Analysis
-
max time kernel
33s -
max time network
40s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
21-03-2023 14:33
Static task
static1
Behavioral task
behavioral1
Sample
b20bf873b3decaecccadefd88ebb391d682b37e0c7d7d6bb942c630a4ad30739.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b20bf873b3decaecccadefd88ebb391d682b37e0c7d7d6bb942c630a4ad30739.exe
Resource
win10v2004-20230220-en
General
-
Target
b20bf873b3decaecccadefd88ebb391d682b37e0c7d7d6bb942c630a4ad30739.exe
-
Size
192KB
-
MD5
50637621d5070b868297ebea3d800480
-
SHA1
5777bb47ee4898a7ce1dc46c86ba19e805fb102f
-
SHA256
b20bf873b3decaecccadefd88ebb391d682b37e0c7d7d6bb942c630a4ad30739
-
SHA512
38e1f374ddd95ade71d079231b0f19c8df36b18adf604bfe2395b1a0d3db394006b6700054d11fb22a6c2b7e3aa680b70a10f93d8389b3ffd616f583aaa5c770
-
SSDEEP
3072:c0L2F+czJ4gjdrlRP5CPoDJMNXEepfjWEPY4vZhuGnrTTTr3EgEJmm:zKFDFRdrT5CPoDSX1fjWETPUDJmm
Malware Config
Extracted
cobaltstrike
http://duladani.com:443/wp-includes/favicon.gif
-
user_agent
Host: google.fr Connection: close Accept: image/jpeg Accept-Encoding: gzip, br User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_2) AppleWebKit/601.3.9 (KHTML, like Gecko) Version/9.0.2 Safari/601.3.9
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2028-54-0x0000000000020000-0x0000000000023000-memory.dmpFilesize
12KB