Analysis

  • max time kernel
    141s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-03-2023 14:33

General

  • Target

    fd2805fcbb98043679e0ce2ccd112134a767df7010acc24c395cffd73dbc56d6.exe

  • Size

    773KB

  • MD5

    b2fed7a0187871e9d42e1ee52b3935bd

  • SHA1

    e30ac17a4e055f13433805c43d48c3d2a80632f1

  • SHA256

    fd2805fcbb98043679e0ce2ccd112134a767df7010acc24c395cffd73dbc56d6

  • SHA512

    e554d417d9a6567639bf31fc9f3ae7a460385b589d77cc3f47e18da8dede0386472fce82807c2ef9ae3d6119115778992652279e5994f3edebcb2fcd39b75924

  • SSDEEP

    6144:hESJuKAikmygoaKdra4R2XUmKEHPLR5sfNXbsVASXLLAirvgKwvkR18rXku:1ugkMKWUpEHPL8fNXbsVASblMTvkR

Malware Config

Extracted

Family

cobaltstrike

Botnet

0

C2

http://82.117.252.209:80/RELEASE_NOTES

Attributes
  • access_type

    512

  • host

    82.117.252.209,/RELEASE_NOTES

  • http_header1

    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

  • http_header2

    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

  • http_method1

    GET

  • http_method2

    POST

  • jitter

    9984

  • polling_time

    61258

  • port_number

    80

  • sc_process32

    %windir%\syswow64\regsvr32.exe

  • sc_process64

    %windir%\sysnative\regsvr32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCnOM3nXx+7HBhkbDd+AwFrFisSunK999w2tM0uTpuuEiBalcJhcL+QgQWtf6S7zPp5hjImG+2YcPl18geU4f5JlSPXHwilbK4DFb/ePWyKFjhrA7emVRqhM21QMlo1ANsn14rY/RO2pzuft8P7TXoIjjI/B2GGVuzYNZX6X4I2EwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    5.44480256e+08

  • unknown2

    AAAABAAAAAIAAAJYAAAAAwAAAA0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /mobile-ipad-home

  • user_agent

    Mozilla/5.0 (Linux; Android 8.0.0; SM-G960F Build/R16NW) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202

  • watermark

    0

Signatures

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd2805fcbb98043679e0ce2ccd112134a767df7010acc24c395cffd73dbc56d6.exe
    "C:\Users\Admin\AppData\Local\Temp\fd2805fcbb98043679e0ce2ccd112134a767df7010acc24c395cffd73dbc56d6.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3604
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe /c echo UOdSilBUzSKXpsw>"C:\Users\Admin\AppData\Local\Temp\DEMB0F5.tmp"&exit
      2⤵
        PID:4012

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\DEMB0F5.tmp
      Filesize

      17B

      MD5

      2103171561b574631d1eef3b294be233

      SHA1

      853b192188004d6555bebe2c099398cb0ccacb23

      SHA256

      96475290b58d7e2c7d0c799b5f1556029dd47b5eb1745d606593b4088e68baa9

      SHA512

      3e36d04eb4a5503b5a1a9515f4209f0c7312a519f2736d30853bae08f30e4a88524bfb462a63ec1a72386038c24e13bf0d508e2dc8f3418c0f866a17577e288b

    • memory/3604-135-0x0000000000BA0000-0x0000000000BE0000-memory.dmp
      Filesize

      256KB

    • memory/3604-136-0x0000000000F10000-0x0000000000F92000-memory.dmp
      Filesize

      520KB

    • memory/3604-137-0x0000000000400000-0x00000000004C8000-memory.dmp
      Filesize

      800KB

    • memory/3604-139-0x0000000000F10000-0x0000000000F92000-memory.dmp
      Filesize

      520KB