Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    14/06/2023, 11:56

General

  • Target

    test.exe

  • Size

    778KB

  • MD5

    0ab1951982b3112db58c0ad4db674a3f

  • SHA1

    e2c768e7f6fa5029efe5a186f912013e5d76007a

  • SHA256

    b7e6c669e598f5fe106cebe80b12cd042f08a51431dd8ffc1f19542b8d7fcfea

  • SHA512

    013a58243e3212800f0d7421d6d41f5daee6dbecceb5f3595db16793e60043e94ea5e1c519c28bc0372b7a42542b2c81b8d42773e1b0e5c708950a1e6fee51ec

  • SSDEEP

    6144:TFsTvbjKJI3nv0n0eEMnVmvnyh++ilUJYUICgILZrRSiScezGs8v:T6bCenv+EMnwvyh+lUJYUIohezG

Malware Config

Extracted

Family

cobaltstrike

Botnet

668694132

C2

http://systemtechspecs.com:443/common

http://mail.systemtechspecs.com:443/common

http://store.systemtechspecs.com:443/common

Attributes
  • access_type

    512

  • beacon_type

    2048

  • host

    systemtechspecs.com,/common,mail.systemtechspecs.com,/common,store.systemtechspecs.com,/common

  • http_header1

    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

  • http_header2

    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

  • http_method1

    GET

  • http_method2

    POST

  • jitter

    11008

  • polling_time

    24542

  • port_number

    443

  • sc_process32

    %windir%\syswow64\WUAUCLT.exe

  • sc_process64

    %windir%\sysnative\WUAUCLT.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCcRZsW4NWnUHeMEWqlLkfJRXFfk8goYbFhHEizlDIRfqjNOaQ4GFqzpUKuPSHdBUmAepxUhqttw5YcTuaSVLTJzju4f97iuW4wES83J+2Eu7MV8DaSRi70Stv/u7/SJUI54Zc/vd5ZbBOsU+oBp6XCcXEAYnHpxDE4JA00PvO2KwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    2.924877056e+09

  • unknown2

    AAAABAAAAAIAAAFSAAAAAwAAAA8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • uri

    /xmlconnect

  • user_agent

    Mozilla/5.0 (iPhone; CPU iPhone OS 12_0 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0

  • watermark

    668694132

Signatures

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\test.exe
    "C:\Users\Admin\AppData\Local\Temp\test.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Windows\system32\cmd.exe
      cmd.exe /c echo sxltoFssXCNGBIDyrdutHBJvqw>"C:\Users\Admin\AppData\Local\Temp\DEMD1C.tmp"&exit
      2⤵
        PID:1736

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      62KB

      MD5

      3ac860860707baaf32469fa7cc7c0192

      SHA1

      c33c2acdaba0e6fa41fd2f00f186804722477639

      SHA256

      d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

      SHA512

      d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      304B

      MD5

      cb98d505dcd8d5694b69f7d797c810a2

      SHA1

      488d5d214842105935b6de1a4e9f18a06cc50a35

      SHA256

      e7c85c350235ce790696138ac5981bf57ae4976142a7a83b7d02a1331fa9033e

      SHA512

      69e037aef00b395b7650473e75a1caee4595883711d12028c123f336b02d2d7122fb7adec904b28ff9144c168a46fd48f4f56f9157dad4444cdc901a737e3016

    • C:\Users\Admin\AppData\Local\Temp\Cab27A1.tmp

      Filesize

      61KB

      MD5

      fc4666cbca561e864e7fdf883a9e6661

      SHA1

      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

      SHA256

      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

      SHA512

      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

    • C:\Users\Admin\AppData\Local\Temp\DEMD1C.tmp

      Filesize

      28B

      MD5

      6d40701d4f0744a0a23fd1e859ae5b57

      SHA1

      609298d007fae53f2602e89d124f36b37f590f49

      SHA256

      866a8c90fbeaef441be247f0c1202bdcc5b8ebf3683429a836013f41254ae2ab

      SHA512

      34a5e5892da5b7d15f7c8eabddce10c94ef2ee4f61defe25e36f65a024d8de1424d9bf019f102a2e6b11c456ddb295e339d0278c54b65f8bf6b2e90b5dbdd5e6

    • C:\Users\Admin\AppData\Local\Temp\Tar28A1.tmp

      Filesize

      164KB

      MD5

      4ff65ad929cd9a367680e0e5b1c08166

      SHA1

      c0af0d4396bd1f15c45f39d3b849ba444233b3a2

      SHA256

      c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

      SHA512

      f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

    • memory/1996-56-0x0000000000250000-0x0000000000294000-memory.dmp

      Filesize

      272KB

    • memory/1996-57-0x00000000008C0000-0x0000000000946000-memory.dmp

      Filesize

      536KB

    • memory/1996-124-0x0000000000660000-0x0000000000662000-memory.dmp

      Filesize

      8KB

    • memory/1996-125-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB

    • memory/1996-399-0x0000000000400000-0x00000000004C9000-memory.dmp

      Filesize

      804KB