Resubmissions

11-08-2023 18:09

230811-wrxmsshg7w 10

10-08-2023 16:39

230810-t6a18sfb25 3

10-08-2023 16:00

230810-tfl1taef87 10

10-08-2023 15:59

230810-te451agd9w 3

10-08-2023 15:56

230810-tdfe9aef62 10

Analysis

  • max time kernel
    143s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    10-08-2023 16:00

General

  • Target

    2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a.exe

  • Size

    4.5MB

  • MD5

    62f510d6c3ecf3c63f54240379a223d1

  • SHA1

    b3d826c02cb856db7a4edc0599c885f054984973

  • SHA256

    2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a

  • SHA512

    8308c4445631bc305c3f25cb6c33c5f3c5c20d4e7ac55baff5fa0018a396ea5feea3b6adbda7107ea2e848565e73ea7c8d5503ace8a7c4cbaf2e987c90694e0a

  • SSDEEP

    98304:OlHQcO/ki1LShsRT6q+LsnggYpdBs8R8YT6v/TwZVVABrxzB0RWcQ0b:Olwceki1LShOOq+L7gYpx+YnAJxpt0b

Malware Config

Extracted

Family

metasploit

Version

windows/download_exec

C2

http://time.api.chinabm.cn:443/rpc

Extracted

Family

cobaltstrike

Botnet

1359593325

C2

http://time.api.chinabm.cn:443/owa/

Attributes
  • access_type

    512

  • beacon_type

    2048

  • host

    time.api.chinabm.cn,/owa/

  • http_header1

    AAAAEAAAABZIb3N0OiBvdXRsb29rLmxpdmUuY29tAAAACgAAAAtBY2NlcHQ6ICovKgAAAAoAAACGQ29va2llOiBNaWNyb3NvZnRBcHBsaWNhdGlvbnNUZWxlbWV0cnlEZXZpY2VJZD05NWMxOGQ4LTRkY2U5ODU0O0NsaWVudElkPTFDMEY2QzVEOTEwRjk7TVNQQXV0aD0zRWtBakRLakk7eGlkPTczMGJmNzt3bGE0Mj1aRzB5TXpBMktqRXMAAAAHAAAAAAAAAA0AAAAFAAAAAndhAAAACQAAAA5wYXRoPS9jYWxlbmRhcgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=

  • http_header2

    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

  • http_method1

    GET

  • http_method2

    GET

  • jitter

    5120

  • polling_time

    5000

  • port_number

    443

  • sc_process32

    %windir%\syswow64\gpupdate.exe

  • sc_process64

    %windir%\sysnative\gpupdate.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCgwZtr5WmRWGqXa6bxdqQDUmj+XU+vA4zK2b7Nfzq4qy143458ufxXidOMjoSLVP3BqyJgWamd0KYY7Yt3bDmFbWashi7f+OYdWpDNixd5AvcGOOzQhShEZ/0Uz8CG/gc99swyssnxs0YBg9Hka4Wh0ufxO89KSApuLegLE5i1/QIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    1.448416512e+09

  • unknown2

    AAAABAAAAA0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown3

    1.610612736e+09

  • uri

    /OWA/

  • user_agent

    Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko)

  • watermark

    1359593325

Signatures

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Loads dropped DLL 3 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a.exe
    "C:\Users\Admin\AppData\Local\Temp\2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:284
    • C:\Users\Admin\AppData\Local\Temp\2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a.exe
      "C:\Users\Admin\AppData\Local\Temp\2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a.exe"
      2⤵
      • Loads dropped DLL
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      PID:2280

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    352eb5e60dc58e104ff5debbb99e483c

    SHA1

    656886a429eecb25859a091e191f326298ad0eda

    SHA256

    e0efd7c1e0d2b42944db669ea8b475ffe94b6ee2ad4add5df2f80361b0d76970

    SHA512

    6263fae431ef2ea858b2373a2ed0d9d4003a71279646d16408dbca3db27c50d8bb95a39ee29cee7ec821f15a92964220cc87090d1a94818af0012d0056738542

  • C:\Users\Admin\AppData\Local\Temp\CabD24F.tmp
    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarD52F.tmp
    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Local\Temp\_MEI2842\MSVCR100.dll
    Filesize

    755KB

    MD5

    bf38660a9125935658cfa3e53fdc7d65

    SHA1

    0b51fb415ec89848f339f8989d323bea722bfd70

    SHA256

    60c06e0fa4449314da3a0a87c1a9d9577df99226f943637e06f61188e5862efa

    SHA512

    25f521ffe25a950d0f1a4de63b04cb62e2a3b0e72e7405799586913208bf8f8fa52aa34e96a9cc6ee47afcd41870f3aa0cd8289c53461d1b6e792d19b750c9a1

  • C:\Users\Admin\AppData\Local\Temp\_MEI2842\_ctypes.pyd
    Filesize

    83KB

    MD5

    673dc6681afb67384e923dc9bfd2cd90

    SHA1

    445fcab47381908214d0636be9604828f9d33a47

    SHA256

    d551e7fcafab97340e03a41ca2f7d5c2ade7eecf7cdaedf147abad63f09f263c

    SHA512

    801478c83727a59409c19afa9a3edce81c0139f58e3dc81696ffd690e3f1de9c595f100279b18180a9189feaf9fcc40fb74e609f181f2decbea13c6b2a49f6a6

  • C:\Users\Admin\AppData\Local\Temp\_MEI2842\base_library.zip
    Filesize

    708KB

    MD5

    0aecf93f79fccf4cecd0b8c40c1563b3

    SHA1

    36c406740615d9b5f1b89311e65931fe258fc4b1

    SHA256

    f751f64f4bd5018bd38a0cfe7e808856426b4076897d58abede01413c4fde80d

    SHA512

    b1e51e3ec81f659a78a5971cdc2e7d234ec0d87c5c787f64af02f90b32f665dda3b421139f88e36f55cda713e670f739178731ae4fe313d629eecc67c6856d27

  • C:\Users\Admin\AppData\Local\Temp\_MEI2842\python34.dll
    Filesize

    2.6MB

    MD5

    2a78649eb1fe4354060623785f7f98aa

    SHA1

    85dcadf0b43db27f47713c433f8e31a8642cf8d5

    SHA256

    fdb01967868edc948d9e0ee128a26a3c76df2600262ca9d38034d45dbe39017d

    SHA512

    678b122bf318b78a7699f4417d6b74e65f3dc740d287c9a193a59c670d38579fa20180dd363f1e620fbce7e388d993e59321b19127fff3e6d6502a8e24a33d6a

  • C:\Users\Admin\AppData\Local\Temp\_MEI2842\shellcode_loader_1.exe.manifest
    Filesize

    1KB

    MD5

    737cee84004d9e7c1f1256d922490b40

    SHA1

    f642a0fc241104b7a0aa011e434dfbe3de0b71ce

    SHA256

    db9d564d53e46ee9ebb875443155f733d297d42a91f000153da1e29fede0a199

    SHA512

    d3193eb3c9ab1624e9949af78fed47223e88fceeb97b8a3a80161ac358be1018e5eecfeafa6117b6f5ac2ecbb6a179ce707b16a0ef8ffdcbd2114e46152e130b

  • \Users\Admin\AppData\Local\Temp\_MEI2842\MSVCR100.dll
    Filesize

    755KB

    MD5

    bf38660a9125935658cfa3e53fdc7d65

    SHA1

    0b51fb415ec89848f339f8989d323bea722bfd70

    SHA256

    60c06e0fa4449314da3a0a87c1a9d9577df99226f943637e06f61188e5862efa

    SHA512

    25f521ffe25a950d0f1a4de63b04cb62e2a3b0e72e7405799586913208bf8f8fa52aa34e96a9cc6ee47afcd41870f3aa0cd8289c53461d1b6e792d19b750c9a1

  • \Users\Admin\AppData\Local\Temp\_MEI2842\_ctypes.pyd
    Filesize

    83KB

    MD5

    673dc6681afb67384e923dc9bfd2cd90

    SHA1

    445fcab47381908214d0636be9604828f9d33a47

    SHA256

    d551e7fcafab97340e03a41ca2f7d5c2ade7eecf7cdaedf147abad63f09f263c

    SHA512

    801478c83727a59409c19afa9a3edce81c0139f58e3dc81696ffd690e3f1de9c595f100279b18180a9189feaf9fcc40fb74e609f181f2decbea13c6b2a49f6a6

  • \Users\Admin\AppData\Local\Temp\_MEI2842\python34.dll
    Filesize

    2.6MB

    MD5

    2a78649eb1fe4354060623785f7f98aa

    SHA1

    85dcadf0b43db27f47713c433f8e31a8642cf8d5

    SHA256

    fdb01967868edc948d9e0ee128a26a3c76df2600262ca9d38034d45dbe39017d

    SHA512

    678b122bf318b78a7699f4417d6b74e65f3dc740d287c9a193a59c670d38579fa20180dd363f1e620fbce7e388d993e59321b19127fff3e6d6502a8e24a33d6a

  • memory/284-79-0x0000000000400000-0x0000000000433000-memory.dmp
    Filesize

    204KB

  • memory/2280-80-0x0000000000400000-0x0000000000433000-memory.dmp
    Filesize

    204KB

  • memory/2280-78-0x0000000000390000-0x0000000000391000-memory.dmp
    Filesize

    4KB

  • memory/2280-124-0x00000000033C0000-0x00000000033FD000-memory.dmp
    Filesize

    244KB

  • memory/2280-125-0x0000000004530000-0x0000000004930000-memory.dmp
    Filesize

    4.0MB

  • memory/2280-154-0x00000000033C0000-0x00000000033FD000-memory.dmp
    Filesize

    244KB

  • memory/2280-157-0x0000000004530000-0x0000000004930000-memory.dmp
    Filesize

    4.0MB