Analysis
-
max time kernel
158s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2023 07:35
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230703-en
General
-
Target
tmp.exe
-
Size
1.9MB
-
MD5
45e29ac354f22b6aeb3edd8dbebd5f3c
-
SHA1
d1aa5592f246a98c4f3b2d59d993bacf05c4b81a
-
SHA256
b83474625ff20a97c5c0427de49bbe59060832fce73a660b5eb76b6fd95b3936
-
SHA512
4f9050d7accf11fd13791b1fdae34f9ae36e4a3964297717f715c98f6bf8027b8827ef8d039556702e79cb95deda9bcccb0176b26eeaeb98a7c4ed0c715ed14e
-
SSDEEP
49152:7GfDusrp6C3ESrb/TkvO90d7HjmAFd4A64nsfJUb6Ll2Cz8SgYYiCCN+9Lb1:Kl3E7Qz
Malware Config
Extracted
cobaltstrike
http://101.43.206.115:36354/MWDu
-
user_agent
User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2; Trident/6.0)
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4792 tmp.exe