Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    21/04/2023, 03:11

General

  • Target

    54a745673b6f8d0aa2e3f5b9287711c30ced0b417d7d8fc2ac451cd4765d2de7.exe

  • Size

    4.3MB

  • MD5

    cc5d6d972293623b095cdcb4860de21c

  • SHA1

    ab9822f8fd1c3aca566bce04fdf8134e6f419dd1

  • SHA256

    54a745673b6f8d0aa2e3f5b9287711c30ced0b417d7d8fc2ac451cd4765d2de7

  • SHA512

    25a6f4526209cf2f297add4d9b7dadafc87ec3d55177f097a8b11388573d696f7d331bf7940da12c324d7731e54ee92a60943492e63af7ae95bac655d84656e0

  • SSDEEP

    49152:FwHhpNxrb/TxvO90d7HjmAFd4A64nsfJi/p0uGR0J8L4z/wBQaHd3bLu00KnEOHO:aosufMw2

Malware Config

Extracted

Family

cobaltstrike

C2

http://p.qaxno1.ml:2053/9hQee

Attributes
  • user_agent

    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36

Extracted

Family

cobaltstrike

Botnet

54188

C2

http://p.qaxno1.ml:2053/ask/submit.php

Attributes
  • access_type

    512

  • beacon_type

    2048

  • host

    p.qaxno1.ml,/ask/submit.php

  • http_header1

    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

  • http_header2

    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

  • http_method1

    GET

  • http_method2

    POST

  • polling_time

    60000

  • port_number

    2053

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC2ndWPrEjLYxSwm0mmGy/eV9QtrdAB55YOGvIrQMR+qs0aTLpcVm3KWMuLEfqXQKQYq8X6/vlID6ZP+W818iqrDjacTm4/vUywByNKrNydnkXxrpP05kjHfe56lUgZa6g/CfarxfI7tvti4cQYR4zi8c8+O5ZKjYDpJUxojffJnwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /submit.jsp

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36

  • watermark

    54188

Signatures

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:1236
    • C:\Users\Admin\AppData\Local\Temp\54a745673b6f8d0aa2e3f5b9287711c30ced0b417d7d8fc2ac451cd4765d2de7.exe
      "C:\Users\Admin\AppData\Local\Temp\54a745673b6f8d0aa2e3f5b9287711c30ced0b417d7d8fc2ac451cd4765d2de7.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1768
      • C:\users\public\leasslile.exe
        C:\users\public\leasslile.exe ycb6t5tl3s
        3⤵
        • Executes dropped EXE
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1752
        • C:\Windows\system32\whoami.exe
          whoami
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:876
        • C:\Windows\system32\whoami.exe
          whoami
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1624
      • C:\Windows\system32\cmd.exe
        cmd.exe /c start 李乐简历.docx
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1924
        • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
          "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\李乐简历.docx"
          4⤵
          • Drops file in Windows directory
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1560
          • C:\Windows\splwow64.exe
            C:\Windows\splwow64.exe 12288
            5⤵
              PID:1736

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      61KB

      MD5

      e71c8443ae0bc2e282c73faead0a6dd3

      SHA1

      0c110c1b01e68edfacaeae64781a37b1995fa94b

      SHA256

      95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

      SHA512

      b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      61KB

      MD5

      e71c8443ae0bc2e282c73faead0a6dd3

      SHA1

      0c110c1b01e68edfacaeae64781a37b1995fa94b

      SHA256

      95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

      SHA512

      b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      22c4ce54b3dac2d4ff1e4360ad11c45e

      SHA1

      5fe2efa32803c231c963f6374d64519607a52e72

      SHA256

      2e40b746a58ebe9005629c3eba1f183afe39baf125c99f21d6f12658b75ad93e

      SHA512

      a44a9f1ff5889888d07d7d21ad48e285acf592a3e7553417cd398a14cd996ece967f8019f6117620fe66e89649ffd03619688768a84afe92e1bc79dce4616716

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      a9134f0d9ab1f777f15c2ce94b884757

      SHA1

      0cb2bb02c40aad12e7d5a7eb6e50e0b86c726594

      SHA256

      827a7ff77125c0f46677858beda8021b1118615109af73f15d97eac5a6a4ac0c

      SHA512

      f0e0524be4b0ef75b33c68b7ee8c935859733107108a67ef053d7461c4501d10c81ad4c37311ac8d29e06bf592401cbd6c878ac2837166b6bc265690e59d1201

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      29ac3b0152cccc1a8c27823802cebc0c

      SHA1

      42f17cb37f3c8127e11b87b7d9544c687806a5b9

      SHA256

      7dca8b3488690e92284453201a02355a992dcd574eefb7dbdd0868a5dbf8fd09

      SHA512

      161883f6c3192e55dc7b62c9629fd4b122ea3d9530d5db66b8376d3b0840185cfafd97f5bad34ea11521d1a0bb319e4703dae8c93a44fd80d4b1dc18971b6405

    • C:\Users\Admin\AppData\Local\Temp\Cab24E2.tmp

      Filesize

      61KB

      MD5

      fc4666cbca561e864e7fdf883a9e6661

      SHA1

      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

      SHA256

      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

      SHA512

      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

    • C:\Users\Admin\AppData\Local\Temp\Tar29E8.tmp

      Filesize

      161KB

      MD5

      be2bec6e8c5653136d3e72fe53c98aa3

      SHA1

      a8182d6db17c14671c3d5766c72e58d87c0810de

      SHA256

      1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

      SHA512

      0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

    • C:\Users\Admin\AppData\Local\Temp\李乐简历.docx

      Filesize

      116KB

      MD5

      de940b51cee5e9c9f08e09d52418ec21

      SHA1

      4aa32f906c8db6452bc610f7bdf971ade9d00536

      SHA256

      fa841b70132d3e7218b56966802636851ff99eb22d43d18360ee4edba4f16b7c

      SHA512

      c6a9ad815d21ee196b696a76e8986e75ecc88c66f17d1b3a2fa1de3395f4fee4cfafda20d6e9dbd59b3fa19baf6521d9ae8394c014d1ae02b049e873399ebedd

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      3ccf84b1d1edc47933b01c5c04f135ac

      SHA1

      9b8535a63d0404534cc5070d9d5206abb7522b7c

      SHA256

      a396fb320b343c32ab2d2fef7b1af9384d17902f8d9eb55762efb9b9a1d7743f

      SHA512

      07919ca9ae9cc4d284d820a20c986cdb5647738560f055aae45a3211c299aa3de678c466cf6eda688d5e00aba484d77c72256f528e25747ee8716c208948a6c1

    • C:\Users\Public\leasslile.exe

      Filesize

      1.6MB

      MD5

      fabf16e9c8507cff4200422a3c79339e

      SHA1

      15a681c7e412b40dea9c92d3cc5bf9b5d5b1646f

      SHA256

      5ce7c3f47cc78afe5727f28e2eed13a71855a5edf89277dce00b7565953209fa

      SHA512

      e8ac64d7ac46193773170a199b3d827f9038aeb19f22c6e37159dacd3a685eda71cc694367dcdeac890434f45d2a7455f19d7cbb8e9842c088cdbe746fb3a52b

    • \Users\Public\leasslile.exe

      Filesize

      1.6MB

      MD5

      fabf16e9c8507cff4200422a3c79339e

      SHA1

      15a681c7e412b40dea9c92d3cc5bf9b5d5b1646f

      SHA256

      5ce7c3f47cc78afe5727f28e2eed13a71855a5edf89277dce00b7565953209fa

      SHA512

      e8ac64d7ac46193773170a199b3d827f9038aeb19f22c6e37159dacd3a685eda71cc694367dcdeac890434f45d2a7455f19d7cbb8e9842c088cdbe746fb3a52b

    • \Users\Public\leasslile.exe

      Filesize

      1.6MB

      MD5

      fabf16e9c8507cff4200422a3c79339e

      SHA1

      15a681c7e412b40dea9c92d3cc5bf9b5d5b1646f

      SHA256

      5ce7c3f47cc78afe5727f28e2eed13a71855a5edf89277dce00b7565953209fa

      SHA512

      e8ac64d7ac46193773170a199b3d827f9038aeb19f22c6e37159dacd3a685eda71cc694367dcdeac890434f45d2a7455f19d7cbb8e9842c088cdbe746fb3a52b

    • memory/1236-309-0x0000000002AD0000-0x0000000002B1F000-memory.dmp

      Filesize

      316KB

    • memory/1236-298-0x0000000002930000-0x0000000002971000-memory.dmp

      Filesize

      260KB

    • memory/1236-299-0x0000000002930000-0x0000000002971000-memory.dmp

      Filesize

      260KB

    • memory/1236-394-0x0000000002AD0000-0x0000000002B1F000-memory.dmp

      Filesize

      316KB

    • memory/1560-85-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1560-357-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1752-84-0x00000000003E0000-0x00000000003E1000-memory.dmp

      Filesize

      4KB

    • memory/1752-196-0x0000000028B70000-0x0000000028BBF000-memory.dmp

      Filesize

      316KB

    • memory/1752-185-0x0000000028B70000-0x0000000028BBF000-memory.dmp

      Filesize

      316KB

    • memory/1752-184-0x000000002A1D0000-0x000000002A5D0000-memory.dmp

      Filesize

      4.0MB