Analysis
-
max time kernel
133s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
26-06-2023 03:27
Static task
static1
Behavioral task
behavioral1
Sample
7a51bf0527aa3f38ee5a9ae52c1a4f63d67d68af2da7b488f8ba7b66d665e618.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
7a51bf0527aa3f38ee5a9ae52c1a4f63d67d68af2da7b488f8ba7b66d665e618.exe
Resource
win10v2004-20230621-en
General
-
Target
7a51bf0527aa3f38ee5a9ae52c1a4f63d67d68af2da7b488f8ba7b66d665e618.exe
-
Size
2.5MB
-
MD5
8e96a9977d96e47db7c33cf350338b87
-
SHA1
84842f681f7640332f51e283aa8988cb37f4ff77
-
SHA256
7a51bf0527aa3f38ee5a9ae52c1a4f63d67d68af2da7b488f8ba7b66d665e618
-
SHA512
627627d69c9d5e065803a938839d6aa8cfbb8518c2cb40dc7959639eed406c255d343a773e30dc2c3f169576991a44148f97679677f5a5c041d1a4397c3f1eca
-
SSDEEP
49152:PXkBqWXVR8fkWKGEg+hGUlHJgxMt/N0+kZ:P04Ux7g+hGUDgx0a+O
Malware Config
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1596 7a51bf0527aa3f38ee5a9ae52c1a4f63d67d68af2da7b488f8ba7b66d665e618.exe