Resubmissions
11-08-2023 18:09
230811-wrxmsshg7w 1010-08-2023 16:39
230810-t6a18sfb25 310-08-2023 16:00
230810-tfl1taef87 1010-08-2023 15:59
230810-te451agd9w 310-08-2023 15:56
230810-tdfe9aef62 10Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2023 16:00
Behavioral task
behavioral1
Sample
2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
shellcode_loader_1.pyc
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
shellcode_loader_1.pyc
Resource
win10v2004-20230703-en
General
-
Target
2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a.exe
-
Size
4.5MB
-
MD5
62f510d6c3ecf3c63f54240379a223d1
-
SHA1
b3d826c02cb856db7a4edc0599c885f054984973
-
SHA256
2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a
-
SHA512
8308c4445631bc305c3f25cb6c33c5f3c5c20d4e7ac55baff5fa0018a396ea5feea3b6adbda7107ea2e848565e73ea7c8d5503ace8a7c4cbaf2e987c90694e0a
-
SSDEEP
98304:OlHQcO/ki1LShsRT6q+LsnggYpdBs8R8YT6v/TwZVVABrxzB0RWcQ0b:Olwceki1LShOOq+L7gYpx+YnAJxpt0b
Malware Config
Extracted
metasploit
windows/download_exec
http://time.api.chinabm.cn:443/rpc
Extracted
cobaltstrike
1359593325
http://time.api.chinabm.cn:443/owa/
-
access_type
512
-
beacon_type
2048
-
host
time.api.chinabm.cn,/owa/
-
http_header1
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
-
http_header2
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
-
http_method1
GET
-
http_method2
GET
-
jitter
5120
-
polling_time
5000
-
port_number
443
-
sc_process32
%windir%\syswow64\gpupdate.exe
-
sc_process64
%windir%\sysnative\gpupdate.exe
-
state_machine
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCgwZtr5WmRWGqXa6bxdqQDUmj+XU+vA4zK2b7Nfzq4qy143458ufxXidOMjoSLVP3BqyJgWamd0KYY7Yt3bDmFbWashi7f+OYdWpDNixd5AvcGOOzQhShEZ/0Uz8CG/gc99swyssnxs0YBg9Hka4Wh0ufxO89KSApuLegLE5i1/QIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown1
1.448416512e+09
-
unknown2
AAAABAAAAA0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==
-
unknown3
1.610612736e+09
-
uri
/OWA/
-
user_agent
Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko)
-
watermark
1359593325
Signatures
-
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Loads dropped DLL 3 IoCs
Processes:
2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a.exepid process 2576 2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a.exe 2576 2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a.exe 2576 2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a.exedescription pid process Token: 35 2576 2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a.exedescription pid process target process PID 1324 wrote to memory of 2576 1324 2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a.exe 2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a.exe PID 1324 wrote to memory of 2576 1324 2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a.exe 2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a.exe PID 1324 wrote to memory of 2576 1324 2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a.exe 2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a.exe"C:\Users\Admin\AppData\Local\Temp\2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a.exe"C:\Users\Admin\AppData\Local\Temp\2548b8a5a82c7db16055fbbaf2a4863ccf0caa92d661b6be0481432c48af818a.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_MEI13242\MSVCR100.dllFilesize
755KB
MD5bf38660a9125935658cfa3e53fdc7d65
SHA10b51fb415ec89848f339f8989d323bea722bfd70
SHA25660c06e0fa4449314da3a0a87c1a9d9577df99226f943637e06f61188e5862efa
SHA51225f521ffe25a950d0f1a4de63b04cb62e2a3b0e72e7405799586913208bf8f8fa52aa34e96a9cc6ee47afcd41870f3aa0cd8289c53461d1b6e792d19b750c9a1
-
C:\Users\Admin\AppData\Local\Temp\_MEI13242\MSVCR100.dllFilesize
755KB
MD5bf38660a9125935658cfa3e53fdc7d65
SHA10b51fb415ec89848f339f8989d323bea722bfd70
SHA25660c06e0fa4449314da3a0a87c1a9d9577df99226f943637e06f61188e5862efa
SHA51225f521ffe25a950d0f1a4de63b04cb62e2a3b0e72e7405799586913208bf8f8fa52aa34e96a9cc6ee47afcd41870f3aa0cd8289c53461d1b6e792d19b750c9a1
-
C:\Users\Admin\AppData\Local\Temp\_MEI13242\_ctypes.pydFilesize
83KB
MD5673dc6681afb67384e923dc9bfd2cd90
SHA1445fcab47381908214d0636be9604828f9d33a47
SHA256d551e7fcafab97340e03a41ca2f7d5c2ade7eecf7cdaedf147abad63f09f263c
SHA512801478c83727a59409c19afa9a3edce81c0139f58e3dc81696ffd690e3f1de9c595f100279b18180a9189feaf9fcc40fb74e609f181f2decbea13c6b2a49f6a6
-
C:\Users\Admin\AppData\Local\Temp\_MEI13242\_ctypes.pydFilesize
83KB
MD5673dc6681afb67384e923dc9bfd2cd90
SHA1445fcab47381908214d0636be9604828f9d33a47
SHA256d551e7fcafab97340e03a41ca2f7d5c2ade7eecf7cdaedf147abad63f09f263c
SHA512801478c83727a59409c19afa9a3edce81c0139f58e3dc81696ffd690e3f1de9c595f100279b18180a9189feaf9fcc40fb74e609f181f2decbea13c6b2a49f6a6
-
C:\Users\Admin\AppData\Local\Temp\_MEI13242\base_library.zipFilesize
708KB
MD50aecf93f79fccf4cecd0b8c40c1563b3
SHA136c406740615d9b5f1b89311e65931fe258fc4b1
SHA256f751f64f4bd5018bd38a0cfe7e808856426b4076897d58abede01413c4fde80d
SHA512b1e51e3ec81f659a78a5971cdc2e7d234ec0d87c5c787f64af02f90b32f665dda3b421139f88e36f55cda713e670f739178731ae4fe313d629eecc67c6856d27
-
C:\Users\Admin\AppData\Local\Temp\_MEI13242\python34.dllFilesize
2.6MB
MD52a78649eb1fe4354060623785f7f98aa
SHA185dcadf0b43db27f47713c433f8e31a8642cf8d5
SHA256fdb01967868edc948d9e0ee128a26a3c76df2600262ca9d38034d45dbe39017d
SHA512678b122bf318b78a7699f4417d6b74e65f3dc740d287c9a193a59c670d38579fa20180dd363f1e620fbce7e388d993e59321b19127fff3e6d6502a8e24a33d6a
-
C:\Users\Admin\AppData\Local\Temp\_MEI13242\python34.dllFilesize
2.6MB
MD52a78649eb1fe4354060623785f7f98aa
SHA185dcadf0b43db27f47713c433f8e31a8642cf8d5
SHA256fdb01967868edc948d9e0ee128a26a3c76df2600262ca9d38034d45dbe39017d
SHA512678b122bf318b78a7699f4417d6b74e65f3dc740d287c9a193a59c670d38579fa20180dd363f1e620fbce7e388d993e59321b19127fff3e6d6502a8e24a33d6a
-
C:\Users\Admin\AppData\Local\Temp\_MEI13242\shellcode_loader_1.exe.manifestFilesize
1KB
MD5737cee84004d9e7c1f1256d922490b40
SHA1f642a0fc241104b7a0aa011e434dfbe3de0b71ce
SHA256db9d564d53e46ee9ebb875443155f733d297d42a91f000153da1e29fede0a199
SHA512d3193eb3c9ab1624e9949af78fed47223e88fceeb97b8a3a80161ac358be1018e5eecfeafa6117b6f5ac2ecbb6a179ce707b16a0ef8ffdcbd2114e46152e130b
-
memory/1324-158-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/2576-157-0x00000000006A0000-0x00000000006A1000-memory.dmpFilesize
4KB
-
memory/2576-159-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/2576-161-0x0000000004280000-0x00000000042BD000-memory.dmpFilesize
244KB
-
memory/2576-162-0x0000000003E80000-0x0000000004280000-memory.dmpFilesize
4.0MB
-
memory/2576-164-0x0000000004280000-0x00000000042BD000-memory.dmpFilesize
244KB
-
memory/2576-166-0x0000000003E80000-0x0000000004280000-memory.dmpFilesize
4.0MB