Analysis
-
max time kernel
149s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2023 22:20
Static task
static1
Behavioral task
behavioral1
Sample
b20bf873b3decaecccadefd88ebb391d682b37e0c7d7d6bb942c630a4ad30739.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b20bf873b3decaecccadefd88ebb391d682b37e0c7d7d6bb942c630a4ad30739.exe
Resource
win10v2004-20230220-en
General
-
Target
b20bf873b3decaecccadefd88ebb391d682b37e0c7d7d6bb942c630a4ad30739.exe
-
Size
192KB
-
MD5
50637621d5070b868297ebea3d800480
-
SHA1
5777bb47ee4898a7ce1dc46c86ba19e805fb102f
-
SHA256
b20bf873b3decaecccadefd88ebb391d682b37e0c7d7d6bb942c630a4ad30739
-
SHA512
38e1f374ddd95ade71d079231b0f19c8df36b18adf604bfe2395b1a0d3db394006b6700054d11fb22a6c2b7e3aa680b70a10f93d8389b3ffd616f583aaa5c770
-
SSDEEP
3072:c0L2F+czJ4gjdrlRP5CPoDJMNXEepfjWEPY4vZhuGnrTTTr3EgEJmm:zKFDFRdrT5CPoDSX1fjWETPUDJmm
Malware Config
Extracted
cobaltstrike
http://duladani.com:443/wp-includes/favicon.gif
-
user_agent
Host: google.fr Connection: close Accept: image/jpeg Accept-Encoding: gzip, br User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_2) AppleWebKit/601.3.9 (KHTML, like Gecko) Version/9.0.2 Safari/601.3.9
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4116 3252 WerFault.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\b20bf873b3decaecccadefd88ebb391d682b37e0c7d7d6bb942c630a4ad30739.exe"C:\Users\Admin\AppData\Local\Temp\b20bf873b3decaecccadefd88ebb391d682b37e0c7d7d6bb942c630a4ad30739.exe"1⤵PID:3252
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3252 -s 11802⤵
- Program crash
PID:4116
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 456 -p 3252 -ip 32521⤵PID:3360