Analysis
-
max time kernel
130s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21-03-2023 14:33
Static task
static1
Behavioral task
behavioral1
Sample
b20bf873b3decaecccadefd88ebb391d682b37e0c7d7d6bb942c630a4ad30739.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b20bf873b3decaecccadefd88ebb391d682b37e0c7d7d6bb942c630a4ad30739.exe
Resource
win10v2004-20230220-en
General
-
Target
b20bf873b3decaecccadefd88ebb391d682b37e0c7d7d6bb942c630a4ad30739.exe
-
Size
192KB
-
MD5
50637621d5070b868297ebea3d800480
-
SHA1
5777bb47ee4898a7ce1dc46c86ba19e805fb102f
-
SHA256
b20bf873b3decaecccadefd88ebb391d682b37e0c7d7d6bb942c630a4ad30739
-
SHA512
38e1f374ddd95ade71d079231b0f19c8df36b18adf604bfe2395b1a0d3db394006b6700054d11fb22a6c2b7e3aa680b70a10f93d8389b3ffd616f583aaa5c770
-
SSDEEP
3072:c0L2F+czJ4gjdrlRP5CPoDJMNXEepfjWEPY4vZhuGnrTTTr3EgEJmm:zKFDFRdrT5CPoDSX1fjWETPUDJmm
Malware Config
Extracted
cobaltstrike
http://duladani.com:443/wp-includes/favicon.gif
-
user_agent
Host: google.fr Connection: close Accept: image/jpeg Accept-Encoding: gzip, br User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_2) AppleWebKit/601.3.9 (KHTML, like Gecko) Version/9.0.2 Safari/601.3.9
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4580 5076 WerFault.exe b20bf873b3decaecccadefd88ebb391d682b37e0c7d7d6bb942c630a4ad30739.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b20bf873b3decaecccadefd88ebb391d682b37e0c7d7d6bb942c630a4ad30739.exe"C:\Users\Admin\AppData\Local\Temp\b20bf873b3decaecccadefd88ebb391d682b37e0c7d7d6bb942c630a4ad30739.exe"1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 5076 -s 11962⤵
- Program crash
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 472 -p 5076 -ip 50761⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/5076-133-0x00000160EF650000-0x00000160EF653000-memory.dmpFilesize
12KB