Analysis
-
max time kernel
152s -
max time network
183s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 06:39
Behavioral task
behavioral1
Sample
b850b1ba787fb7fb607b3840f4acfec560a736aaf00aa5c07a6a8b0536e6c465.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b850b1ba787fb7fb607b3840f4acfec560a736aaf00aa5c07a6a8b0536e6c465.exe
Resource
win10v2004-20221111-en
General
-
Target
b850b1ba787fb7fb607b3840f4acfec560a736aaf00aa5c07a6a8b0536e6c465.exe
-
Size
311KB
-
MD5
7257b78c20538fb81e0c610a58cf54bb
-
SHA1
a1641167c827ca8f59fe22d169125726d283cfc4
-
SHA256
b850b1ba787fb7fb607b3840f4acfec560a736aaf00aa5c07a6a8b0536e6c465
-
SHA512
10265701daace520e079e7083c1e6749702a24530f3d83ca0c62cb01124a55d8eb0e6f992b192982b741e399e6ff65358238aeed23e7680d2df5b225f2345d6e
-
SSDEEP
6144:nS/3wVyBPl40pPzMHLdL1hALe+2NirdrQdZxwUKD0j:nm3myb4wzMdoLT2NKc7w6
Malware Config
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Executes dropped EXE 1 IoCs
Processes:
reipal.exepid process 1012 reipal.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1348 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
b850b1ba787fb7fb607b3840f4acfec560a736aaf00aa5c07a6a8b0536e6c465.exepid process 2028 b850b1ba787fb7fb607b3840f4acfec560a736aaf00aa5c07a6a8b0536e6c465.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reipal.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\{A87A45C8-3774-AD4D-8524-3978BFBA1A65} = "C:\\Users\\Admin\\AppData\\Roaming\\Paojun\\reipal.exe" reipal.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\Currentversion\Run reipal.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b850b1ba787fb7fb607b3840f4acfec560a736aaf00aa5c07a6a8b0536e6c465.exedescription pid process target process PID 2028 set thread context of 1348 2028 b850b1ba787fb7fb607b3840f4acfec560a736aaf00aa5c07a6a8b0536e6c465.exe cmd.exe -
Processes:
b850b1ba787fb7fb607b3840f4acfec560a736aaf00aa5c07a6a8b0536e6c465.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Privacy b850b1ba787fb7fb607b3840f4acfec560a736aaf00aa5c07a6a8b0536e6c465.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" b850b1ba787fb7fb607b3840f4acfec560a736aaf00aa5c07a6a8b0536e6c465.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
reipal.exepid process 1012 reipal.exe 1012 reipal.exe 1012 reipal.exe 1012 reipal.exe 1012 reipal.exe 1012 reipal.exe 1012 reipal.exe 1012 reipal.exe 1012 reipal.exe 1012 reipal.exe 1012 reipal.exe 1012 reipal.exe 1012 reipal.exe 1012 reipal.exe 1012 reipal.exe 1012 reipal.exe 1012 reipal.exe 1012 reipal.exe 1012 reipal.exe 1012 reipal.exe 1012 reipal.exe 1012 reipal.exe 1012 reipal.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
b850b1ba787fb7fb607b3840f4acfec560a736aaf00aa5c07a6a8b0536e6c465.exereipal.exedescription pid process target process PID 2028 wrote to memory of 1012 2028 b850b1ba787fb7fb607b3840f4acfec560a736aaf00aa5c07a6a8b0536e6c465.exe reipal.exe PID 2028 wrote to memory of 1012 2028 b850b1ba787fb7fb607b3840f4acfec560a736aaf00aa5c07a6a8b0536e6c465.exe reipal.exe PID 2028 wrote to memory of 1012 2028 b850b1ba787fb7fb607b3840f4acfec560a736aaf00aa5c07a6a8b0536e6c465.exe reipal.exe PID 2028 wrote to memory of 1012 2028 b850b1ba787fb7fb607b3840f4acfec560a736aaf00aa5c07a6a8b0536e6c465.exe reipal.exe PID 1012 wrote to memory of 1140 1012 reipal.exe taskhost.exe PID 1012 wrote to memory of 1140 1012 reipal.exe taskhost.exe PID 1012 wrote to memory of 1140 1012 reipal.exe taskhost.exe PID 1012 wrote to memory of 1140 1012 reipal.exe taskhost.exe PID 1012 wrote to memory of 1140 1012 reipal.exe taskhost.exe PID 1012 wrote to memory of 1248 1012 reipal.exe Dwm.exe PID 1012 wrote to memory of 1248 1012 reipal.exe Dwm.exe PID 1012 wrote to memory of 1248 1012 reipal.exe Dwm.exe PID 1012 wrote to memory of 1248 1012 reipal.exe Dwm.exe PID 1012 wrote to memory of 1248 1012 reipal.exe Dwm.exe PID 1012 wrote to memory of 1284 1012 reipal.exe Explorer.EXE PID 1012 wrote to memory of 1284 1012 reipal.exe Explorer.EXE PID 1012 wrote to memory of 1284 1012 reipal.exe Explorer.EXE PID 1012 wrote to memory of 1284 1012 reipal.exe Explorer.EXE PID 1012 wrote to memory of 1284 1012 reipal.exe Explorer.EXE PID 1012 wrote to memory of 2028 1012 reipal.exe b850b1ba787fb7fb607b3840f4acfec560a736aaf00aa5c07a6a8b0536e6c465.exe PID 1012 wrote to memory of 2028 1012 reipal.exe b850b1ba787fb7fb607b3840f4acfec560a736aaf00aa5c07a6a8b0536e6c465.exe PID 1012 wrote to memory of 2028 1012 reipal.exe b850b1ba787fb7fb607b3840f4acfec560a736aaf00aa5c07a6a8b0536e6c465.exe PID 1012 wrote to memory of 2028 1012 reipal.exe b850b1ba787fb7fb607b3840f4acfec560a736aaf00aa5c07a6a8b0536e6c465.exe PID 1012 wrote to memory of 2028 1012 reipal.exe b850b1ba787fb7fb607b3840f4acfec560a736aaf00aa5c07a6a8b0536e6c465.exe PID 2028 wrote to memory of 1348 2028 b850b1ba787fb7fb607b3840f4acfec560a736aaf00aa5c07a6a8b0536e6c465.exe cmd.exe PID 2028 wrote to memory of 1348 2028 b850b1ba787fb7fb607b3840f4acfec560a736aaf00aa5c07a6a8b0536e6c465.exe cmd.exe PID 2028 wrote to memory of 1348 2028 b850b1ba787fb7fb607b3840f4acfec560a736aaf00aa5c07a6a8b0536e6c465.exe cmd.exe PID 2028 wrote to memory of 1348 2028 b850b1ba787fb7fb607b3840f4acfec560a736aaf00aa5c07a6a8b0536e6c465.exe cmd.exe PID 2028 wrote to memory of 1348 2028 b850b1ba787fb7fb607b3840f4acfec560a736aaf00aa5c07a6a8b0536e6c465.exe cmd.exe PID 2028 wrote to memory of 1348 2028 b850b1ba787fb7fb607b3840f4acfec560a736aaf00aa5c07a6a8b0536e6c465.exe cmd.exe PID 2028 wrote to memory of 1348 2028 b850b1ba787fb7fb607b3840f4acfec560a736aaf00aa5c07a6a8b0536e6c465.exe cmd.exe PID 2028 wrote to memory of 1348 2028 b850b1ba787fb7fb607b3840f4acfec560a736aaf00aa5c07a6a8b0536e6c465.exe cmd.exe PID 2028 wrote to memory of 1348 2028 b850b1ba787fb7fb607b3840f4acfec560a736aaf00aa5c07a6a8b0536e6c465.exe cmd.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\b850b1ba787fb7fb607b3840f4acfec560a736aaf00aa5c07a6a8b0536e6c465.exe"C:\Users\Admin\AppData\Local\Temp\b850b1ba787fb7fb607b3840f4acfec560a736aaf00aa5c07a6a8b0536e6c465.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Paojun\reipal.exe"C:\Users\Admin\AppData\Roaming\Paojun\reipal.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp8f1af447.bat"3⤵
- Deletes itself
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\ajgio.kaeFilesize
466B
MD538dcc51ac7f6d029d7773d4940914e89
SHA1b55492b2ab669cadb97fd5399feead58362fbd0a
SHA2561d1d4ea1a3bdfe4085e54d143434115ffb9b011bfa3126b31b001d6c3bc2baec
SHA512e2391ef36523603e499cfa63a85619d1b984bad0996bb52209a083850bc035f99ff1a662c66983d352bb19a80efb353df52fe495f61e6f6dfeda44df76fd7bc9
-
C:\Users\Admin\AppData\Local\Temp\tmp8f1af447.batFilesize
307B
MD53a4f8811b7d2e9072948c0533de7cbba
SHA1338081e8f91307d8646a8fa6000d98ee0728e512
SHA256237e91adda91b3938afddaf670607cea3c6cb64c9b17625e6fa5882e2ed86840
SHA5122fa02d11aee0829a16faead85e84889d73f9773954944e5c13d9836e123159a11781e9ca7ced9e1eca403825e293faaa393cf03434f7494c042b4ed76e3c185a
-
C:\Users\Admin\AppData\Roaming\Paojun\reipal.exeFilesize
311KB
MD5fb68e681e604c5ba55b8b2f74a19bb24
SHA156789f4cc6faa3b8ee6819bcc33117b062e8a649
SHA2560fe56eb278f5e40e1968612c0e7c08f3f70f2019d8afc1cef647c97ec6f7a7e2
SHA512aea56c4db3ae0045555db3bf1b80160da16316e388e2a24607009876adae3912ca61dbbdb57f1809d4fb2ad405c34c60b332032f04e5a31193fc356c87365fdf
-
C:\Users\Admin\AppData\Roaming\Paojun\reipal.exeFilesize
311KB
MD5fb68e681e604c5ba55b8b2f74a19bb24
SHA156789f4cc6faa3b8ee6819bcc33117b062e8a649
SHA2560fe56eb278f5e40e1968612c0e7c08f3f70f2019d8afc1cef647c97ec6f7a7e2
SHA512aea56c4db3ae0045555db3bf1b80160da16316e388e2a24607009876adae3912ca61dbbdb57f1809d4fb2ad405c34c60b332032f04e5a31193fc356c87365fdf
-
\Users\Admin\AppData\Roaming\Paojun\reipal.exeFilesize
311KB
MD5fb68e681e604c5ba55b8b2f74a19bb24
SHA156789f4cc6faa3b8ee6819bcc33117b062e8a649
SHA2560fe56eb278f5e40e1968612c0e7c08f3f70f2019d8afc1cef647c97ec6f7a7e2
SHA512aea56c4db3ae0045555db3bf1b80160da16316e388e2a24607009876adae3912ca61dbbdb57f1809d4fb2ad405c34c60b332032f04e5a31193fc356c87365fdf
-
memory/1012-90-0x000000007EF60000-0x000000007EFA4000-memory.dmpFilesize
272KB
-
memory/1012-109-0x0000000000A50000-0x0000000000AA9000-memory.dmpFilesize
356KB
-
memory/1012-92-0x000000007EF60000-0x000000007EFA4000-memory.dmpFilesize
272KB
-
memory/1012-59-0x0000000000000000-mapping.dmp
-
memory/1012-63-0x0000000000A50000-0x0000000000AA9000-memory.dmpFilesize
356KB
-
memory/1140-68-0x0000000001D50000-0x0000000001D94000-memory.dmpFilesize
272KB
-
memory/1140-66-0x0000000001D50000-0x0000000001D94000-memory.dmpFilesize
272KB
-
memory/1140-69-0x0000000001D50000-0x0000000001D94000-memory.dmpFilesize
272KB
-
memory/1140-70-0x0000000001D50000-0x0000000001D94000-memory.dmpFilesize
272KB
-
memory/1140-71-0x0000000001D50000-0x0000000001D94000-memory.dmpFilesize
272KB
-
memory/1248-76-0x0000000000120000-0x0000000000164000-memory.dmpFilesize
272KB
-
memory/1248-74-0x0000000000120000-0x0000000000164000-memory.dmpFilesize
272KB
-
memory/1248-75-0x0000000000120000-0x0000000000164000-memory.dmpFilesize
272KB
-
memory/1248-77-0x0000000000120000-0x0000000000164000-memory.dmpFilesize
272KB
-
memory/1284-82-0x0000000002BA0000-0x0000000002BE4000-memory.dmpFilesize
272KB
-
memory/1284-81-0x0000000002BA0000-0x0000000002BE4000-memory.dmpFilesize
272KB
-
memory/1284-83-0x0000000002BA0000-0x0000000002BE4000-memory.dmpFilesize
272KB
-
memory/1284-80-0x0000000002BA0000-0x0000000002BE4000-memory.dmpFilesize
272KB
-
memory/1348-96-0x00000000000B0000-0x00000000000F4000-memory.dmpFilesize
272KB
-
memory/1348-108-0x00000000000B0000-0x00000000000F4000-memory.dmpFilesize
272KB
-
memory/1348-101-0x00000000000C71E6-mapping.dmp
-
memory/1348-100-0x00000000000B0000-0x00000000000F4000-memory.dmpFilesize
272KB
-
memory/1348-98-0x00000000000B0000-0x00000000000F4000-memory.dmpFilesize
272KB
-
memory/1348-99-0x00000000000B0000-0x00000000000F4000-memory.dmpFilesize
272KB
-
memory/2028-88-0x00000000002C0000-0x0000000000304000-memory.dmpFilesize
272KB
-
memory/2028-86-0x00000000002C0000-0x0000000000304000-memory.dmpFilesize
272KB
-
memory/2028-93-0x00000000002C0000-0x0000000000319000-memory.dmpFilesize
356KB
-
memory/2028-91-0x00000000002C0000-0x0000000000319000-memory.dmpFilesize
356KB
-
memory/2028-62-0x00000000002C0000-0x0000000000319000-memory.dmpFilesize
356KB
-
memory/2028-89-0x00000000002C0000-0x0000000000304000-memory.dmpFilesize
272KB
-
memory/2028-87-0x00000000002C0000-0x0000000000304000-memory.dmpFilesize
272KB
-
memory/2028-61-0x000000007EF60000-0x000000007EFA4000-memory.dmpFilesize
272KB
-
memory/2028-103-0x000000007EF60000-0x000000007EFA4000-memory.dmpFilesize
272KB
-
memory/2028-102-0x00000000009E0000-0x0000000000A39000-memory.dmpFilesize
356KB
-
memory/2028-104-0x00000000002C0000-0x0000000000304000-memory.dmpFilesize
272KB
-
memory/2028-57-0x000000007EF60000-0x000000007EFA4000-memory.dmpFilesize
272KB
-
memory/2028-56-0x000000007EF60000-0x000000007EFA4000-memory.dmpFilesize
272KB
-
memory/2028-54-0x00000000009E0000-0x0000000000A39000-memory.dmpFilesize
356KB
-
memory/2028-55-0x00000000760B1000-0x00000000760B3000-memory.dmpFilesize
8KB