Analysis

  • max time kernel
    134s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    26-06-2023 04:13

General

  • Target

    7a51bf0527aa3f38ee5a9ae52c1a4f63d67d68af2da7b488f8ba7b66d665e618.exe

  • Size

    2.5MB

  • MD5

    8e96a9977d96e47db7c33cf350338b87

  • SHA1

    84842f681f7640332f51e283aa8988cb37f4ff77

  • SHA256

    7a51bf0527aa3f38ee5a9ae52c1a4f63d67d68af2da7b488f8ba7b66d665e618

  • SHA512

    627627d69c9d5e065803a938839d6aa8cfbb8518c2cb40dc7959639eed406c255d343a773e30dc2c3f169576991a44148f97679677f5a5c041d1a4397c3f1eca

  • SSDEEP

    49152:PXkBqWXVR8fkWKGEg+hGUlHJgxMt/N0+kZ:P04Ux7g+hGUDgx0a+O

Malware Config

Signatures

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • Suspicious behavior: RenamesItself 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a51bf0527aa3f38ee5a9ae52c1a4f63d67d68af2da7b488f8ba7b66d665e618.exe
    "C:\Users\Admin\AppData\Local\Temp\7a51bf0527aa3f38ee5a9ae52c1a4f63d67d68af2da7b488f8ba7b66d665e618.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    PID:936

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/936-54-0x0000000000140000-0x00000000001C0000-memory.dmp

    Filesize

    512KB

  • memory/936-55-0x0000000000140000-0x00000000001C0000-memory.dmp

    Filesize

    512KB

  • memory/936-56-0x00000000005D0000-0x000000000082A000-memory.dmp

    Filesize

    2.4MB

  • memory/936-57-0x0000000000E30000-0x0000000000FD8000-memory.dmp

    Filesize

    1.7MB

  • memory/936-58-0x0000000000E30000-0x0000000000FD8000-memory.dmp

    Filesize

    1.7MB

  • memory/936-59-0x0000000180000000-0x00000001801AC000-memory.dmp

    Filesize

    1.7MB

  • memory/936-66-0x0000000180000000-0x00000001801AC000-memory.dmp

    Filesize

    1.7MB

  • memory/936-67-0x0000000000470000-0x00000000004BE000-memory.dmp

    Filesize

    312KB

  • memory/936-68-0x0000000000140000-0x00000000001C0000-memory.dmp

    Filesize

    512KB

  • memory/936-69-0x0000000000470000-0x00000000004BE000-memory.dmp

    Filesize

    312KB