Analysis
-
max time kernel
147s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
20/05/2023, 13:13
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
General
-
Target
tmp.exe
-
Size
899KB
-
MD5
e067b5d5b7de061f034961aa9197f768
-
SHA1
c84c08c2a6b6c8d63a3e054ea9a48132ad0fa1c1
-
SHA256
060a0c1bd4fecd9c726cbdf9af12f10fec6bb8b97ca749d327d869c23f12060e
-
SHA512
92a0267f628df609a2f4a20ceeb2be0b67c7908c3e49741bbd5bd3becfb85e25492f4397fd505a34412774b8193ff49b6d7ae169048e9d84f20a701981ba399e
-
SSDEEP
12288:A6xc065bTLeJirMdeLicTZDE3saM+CadLJ6RBKVJEBTUuwjlcV6G:bq06t3nrag1qsathguV6kRcM
Malware Config
Extracted
metasploit
windows/download_exec
http://92.63.196.46:17899/ZoCP
- headers User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2; WOW64; Trident/6.0)
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1488 set thread context of 472 1488 tmp.exe 27 -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1488 wrote to memory of 472 1488 tmp.exe 27 PID 1488 wrote to memory of 472 1488 tmp.exe 27 PID 1488 wrote to memory of 472 1488 tmp.exe 27 PID 1488 wrote to memory of 472 1488 tmp.exe 27 PID 1488 wrote to memory of 472 1488 tmp.exe 27 PID 1488 wrote to memory of 472 1488 tmp.exe 27 PID 1488 wrote to memory of 472 1488 tmp.exe 27 PID 1488 wrote to memory of 472 1488 tmp.exe 27 PID 1488 wrote to memory of 472 1488 tmp.exe 27 PID 1488 wrote to memory of 472 1488 tmp.exe 27 PID 1488 wrote to memory of 472 1488 tmp.exe 27 PID 1488 wrote to memory of 472 1488 tmp.exe 27 PID 1488 wrote to memory of 472 1488 tmp.exe 27 PID 1488 wrote to memory of 472 1488 tmp.exe 27 PID 1488 wrote to memory of 472 1488 tmp.exe 27