-87-0x0000000000430000-0x0000000000474000-memory.dmpFilesize
272KB
-
memory/1248-88-0x0000000000430000-0x0000000000474000-memory.dmpFilesize
272KB
-
memory/1248-89-0x0000000000430000-0x0000000000474000-memory.dmpFilesize
272KB
-
memory/1248-54-0x0000000001080000-0x00000000010D0000-memory.dmpFilesize
320KB
-
memory/1300-68-0x0000000000190000-0x00000000001D4000-memory.dmpFilesize
272KB
-
memory/1300-71-0x0000000000190000-0x00000000001D4000-memory.dmpFilesize
272KB
-
memory/1300-70-0x0000000000190000-0x00000000001D4000-memory.dmpFilesize
272KB
-
memory/1300-66-0x0000000000190000-0x00000000001D4000-memory.dmpFilesize
272KB
-
memory/1300-69-0x0000000000190000-0x00000000001D4000-memory.dmpFilesize
272KB
-
memory/1404-74-0x0000000000120000-0x0000000000164000-memory.dmpFilesize
272KB
-
memory/1404-77-0x0000000000120000-0x0000000000164000-memory.dmpFilesize
272KB
-
memory/1404-76-0x0000000000120000-0x0000000000164000-memory.dmpFilesize
272KB
-
memory/1404-75-0x0000000000120000-0x0000000000164000-memory.dmpFilesize
272KB
-
memory/1444-81-0x0000000002530000-0x0000000002574000-memory.dmpFilesize
272KB
-
memory/1444-80-0x0000000002530000-0x0000000002574000-memory.dmpFilesize
272KB
-
memory/1444-83-0x0000000002530000-0x0000000002574000-memory.dmpFilesize
272KB
-
memory/1444-82-0x0000000002530000-0x0000000002574000-memory.dmpFilesize
272KB