Analysis
-
max time kernel
141s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21-03-2023 14:33
Static task
static1
Behavioral task
behavioral1
Sample
fd2805fcbb98043679e0ce2ccd112134a767df7010acc24c395cffd73dbc56d6.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
fd2805fcbb98043679e0ce2ccd112134a767df7010acc24c395cffd73dbc56d6.exe
Resource
win10v2004-20230220-en
General
-
Target
fd2805fcbb98043679e0ce2ccd112134a767df7010acc24c395cffd73dbc56d6.exe
-
Size
773KB
-
MD5
b2fed7a0187871e9d42e1ee52b3935bd
-
SHA1
e30ac17a4e055f13433805c43d48c3d2a80632f1
-
SHA256
fd2805fcbb98043679e0ce2ccd112134a767df7010acc24c395cffd73dbc56d6
-
SHA512
e554d417d9a6567639bf31fc9f3ae7a460385b589d77cc3f47e18da8dede0386472fce82807c2ef9ae3d6119115778992652279e5994f3edebcb2fcd39b75924
-
SSDEEP
6144:hESJuKAikmygoaKdra4R2XUmKEHPLR5sfNXbsVASXLLAirvgKwvkR18rXku:1ugkMKWUpEHPL8fNXbsVASblMTvkR
Malware Config
Extracted
cobaltstrike
0
http://82.117.252.209:80/RELEASE_NOTES
-
access_type
512
-
host
82.117.252.209,/RELEASE_NOTES
-
http_header1
AAAAEAAAABBIb3N0OiBqb21paGQuY29tAAAACgAAABFDb25uZWN0aW9uOiBjbG9zZQAAAAoAAAAVQWNjZXB0LUVuY29kaW5nOiBnemlwAAAACgAAABZBY2NlcHQtTGFuZ3VhZ2U6IGVuLVVTAAAABwAAAAAAAAAIAAAAAwAAAAIAAAArd29yZHByZXNzXzUyMjM4NTU4ZTkzMGYxZWM2OTllNGYxMmFiMDE1YTRmPQAAAAYAAAAGQ29va2llAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
-
http_header2
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
-
http_method1
GET
-
http_method2
POST
-
jitter
9984
-
polling_time
61258
-
port_number
80
-
sc_process32
%windir%\syswow64\regsvr32.exe
-
sc_process64
%windir%\sysnative\regsvr32.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCnOM3nXx+7HBhkbDd+AwFrFisSunK999w2tM0uTpuuEiBalcJhcL+QgQWtf6S7zPp5hjImG+2YcPl18geU4f5JlSPXHwilbK4DFb/ePWyKFjhrA7emVRqhM21QMlo1ANsn14rY/RO2pzuft8P7TXoIjjI/B2GGVuzYNZX6X4I2EwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
5.44480256e+08
-
unknown2
AAAABAAAAAIAAAJYAAAAAwAAAA0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
uri
/mobile-ipad-home
-
user_agent
Mozilla/5.0 (Linux; Android 8.0.0; SM-G960F Build/R16NW) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202
-
watermark
0
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
fd2805fcbb98043679e0ce2ccd112134a767df7010acc24c395cffd73dbc56d6.exedescription pid process target process PID 3604 wrote to memory of 4012 3604 fd2805fcbb98043679e0ce2ccd112134a767df7010acc24c395cffd73dbc56d6.exe cmd.exe PID 3604 wrote to memory of 4012 3604 fd2805fcbb98043679e0ce2ccd112134a767df7010acc24c395cffd73dbc56d6.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd2805fcbb98043679e0ce2ccd112134a767df7010acc24c395cffd73dbc56d6.exe"C:\Users\Admin\AppData\Local\Temp\fd2805fcbb98043679e0ce2ccd112134a767df7010acc24c395cffd73dbc56d6.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c echo UOdSilBUzSKXpsw>"C:\Users\Admin\AppData\Local\Temp\DEMB0F5.tmp"&exit2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\DEMB0F5.tmpFilesize
17B
MD52103171561b574631d1eef3b294be233
SHA1853b192188004d6555bebe2c099398cb0ccacb23
SHA25696475290b58d7e2c7d0c799b5f1556029dd47b5eb1745d606593b4088e68baa9
SHA5123e36d04eb4a5503b5a1a9515f4209f0c7312a519f2736d30853bae08f30e4a88524bfb462a63ec1a72386038c24e13bf0d508e2dc8f3418c0f866a17577e288b
-
memory/3604-135-0x0000000000BA0000-0x0000000000BE0000-memory.dmpFilesize
256KB
-
memory/3604-136-0x0000000000F10000-0x0000000000F92000-memory.dmpFilesize
520KB
-
memory/3604-137-0x0000000000400000-0x00000000004C8000-memory.dmpFilesize
800KB
-
memory/3604-139-0x0000000000F10000-0x0000000000F92000-memory.dmpFilesize
520KB